Technische Universitat Clausthal

Displaying 41-58 of 58 results

  • White Papers // Oct 2010

    SFHC.KOM: Stateful Header Compression for Wireless Sensor Networks

    Nodes in wireless sensor networks are generally confined in the energy budget available for their operation, hence energy-aware application design is mandatory to achieve long node lifetimes. Radio transmissions represent an inherent, but energetically costly characteristic of sensor networking. Significant reductions in the overall energy consumption can thus be achieved...

    Provided By Technische Universitat Clausthal

  • White Papers // Oct 2010

    A Concept for Cross-Layer Optimization of Wireless Sensor Networks in the Logistics Domain by Exploiting Business Knowledge

    Energy is limited in wireless sensor networks due to mostly battery-operated wireless sensor nodes. Consequently, an efficient energy usage significantly enhances the lifetime of a wireless sensor network. In this paper, the authors propose a cross-layer optimization concept that exploits business knowledge in the logistics domain to adapt communication by...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2010

    Towards Declarative Query Scoping in Sensor Networks

    In the last decade, several large-scale wireless sensor networks have been deployed to monitor a variety of environments. The declarative nature of the database approach for accessing sensor data has gained great popularity because of both its simplicity and its energy-efficient implementation. At the same time another declarative abstraction made...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2010

    Iterative Dual Downlink Beamforming for Cognitive Radio Networks

    The authors address the problem of multi-user downlink beamforming and power allocation in a Cognitive Radio (CR) Secondary Network (SN) with constraints on the total interference in the Primary Network (PN). They derive the Lagrange dual of the problem and show that both problems are equivalent. Two algorithms are proposed...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2010

    Describing Packet Payload Structures Using Lightweight Semantic Data Type Annotations

    In the majority of wireless sensor networks, packet structures are statically defined at design time. At runtime, sensed data is then inserted into the payload fields prior to packet transmission. While this is efficient in terms of the required processing, the packet structure cannot be modified during runtime. However, in...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2010

    Deployment of Wireless Sensor Networks in Logistics - Potential, Requirements, and a Testbed

    With the growing demand for extensive monitoring of transport processes in logistics and approaches for an event-based management of logistics processes, wireless sensor network technology has become a promising technology for this domain. In the first part of this paper, the authors describe such application possibilities for wireless sensor networks...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2010

    Exploring the Applicability of Participatory Sensing in Emergency Scenarios

    In emergency scenarios, rescuers need specific information about the affected areas. Such information are normally collected by sensors, but sometimes they could not be available because, as a consequence of a disaster, the pre-deployed infrastructure might be damaged, and rescue teams could not easily deploy new sensors in unfavorable conditions....

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2010

    Fine-Grained Access Control Enabling Privacy Support in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are deployed to cover a wide range of scenarios ranging from environmental monitoring to medical applications. However, some deployments raise privacy concerns. The threats to privacy are directly identifiable in people-centric scenarios. However, environment-centric scenarios may also threaten the privacy of persons located in the monitored...

    Provided By Technische Universitat Clausthal

  • White Papers // Jul 2010

    An On-Line Piecewise Linear Approximation Technique for Wireless Sensor Networks

    Many sensor network applications observe trends over an area by regularly sampling slow-moving values such as humidity or air pressure (for example in habitat monitoring). Another well-published type of application aims at spotting sporadic events, such as sudden rises in temperature or the presence of methane, which are tackled by...

    Provided By Technische Universitat Clausthal

  • White Papers // Jun 2010

    On Distributed SLA Monitoring and Enforcement in Service-Oriented Systems

    For the integration of systems across enterprise boundaries, the application of Web service technology and the Service-Oriented Architecture (SOA) paradigm have become state of the art. Here, the management of the quality delivered by third party services is crucial. In order to achieve high service quality, requirements therefore need to...

    Provided By Technische Universitat Clausthal

  • White Papers // Mar 2010

    Sorting the Wheat From the Chaff: Adaptive Sensor Selection for Context-Aware Applications

    Context-aware applications base their services on contextual information that can be queried from the sensors embedded in the environment. However, when the number of sensors and the applications using them increases, sensor query becomes on one hand a resource hungry task, e.g. for network bandwidth and energy needed to power...

    Provided By Technische Universitat Clausthal

  • White Papers // Feb 2010

    Trimming the Tree: Tailoring Adaptive Huffman Coding to Wireless Sensor Networks

    Nodes in wireless sensor networks are generally designed to operate on a limited energy budget, and must consciously use the available charge to allow for long lifetimes. As the radio transceiver is the predominant power consumer on current node platforms, the minimization of its activity periods and efficient use of...

    Provided By Technische Universitat Clausthal

  • White Papers // Feb 2010

    Towards Seamless Binding of Context-Aware Services to Ubiquitous Information Sources

    The area of context-aware computing has received much attention in the last decade. However, many systems to determine a user's context are focused on integrating a confined set of sensors into their decision-making algorithms, and lack extensibility for new and novel sources of context information. This limitation however has often...

    Provided By Technische Universitat Clausthal

  • White Papers // Oct 2009

    An Analytical Model of Routing, Misbehavior, and Countermeasures in Mobile Ad Hoc Networks

    Conditions such as wireless data transmission and lack of a communication infrastructure turn Mobile Ad-hoc NETworks (MANETs) into a challenging environment from the perspective of security. Various kinds of misbehavior were identified. The authors present an analytical model combining geometric and stochastic approaches to describe the effects of attacks and...

    Provided By Technische Universitat Clausthal

  • White Papers // Oct 2009

    On the Energy Efficiency of Lossless Data Compression in Wireless Sensor Networks

    In wireless sensor networks, energy is commonly a scarce resource, which should be used as sparingly as possible to allow for long node lifetimes. It is therefore mandatory to put a focus on the development of energy-efficient applications. In this paper, the authors analyze the achievable energy gains when packet...

    Provided By Technische Universitat Clausthal

  • White Papers // Aug 2009

    Cross-Organizational Service Security - Solutions for Attack Modeling and Defense

    Security is an important aspect of Service-Oriented Architectures (SOAs), enabling the service-based integration of partner IT systems across organizational boundaries, i. e., in the Internet of Services. Current trends in SOA security, e. g., reducing it to Web service security, do not take into account SOA-specific threats, vulnerabilities, and attacks....

    Provided By Technische Universitat Clausthal

  • White Papers // Jun 2009

    Stream-Oriented Lossless Packet Compression in Wireless Sensor Networks

    In wireless sensor networks, the energy consumption of participating nodes has crucial impact on the resulting network lifetime. Data compression is a viable approach towards preserving energy by reducing packet sizes and thus minimizing the activity periods of the radio transceiver. In this paper, the authors propose a compression framework...

    Provided By Technische Universitat Clausthal

  • White Papers // Feb 2009

    Data Centric Peer-to-Peer Communication in Power Grids

    The authors study the use of peer-to-peer based declarative data management to enable efficient monitoring and control of power transmission and distribution networks. They propose methods and an architecture for data centric communication in power networks; a proof-of-concept decentralized communication infrastructure is presented that uses and advances state of the...

    Provided By Technische Universitat Clausthal

  • White Papers // Dec 2012

    A Polynomial Time Version of LLL with Deep Insertions

    Lattice reduction algorithms have numerous applications in number theory, algebra, as well as in cryptanalysis. The most famous algorithm for lattice reduction is the LLL algorithm. In polynomial time it computes a reduced basis with provable output quality. One early improvement of the LLL algorithm was LLL with deep insertions...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2013

    Optimal Parameters for XMSS

    The authors introduce Multi Tree XMSS (XMSSMT), a hash-based signature scheme that can be used to sign a virtually unlimited number of messages. It is provably forward and hence EU-CMA secure in the standard model and improves key and signature generation times compared to previous schemes. XMSSMT has - like...

    Provided By Technische Universitat Clausthal

  • White Papers // Mar 2013

    W-OTS+ - Shorter Signatures for Hash-Based Signature Schemes

    Digital signatures are among the most important cryptographic primitives in practice. They have many applications, including the use in SSL/TLS and securing software updates. Hash-based or Merkle Signature Schemes (MSS) are an interesting alternative to the signature schemes used today, not only because they are assumed to resist quantum computer...

    Provided By Technische Universitat Clausthal

  • White Papers // May 2013

    Forward Secure Signatures on Smart Cards

    The authors presented the first smart card implementation of a forward secure signature scheme. The results presented in section 4 shows that the implementation is practical and that key generation can be done on the card in less than a minute. This is in contrast to previous implementations of similar...

    Provided By Technische Universitat Clausthal

  • White Papers // Aug 2013

    Discrete Ziggurat: A Time-Memory Trade-Off for Sampling from a Gaussian Distribution Over the Integers

    Several lattice-based cryptosystems require to sample from a discrete gaussian distribution over the integers. Existing methods to sample from such a distribution either need large amounts of memory or they are very slow. In this paper the authors explore a different method that allows for a flexible time-memory trade-off, offering...

    Provided By Technische Universitat Clausthal

  • White Papers // Nov 2011

    Towards Taming Privilege-Escalation Attacks on Android

    Android's security framework has been an appealing subject of research in the last few years. Android has been shown to be vulnerable to application-level privilege escalation attacks, such as confused deputy attacks, and more recently, attacks by colluding applications. While most of the proposed approaches aim at solving confused deputy...

    Provided By Technische Universitat Clausthal

  • White Papers // Jan 2012

    A Security Metrics Framework for the Cloud

    Cloud computing is redefining the on-demand usage of remotely-located, and highly available computing resources to the user. Unfortunately, while the many economic and technological advantages are apparent, the migration of key sector applications to the Cloud has been limited due to a major show-stopper: the paucity of quantifiable metrics to...

    Provided By Technische Universitat Clausthal

  • White Papers // Aug 2009

    Cross-Organizational Service Security - Solutions for Attack Modeling and Defense

    Security is an important aspect of Service-Oriented Architectures (SOAs), enabling the service-based integration of partner IT systems across organizational boundaries, i. e., in the Internet of Services. Current trends in SOA security, e. g., reducing it to Web service security, do not take into account SOA-specific threats, vulnerabilities, and attacks....

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2013

    Anonymity-Preserving Public-Key Encryption: A Constructive Approach

    A receiver-anonymous channel allows a sender to send a message to a receiver without an adversary learning for whom the message is intended. Wireless broadcast channels naturally provide receiver anonymity, as did multi-casting one message to a receiver population containing the intended receiver. While anonymity and confidentiality appear to be...

    Provided By Technische Universitat Clausthal

  • White Papers // Aug 2013

    The Potential of an Individualized Set of Trusted CAs: Defending Against CA Failures in the Web PKI

    The security of most Internet applications relies on underlying Public Key Infrastructures (PKIs) and thus on an ecosystem of Certification Authorities (CAs). The pool of PKIs responsible for the issuance and the maintenance of SSL certificates, called the Web PKI, have grown extremely large and complex. Herein, each CA is...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2013

    More Efficient Oblivious Transfer and Extensions for Faster Secure Computation

    Protocols for secure computation enable parties to compute a joint function on their private inputs without revealing anything but the result. A foundation for secure computation is Oblivious Transfer (OT), which traditionally requires expensive public key cryptography. A more efficient way to perform many OTs is to extend a small...

    Provided By Technische Universitat Clausthal

  • White Papers // Apr 2011

    Re-Synchronizing Audio Watermarking After Non-Linear Time Stretching

    Digital audio watermarking today is robust to many common attacks, including lossy compression and digital-to-analogue conversion. One robustness and security challenge, still, is time-stretching. This operation speeds up or slows down the playback speed while preserving the tone pitch. Although inaudible for an uninformed listener if smoothly applied, time-stretching can...

    Provided By Technische Universitat Clausthal

  • White Papers // Dec 2010

    Linear Recurring Sequences for the UOV Key Generation

    Multivariate public key cryptography is one of the main approaches to guarantee the security of communication in the post-quantum world. Due to its high efficiency and modest computational requirements, multivariate cryptography seems especially appropriate for signature schemes on low cost devices. However, multivariate schemes are not much used yet, mainly...

    Provided By Technische Universitat Clausthal

  • White Papers // Feb 2013

    Automatic Protocol Selection in Secure Two-Party Computations

    Performance of secure computation is still often an obstacle to its practical adoption. There are different protocols for secure computation that compete for the best performance. In this paper the authors propose automatic protocol selection which selects a protocol for each operation resulting in a mix with the best performance...

    Provided By Technische Universitat Clausthal

  • White Papers // Jul 2011

    Lightweight Remote Attestation Using Physical Functions

    Remote attestation is a mechanism to securely and verifiably obtain information about the state of a remote computing platform. However, resource-constrained embedded devices cannot afford the required trusted hardware components, while software attestation is generally vulnerable to network and collusion attacks. In this paper, the authors present a lightweight remote...

    Provided By Technische Universitat Clausthal

  • White Papers // Jan 2013

    Towards a Trust Management System for Cloud Computing Marketplaces: Using CAIQ as a Trust Information Source

    Cloud computing enables IT related services in a more dynamic and scalable way than before - more cost-effective than before due to the economy of scale and of sharing resources. Usually, cloud providers describe their promised behavior - regarding functional and non-functional aspects of the service provision - by way...

    Provided By Technische Universitat Clausthal

  • White Papers // Dec 2010

    Distributed Execution of S-BPM Business Processes

    Subject-oriented Business Process Management (S-BPM) introduces a new technique for process modeling that emphasizes the importance of the actors in business processes (subjects) and gives a balanced consideration to subjects, their actions, and goals. Because of the formal foundation and the clear declaration of subjects, S-BPM allows the distributed modeling...

    Provided By Technische Universitat Clausthal

  • White Papers // Jun 2010

    On Distributed SLA Monitoring and Enforcement in Service-Oriented Systems

    For the integration of systems across enterprise boundaries, the application of Web service technology and the Service-Oriented Architecture (SOA) paradigm have become state of the art. Here, the management of the quality delivered by third party services is crucial. In order to achieve high service quality, requirements therefore need to...

    Provided By Technische Universitat Clausthal