Options
Hogrefe, Dieter
Loading...
Preferred name
Hogrefe, Dieter
Official Name
Hogrefe, Dieter
Alternative Name
Hogrefe, D.
Hogrefe, D
Main Affiliation
Now showing 1 - 3 of 3
2015Journal Article [["dc.bibliographiccitation.firstpage","19560"],["dc.bibliographiccitation.issue","8"],["dc.bibliographiccitation.journal","Sensors"],["dc.bibliographiccitation.lastpage","19582"],["dc.bibliographiccitation.volume","15"],["dc.contributor.author","Alfandi, Omar"],["dc.contributor.author","Bochem, Arne"],["dc.contributor.author","Kellner, Ansgar"],["dc.contributor.author","Goege, Christian"],["dc.contributor.author","Hogrefe, Dieter"],["dc.date.accessioned","2018-11-07T09:53:38Z"],["dc.date.available","2018-11-07T09:53:38Z"],["dc.date.issued","2015"],["dc.description.abstract","Securing communications in wireless sensor networks is increasingly important as the diversity of applications increases. However, even today, it is equally important for the measures employed to be energy efficient. For this reason, this publication analyzes the suitability of various cryptographic primitives for use in WSNs according to various criteria and, finally, describes a modular, PKI-based framework for confidential, authenticated, secure communications in which most suitable primitives can be employed. Due to the limited capabilities of common WSN motes, criteria for the selection of primitives are security, power efficiency and memory requirements. The implementation of the framework and the singular components have been tested and benchmarked in our testbed of IRISmotes."],["dc.identifier.doi","10.3390/s150819560"],["dc.identifier.isi","000360906500089"],["dc.identifier.pmid","26266413"],["dc.identifier.purl","https://resolver.sub.uni-goettingen.de/purl?gs-1/12146"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/36367"],["dc.notes.intern","Merged from goescholar"],["dc.notes.status","zu prüfen"],["dc.notes.submitter","Najko"],["dc.publisher","Mdpi Ag"],["dc.relation.issn","1424-8220"],["dc.rights","CC BY 4.0"],["dc.rights.uri","https://creativecommons.org/licenses/by/4.0/"],["dc.title","Secure and Authenticated Data Communication in Wireless Sensor Networks"],["dc.type","journal_article"],["dc.type.internalPublication","yes"],["dc.type.peerReviewed","yes"],["dc.type.status","published"],["dc.type.version","published_version"],["dspace.entity.type","Publication"]]Details DOI PMID PMC WOS2012Journal Article [["dc.bibliographiccitation.firstpage","385"],["dc.bibliographiccitation.issue","4"],["dc.bibliographiccitation.journal","Journal of Communications and Networks"],["dc.bibliographiccitation.lastpage","395"],["dc.bibliographiccitation.volume","14"],["dc.contributor.author","Shehadeh, Youssef El Hajj"],["dc.contributor.author","Alfandi, Omar"],["dc.contributor.author","Hogrefe, Dieter"],["dc.date.accessioned","2018-11-07T09:07:32Z"],["dc.date.available","2018-11-07T09:07:32Z"],["dc.date.issued","2012"],["dc.description.abstract","This paper tackles the problem of generating shared secret keys based on the physical characteristics of the wireless channel. We propose intelligent quantization mechanisms for key generation, achieving high secret bits generation rate. Moreover, some practical issues affecting the performance of the key generation mechanism are deeply investigated. Mainly, we investigate the effects of delay and mobility on the performance and we enhance the key generation mechanism accordingly. As a result, this paper presents a framework towards robust key generation from multipath wireless channels."],["dc.identifier.isi","000308463100005"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/25819"],["dc.notes.status","zu prüfen"],["dc.notes.submitter","Najko"],["dc.publisher","Korean Inst Communications Sciences (k I C S)"],["dc.relation.issn","1229-2370"],["dc.title","Towards Robust Key Extraction from Multipath Wireless Channels"],["dc.type","journal_article"],["dc.type.internalPublication","yes"],["dc.type.peerReviewed","yes"],["dc.type.status","published"],["dspace.entity.type","Publication"]]Details WOS2011Conference Paper [["dc.bibliographiccitation.firstpage","1"],["dc.bibliographiccitation.lastpage","6"],["dc.contributor.author","Al-shadly, Saleh"],["dc.contributor.author","Alfandi, Omar"],["dc.contributor.author","Brosenne, Henrik"],["dc.contributor.author","Hogrefe, Dieter"],["dc.date.accessioned","2019-07-29T12:45:25Z"],["dc.date.available","2019-07-29T12:45:25Z"],["dc.date.issued","2011"],["dc.description.abstract","This paper presents a formal analysis of an authentication handover framework. The framework provides a fast re-authentication mechanism to authenticate a mobile node that moves through different domains without the need to communicate with the home domain. We model the protocol using the high level protocol specification language (HLPSL) and we verify our model using the AVISPA model checking tool. Two main security properties are checked: authenticity and secrecy. We consider different scenarios in order to verify the protocol. Our results show that the protocol fulfills its requirements in almost all tested scenarios."],["dc.identifier.doi","10.1109/ICCCN.2011.6005785"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/62142"],["dc.language.iso","en"],["dc.relation.conference","20th International Conference on Computer Communications and Networks (ICCCN)"],["dc.relation.eventend","2011-08-04"],["dc.relation.eventlocation","Maui, HI, USA"],["dc.relation.eventstart","2011-07-31"],["dc.relation.isbn","978-1-4577-0637-0"],["dc.relation.ispartof","2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN)"],["dc.title","Security Verification of Trust-Based Authentication Handover in IP Networks"],["dc.type","conference_paper"],["dc.type.internalPublication","yes"],["dspace.entity.type","Publication"]]Details DOI