30.01.2014 Views

Annual Report 2010 - Fachgruppe Informatik an der RWTH Aachen ...

Annual Report 2010 - Fachgruppe Informatik an der RWTH Aachen ...

Annual Report 2010 - Fachgruppe Informatik an der RWTH Aachen ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

novel concept for Wi-Fi sharing communities. Mobile Access sp<strong>an</strong>s a number of problem<br />

domains r<strong>an</strong>ging from networking <strong>an</strong>d network security to application design <strong>an</strong>d paradigms<br />

for disruption-toler<strong>an</strong>t mobile applications. The heart of Mobile ACcess' security <strong>an</strong>d network<br />

components is the PISA Internet sharing architecture (see above).<br />

Mobile ACcess: Authentication of Mobile Devices <strong>an</strong>d infrastructure <strong>an</strong>d Mobility<br />

M<strong>an</strong>agement<br />

René Hummen, Tobias Heer, Klaus Wehrle<br />

Device mobility plays <strong>an</strong> import<strong>an</strong>t role in the Mobile Access scenario. A user’s mobile<br />

device should be able to connect to the community network once <strong>an</strong>d stay connected while<br />

moving as long as network coverage permits. Furthermore, the community-driven aspects of<br />

Mobile Access are based on the provisioning of authenticated access to the Internet through<br />

trusted entities within the community network in a decentralized fashion. In or<strong>der</strong> to enable<br />

both node mobility <strong>an</strong>d node authentication, we maintain <strong>an</strong> implementation of the Host<br />

Identity Protocol (HIP) called HIP for Linux (HIPL). Our research focuses on achieving fast<br />

h<strong>an</strong>dovers <strong>an</strong>d on developing protocol extensions that allow for efficient in-network<br />

establishment of authenticity of the communicating peers <strong>an</strong>d their generated data streams.<br />

Mobile ACcess: User-provided Services for Mobile Devices<br />

H<strong>an</strong>no Wirtz, Tobias Heer, Klaus Wehrle<br />

The proliferation of powerful mobile devices turns users that previously only acted as clients<br />

in a network into potential service provi<strong>der</strong>s. For example, cameras, GPS-modules <strong>an</strong>d<br />

powerful CPUs provide input sources as well as computational resources on mobile devices.<br />

In our research, we investigate whether mobile users with such devices c<strong>an</strong> act as service<br />

provi<strong>der</strong>s to other users in a municipal Wi-Fi network such as Mobile ACcess. Furthermore,<br />

the appropriate infrastructure <strong>an</strong>d security <strong>an</strong>d privacy concerns are the focus of our work.<br />

Mobile Access: Wi-Fi based user localization<br />

Nicolai Viol, Klaus Wehrle<br />

The ability to dynamically adapt information <strong>an</strong>d contend of applications respectively to the<br />

users position is the key feature of novel, so called location aware services. However,<br />

167

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!