Browsing Fakultät für Mathematik und Informatik (inkl. GAUSS) by Advisor "Hogrefe, Dieter Prof. Dr."
Now showing items 1-20 of 28
-
Service-Differentiated Cooperative Routing in the Internet of Things
(2023-11-06)The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) was designed to operate with different Internet of Things (IoT) applications ranging from regular, to critical, to alarm/sporadic. That is due to its ability ... -
Secure Localization in Wireless Sensor Networks
(2022-05-10)With the growing popularity of the Internet of Things, Wireless Sensor Networks also only grow more and more common in various different forms. However, sensor data is often only useful in connection with information about ... -
Smart Road Danger Detection and Warning
(2021-11-22)Road dangers have caused numerous accidents, thus detecting them and warning users are critical to improving traffic safety. However, it is challenging to recognize road dangers from numerous normal data and warn road users ... -
The M2X Economy – Concepts for Business Interactions, Transactions and Collaborations Among Autonomous Smart Devices
(2020-01-07)Nowadays, business transactions almost exclusively focus on human-to-human transactions. The persistent growth and expansion of the Internet of Things, the ubiquitousness of so called smart devices, as well as progressing ... -
Conditional Privacy-Preserving Authentication Protocols for Vehicular Ad Hoc Networks
(2019-06-12)The Conditional Privacy-Preserving Authentication (CPPA) protocol has applications in the construction of secure Vehicular Ad hoc Networks (VANETs) due to its capability to achieve both privacy preservation and authentication ... -
A Security Aware Fuzzy Enhanced ACO Routing Protocol in MANETs
(2018-12-20)As Mobile Ad hoc NETworks (MANETs) grow more popular and are deployed as solutions in various applications such as road safety in Vehicular Ad hoc NETworks (VANETs), wildlife tracking in Wireless Sensor Networks (WSNs) and ... -
On Localization Issues of Mobile Devices
(2018-11-05)Mobile devices, such as sensor nodes, smartphones and smartwatches, are now widely used in many applications. Localization is a highly important topic in wireless networks as well as in many Internet of Things applications. ... -
Secure Routing in Intelligent Device-to-Device Communications
(2016-12-02)Device-to-Device (D2D) communications have received exceptional attention nowadays due to the overabundance number of applications and services. Therefore, D2D is expected to be a vital technical component in Internet of ... -
Efficient Range-Free Monte-Carlo-Localization for Mobile Wireless Sensor Networks
(2015-12-03)A major problem of localization algorithms for Wireless Sensor Networks (WSNs) is the dependence on anchor information. In mobile networks, single node or even whole parts of the network might be temporarily isolated from ... -
Enhancing Personalization and Learner Engagement in Context-aware Learning Environment - A Pedagogical and Technological Perspective
(2015-10-08)Context-aware technologies promise great potential in technology enhanced learning (TEL). However, as transformation arises in educational set up as a result of the use of context-aware technologies, so is the challenge ... -
Towards a Lightweight, Secure, and Untraceable RFID Authentication Protocol
(2015-09-11)This dissertation tackles the problem of user privacy and security of transactions in the authentication protocols of the technology of Radio-frequency identification (RFID). Radio-frequency identification is ubiquitously ... -
A Study of VoIP Performance in Anonymous Network - The Onion Routing (Tor)
(2014-06-23)Information technology is developing rapidly, especially in the field of computer science, telecommunications and information systems. In the early days of telecommunications, voice networks could not be combined with data ... -
Verification of Security Properties Using Formal Techniques
(2014-02-12)Nowadays, the necessity of developing collaborative and distributed computing systems makes networks, and specially Internet, the key element of the system design process. Several new applications have been appeared in ... -
"Route Record Distance Vector Protocol for Minimization of Intra-Flow Interference"
(2013-11-05)The performance of wireless multi-hop networks is negatively affected by interference between neighbouring links on the same channel. Especially intra-flow interference degrades network performance to a high degree. To ... -
"Security at the Physical and MAC Layers in Wireless Networks"
(2013-04-18)The main objective of this dissertation is to investigate security solutions and issues at the lower layers in wireless networks. In the first part, the potential of the physical layer in providing security solutions ... -
A Bio-Inspired Autonomous Authentication Mechanism in Mobile Ad Hoc Networks
(2012-12-21)A Mobile Ad hoc NETwork (MANET) is an infrastructureless self-configuring network in that nodes themselves create and manage the network in a self-organized manner. Nodes can communicate only with their neighbors that ... -
Anonymity and Privacy in Wireless Mobile Ad Hoc Networks
(2012-11-21)Privacy has become a necessary property of networks as being considered as an important aspect of security by both network providers and customers. Privacy in general means to conceal one's personal information from others ... -
A Multi-objective Ant Colony Optimisation-based Routing Approach for Wireless Sensor Networks Incorporating Trust
(2012-08-31)In the near future, Wireless Sensor Networks (WSNs) are expected to play an important role for sensing applications, in the civilian as well as in the military sector. WSNs are autonomous, distributed, self-organised ... -
Informatik für Alle - wie viel Programmierung braucht der Mensch?
(2009-11-23)This paper develops a didactical frame to start programming for all highschool-students. This frame is filled with content from computer science and methological aspects. -
Processing and Extending Flow-Based Network Traffic Measurements
(2009-07-07)With the increasing usage of the Internet and IP networks for critical applications, network monitoring becomes more important. Flow-profiling is currently the most common measurement ...