Technische Universitat Clausthal

Displaying 41-57 of 57 results

  • White Papers // Oct 2010

    SFHC.KOM: Stateful Header Compression for Wireless Sensor Networks

    Nodes in wireless sensor networks are generally confined in the energy budget available for their operation, hence energy-aware application design is mandatory to achieve long node lifetimes. Radio transmissions represent an inherent, but energetically costly characteristic of sensor networking. Significant reductions in the overall energy consumption can thus be achieved...

    Provided By Technische Universitat Clausthal

  • White Papers // Oct 2010

    A Concept for Cross-Layer Optimization of Wireless Sensor Networks in the Logistics Domain by Exploiting Business Knowledge

    Energy is limited in wireless sensor networks due to mostly battery-operated wireless sensor nodes. Consequently, an efficient energy usage significantly enhances the lifetime of a wireless sensor network. In this paper, the authors propose a cross-layer optimization concept that exploits business knowledge in the logistics domain to adapt communication by...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2010

    Towards Declarative Query Scoping in Sensor Networks

    In the last decade, several large-scale wireless sensor networks have been deployed to monitor a variety of environments. The declarative nature of the database approach for accessing sensor data has gained great popularity because of both its simplicity and its energy-efficient implementation. At the same time another declarative abstraction made...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2010

    Iterative Dual Downlink Beamforming for Cognitive Radio Networks

    The authors address the problem of multi-user downlink beamforming and power allocation in a Cognitive Radio (CR) Secondary Network (SN) with constraints on the total interference in the Primary Network (PN). They derive the Lagrange dual of the problem and show that both problems are equivalent. Two algorithms are proposed...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2010

    Describing Packet Payload Structures Using Lightweight Semantic Data Type Annotations

    In the majority of wireless sensor networks, packet structures are statically defined at design time. At runtime, sensed data is then inserted into the payload fields prior to packet transmission. While this is efficient in terms of the required processing, the packet structure cannot be modified during runtime. However, in...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2010

    Deployment of Wireless Sensor Networks in Logistics - Potential, Requirements, and a Testbed

    With the growing demand for extensive monitoring of transport processes in logistics and approaches for an event-based management of logistics processes, wireless sensor network technology has become a promising technology for this domain. In the first part of this paper, the authors describe such application possibilities for wireless sensor networks...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2010

    Exploring the Applicability of Participatory Sensing in Emergency Scenarios

    In emergency scenarios, rescuers need specific information about the affected areas. Such information are normally collected by sensors, but sometimes they could not be available because, as a consequence of a disaster, the pre-deployed infrastructure might be damaged, and rescue teams could not easily deploy new sensors in unfavorable conditions....

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2010

    Fine-Grained Access Control Enabling Privacy Support in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are deployed to cover a wide range of scenarios ranging from environmental monitoring to medical applications. However, some deployments raise privacy concerns. The threats to privacy are directly identifiable in people-centric scenarios. However, environment-centric scenarios may also threaten the privacy of persons located in the monitored...

    Provided By Technische Universitat Clausthal

  • White Papers // Jul 2010

    An On-Line Piecewise Linear Approximation Technique for Wireless Sensor Networks

    Many sensor network applications observe trends over an area by regularly sampling slow-moving values such as humidity or air pressure (for example in habitat monitoring). Another well-published type of application aims at spotting sporadic events, such as sudden rises in temperature or the presence of methane, which are tackled by...

    Provided By Technische Universitat Clausthal

  • White Papers // Jun 2010

    On Distributed SLA Monitoring and Enforcement in Service-Oriented Systems

    For the integration of systems across enterprise boundaries, the application of Web service technology and the Service-Oriented Architecture (SOA) paradigm have become state of the art. Here, the management of the quality delivered by third party services is crucial. In order to achieve high service quality, requirements therefore need to...

    Provided By Technische Universitat Clausthal

  • White Papers // Mar 2010

    Sorting the Wheat From the Chaff: Adaptive Sensor Selection for Context-Aware Applications

    Context-aware applications base their services on contextual information that can be queried from the sensors embedded in the environment. However, when the number of sensors and the applications using them increases, sensor query becomes on one hand a resource hungry task, e.g. for network bandwidth and energy needed to power...

    Provided By Technische Universitat Clausthal

  • White Papers // Feb 2010

    Trimming the Tree: Tailoring Adaptive Huffman Coding to Wireless Sensor Networks

    Nodes in wireless sensor networks are generally designed to operate on a limited energy budget, and must consciously use the available charge to allow for long lifetimes. As the radio transceiver is the predominant power consumer on current node platforms, the minimization of its activity periods and efficient use of...

    Provided By Technische Universitat Clausthal

  • White Papers // Feb 2010

    Towards Seamless Binding of Context-Aware Services to Ubiquitous Information Sources

    The area of context-aware computing has received much attention in the last decade. However, many systems to determine a user's context are focused on integrating a confined set of sensors into their decision-making algorithms, and lack extensibility for new and novel sources of context information. This limitation however has often...

    Provided By Technische Universitat Clausthal

  • White Papers // Oct 2009

    An Analytical Model of Routing, Misbehavior, and Countermeasures in Mobile Ad Hoc Networks

    Conditions such as wireless data transmission and lack of a communication infrastructure turn Mobile Ad-hoc NETworks (MANETs) into a challenging environment from the perspective of security. Various kinds of misbehavior were identified. The authors present an analytical model combining geometric and stochastic approaches to describe the effects of attacks and...

    Provided By Technische Universitat Clausthal

  • White Papers // Oct 2009

    On the Energy Efficiency of Lossless Data Compression in Wireless Sensor Networks

    In wireless sensor networks, energy is commonly a scarce resource, which should be used as sparingly as possible to allow for long node lifetimes. It is therefore mandatory to put a focus on the development of energy-efficient applications. In this paper, the authors analyze the achievable energy gains when packet...

    Provided By Technische Universitat Clausthal

  • White Papers // Aug 2009

    Cross-Organizational Service Security - Solutions for Attack Modeling and Defense

    Security is an important aspect of Service-Oriented Architectures (SOAs), enabling the service-based integration of partner IT systems across organizational boundaries, i. e., in the Internet of Services. Current trends in SOA security, e. g., reducing it to Web service security, do not take into account SOA-specific threats, vulnerabilities, and attacks....

    Provided By Technische Universitat Clausthal

  • White Papers // Jun 2009

    Stream-Oriented Lossless Packet Compression in Wireless Sensor Networks

    In wireless sensor networks, the energy consumption of participating nodes has crucial impact on the resulting network lifetime. Data compression is a viable approach towards preserving energy by reducing packet sizes and thus minimizing the activity periods of the radio transceiver. In this paper, the authors propose a compression framework...

    Provided By Technische Universitat Clausthal

  • White Papers // Mar 2010

    Sorting the Wheat From the Chaff: Adaptive Sensor Selection for Context-Aware Applications

    Context-aware applications base their services on contextual information that can be queried from the sensors embedded in the environment. However, when the number of sensors and the applications using them increases, sensor query becomes on one hand a resource hungry task, e.g. for network bandwidth and energy needed to power...

    Provided By Technische Universitat Clausthal

  • White Papers // Feb 2010

    Trimming the Tree: Tailoring Adaptive Huffman Coding to Wireless Sensor Networks

    Nodes in wireless sensor networks are generally designed to operate on a limited energy budget, and must consciously use the available charge to allow for long lifetimes. As the radio transceiver is the predominant power consumer on current node platforms, the minimization of its activity periods and efficient use of...

    Provided By Technische Universitat Clausthal

  • White Papers // Feb 2010

    Towards Seamless Binding of Context-Aware Services to Ubiquitous Information Sources

    The area of context-aware computing has received much attention in the last decade. However, many systems to determine a user's context are focused on integrating a confined set of sensors into their decision-making algorithms, and lack extensibility for new and novel sources of context information. This limitation however has often...

    Provided By Technische Universitat Clausthal

  • White Papers // Oct 2009

    On the Energy Efficiency of Lossless Data Compression in Wireless Sensor Networks

    In wireless sensor networks, energy is commonly a scarce resource, which should be used as sparingly as possible to allow for long node lifetimes. It is therefore mandatory to put a focus on the development of energy-efficient applications. In this paper, the authors analyze the achievable energy gains when packet...

    Provided By Technische Universitat Clausthal

  • White Papers // Jun 2009

    Stream-Oriented Lossless Packet Compression in Wireless Sensor Networks

    In wireless sensor networks, the energy consumption of participating nodes has crucial impact on the resulting network lifetime. Data compression is a viable approach towards preserving energy by reducing packet sizes and thus minimizing the activity periods of the radio transceiver. In this paper, the authors propose a compression framework...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2012

    Designing a Sensor Network Testbed for Smart Heterogeneous Applications

    Future buildings and environments are envisioned to provide ambient intelligence, adapting to a user's preferences based on information about his context and status. Smart heterogeneous sensor networks are well suited data sources for such environments, because they allow for dynamic adaptation to newly added sensor types and novel tasks. Realistic...

    Provided By Technische Universitat Clausthal

  • White Papers // May 2013

    Hybrid Approach for the Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes

    Multivariate cryptography is one of the main candidates to guarantee the security of communication in the post-quantum era. Especially in the area of digital signatures, multivariate cryptography offers a wide range of practical schemes. In Petzoldt et al. showed a way to speed up the verification process of improved variants...

    Provided By Technische Universitat Clausthal

  • White Papers // May 2013

    Improvement and Efficient Implementation of a Lattice-based Signature Scheme

    Lattice-based signature schemes constitute an interesting alternative to RSA and discrete logarithm based systems which may become insecure in the future, for example due to the possibility of quantum attacks. A particularly interesting scheme in this context is the GPV signature scheme [GPV08] combined with the trapdoor construction from Micciancio...

    Provided By Technische Universitat Clausthal

  • White Papers // Oct 2012

    Authenticity, Integrity and Proof of Existence for Long-Term Archiving: A Survey

    Electronic archives are increasingly being used to store information that needs to be available for a long time such as land register information and medical records. In order for the data in such archives to remain useful, their integrity and authenticity must be protected over their entire life span. Also,...

    Provided By Technische Universitat Clausthal

  • White Papers // Oct 2012

    Entangled Cloud Storage

    The terminology "Cloud Computing" refers to a paradigm shift in which applications from a server are executed and managed through a client's web browser, with no installed client version of an application required. This new paradigm - also known as the software as a service paradigm - has generated new...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2012

    Long Term Confidentiality: A Survey

    Consider the following scenario: Alice encrypts her data today using the most trusted computationally secure cryptosystem. An adversary Eve gains access to the encrypted data and stores it in a safe place. Sensitive electronic data may be required to remain confidential for long periods of time. Yet encryption under a...

    Provided By Technische Universitat Clausthal

  • White Papers // Apr 2012

    SmartTokens: Delegable Access Control with NFC-Enabled Smartphones

    Today's smartphones and tablets offer compelling computing and storage capabilities enabling a variety of mobile applications with rich functionality. The integration of new interfaces, in particular Near Field Communication (NFC) opens new opportunities for new applications and business models, as the most recent trend in industry for payment and ticketing...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2012

    Modular Design and Analysis Framework for Multi-Factor Authentication and Key Exchange

    An authentication factor is used to produce some evidence that an entity at the end of the communication channel is the one which it claims to be. Modern computer security knows different types of authentication factors, all of which are widely used in practice. Their standard classification considers three main...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2012

    PUFs: Myth, Fact or Busted? a Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon

    Physically Unclonable Functions (PUFs) are an emerging technology and have been proposed as central building blocks in a variety of cryptographic protocols and security architectures. However, the security features of PUFs are still under investigation: evaluation results in the literature are difficult to compare due to varying test conditions, different...

    Provided By Technische Universitat Clausthal

  • White Papers // Jul 2012

    A Publicly-Verifiable Mix-Net with Everlasting Privacy Towards Observers

    In this paper, the authors present a novel, publicly verifiable mixing scheme which has everlasting privacy towards observers: all the information published on the bulletin board by the mixes (audit information etc) reveals no information about the identity of any of the messages published. The correctness of the mixing process...

    Provided By Technische Universitat Clausthal

  • White Papers // Sep 2013

    Optimal Parameters for XMSS

    The authors introduce Multi Tree XMSS (XMSSMT), a hash-based signature scheme that can be used to sign a virtually unlimited number of messages. It is provably forward and hence EU-CMA secure in the standard model and improves key and signature generation times compared to previous schemes. XMSSMT has - like...

    Provided By Technische Universitat Clausthal

  • White Papers // Mar 2013

    W-OTS+ - Shorter Signatures for Hash-Based Signature Schemes

    Digital signatures are among the most important cryptographic primitives in practice. They have many applications, including the use in SSL/TLS and securing software updates. Hash-based or Merkle Signature Schemes (MSS) are an interesting alternative to the signature schemes used today, not only because they are assumed to resist quantum computer...

    Provided By Technische Universitat Clausthal