2014
[22] On the Reception of Concurrent Transmissions in Wireless Sensor Networks (Matthias Wilhelm, Vincent Lenders, Jens B. Schmitt), In IEEE Transactions on Wireless Communications, volume 13, 2014. [bibtex] [pdf]
[21] Demonstration Abstract: OpenSky: A Large-scale ADS-B Sensor Network for Research (Matthias Schäfer, Martin Strohmeier, Vincent Lenders, Ivan Martinovic, Matthias Wilhelm), In Proceedings of the 13th International Symposium on Information Processing in Sensor Networks (IPSN '14), IEEE Press, 2014. [bibtex] [pdf]
[20] Bringing Up OpenSky: A Large-scale ADS-B Sensor Network for Research (Matthias Schäfer, Martin Strohmeier, Vincent Lenders, Ivan Martinovic, Matthias Wilhelm), In Proceedings of the 13th International Symposium on Information Processing in Sensor Networks (IPSN '14), IEEE Press, 2014. [bibtex] [pdf]
[19] Detection of Reactive Jamming in DSSS-based Wireless Communications (Michael Spuhler, Domenico Giustiniano, Vincent Lenders, Matthias Wilhelm, Jens Schmitt), In IEEE Transactions on Wireless Communications, volume 13, 2014. [bibtex] [pdf]
2013
[18]Secure Key Generation in Sensor Networks Based on Frequency-selective Channels (Matthias Wilhelm, Ivan Martinovic, Jens Schmitt), In IEEE Journal on Selected Areas in Communications, volume 31, 2013. [bibtex]
[17] An Analytical Model of Packet Collisions in IEEE 802.15.4 Wireless Networks (Matthias Wilhelm, Vincent Lenders, Jens Schmitt), Technical report, TU Kaiserslautern, Kaiserslautern, Germany, 2013. [bibtex] [pdf]
[16] Air Dominance in Sensor Networks: Guarding Sensor Motes using Selective Interference (Matthias Wilhelm, Ivan Martinovic, Jens Schmitt, Vincent Lenders), Technical report, University of Kaiserslautern, Germany, 2013. [bibtex] [pdf]
[15] Detection of Reactive Jamming in DSSS-based Wireless Networks (Domenico Giustiniano, Vincent Lenders, Jens Schmitt, Michael Spuhler, Matthias Wilhelm), In Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13), 2013. [bibtex] [pdf]
2012
[14] A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols (Simon Eberz, Martin Strohmeier, Matthias Wilhelm, Ivan Martinovic), In Proceedings of the 17th European Symposium on Research in Computer Security (ESORICS '12), Springer, 2012. [bibtex] [pdf]
[13] Interference Scripting: Protocol-aware Interference Generation for Repeatable Wireless Testbed Experiments (Matthias Wilhelm, Jens Schmitt), In Proceedings of the 4th Annual Wireless of the Student, by the Student, and for the Student (S3) Workshop, 2012. [bibtex] [pdf]
[12] Practical Message Manipulation Attacks in IEEE 802.15.4 Wireless Networks (Matthias Wilhelm, Jens Schmitt, Vincent Lenders), In MMB & DFT 2012 Workshop Proceedings, 2012. [bibtex] [pdf]
2011
[11] WiSec 2011 Demo: RFReact---A Real-time Capable and Channel-aware Jamming Platform (Matthias Wilhelm, Ivan Martinovic, Jens Schmitt, Vincent Lenders), In SIGMOBILE Mobile Computing and Communications Review, ACM, volume 15, 2011. [bibtex] [pdf] [doi]
[10] WiFire: A Firewall for Wireless Networks (Matthias Wilhelm, Ivan Martinovic, Jens Schmitt, Vincent Lenders), In Proceedings of the ACM SIGCOMM 2011 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM '11), ACM, 2011. [bibtex] [pdf]
[9] Reactive Jamming in Wireless Networks: How Realistic is the Threat? (Matthias Wilhelm, Ivan Martinovic, Jens Schmitt, Vincent Lenders), In Proceedings of the Fourth ACM Conference on Wireless Network Security (WiSec '11), ACM, 2011. [bibtex] [pdf]
2010
[8] SUDOKU: Secure and Usable Deployment of Keys on Wireless Sensors (Matthias Wilhelm, Ivan Martinovic, Ersin Uzun, Jens Schmitt), In Proceedings of the 6th Annual Workshop on Secure Network Protocols (NPSec) in conjunction with IEEE ICNP 2010, IEEE, 2010. [bibtex] [pdf]
[7] Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels: Design, Implementation, and Analysis (Matthias Wilhelm, Ivan Martinovic, Jens Schmitt), Technical report, ArXiv.org, 2010. [bibtex] [pdf]
[6] Secret Keys from Entangled Sensor Motes: Implementation and Analysis (Matthias Wilhelm, Ivan Martinovic, Jens Schmitt), In Proceedings of the ACM Conference on Wireless Network Security (WiSec 2010), ACM Press, 2010. [bibtex] [pdf]
2009
[5] Light-weight Key Generation based on Physical Properties of Wireless Channels (Matthias Wilhelm, Ivan Martinovic, Jens Schmitt), In Proceedings of the 11. Kryptotag der Gesellschaft für Informatik e.V., 2009. [bibtex] [pdf]
[4] On Key Agreement in Wireless Sensor Networks based on Radio Transmission Properties (Matthias Wilhelm, Ivan Martinovic, Jens Schmitt), In Proceedings of the 5th Annual Workshop on Secure Network Protocols (NPSec) in conjunction with IEEE ICNP 2009, IEEE Computer Society, 2009. [bibtex] [pdf]
[3]Bringing law and order to IEEE 802.11 networks -- A case for DiscoSec (Ivan Martinovic, Paul Pichota, Matthias Wilhelm, Frank A. Zdarsky, Jens Schmitt), In Pervasive and Mobile Computing (PMC), Elsevier, volume 5, 2009. [bibtex]
2008
[2] Design, Implementation, and Performance Analysis of DiscoSec -- Service Pack for Securing WLANs (Ivan Martinovic, Paul Pichota, Matthias Wilhelm, Frank A. Zdarsky, Jens Schmitt), In 9th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WOWMOM 2008), 2008. (Accepted as noteworthy contribution) [bibtex] [pdf]
[1] Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless (Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhelm, Christian Wegmann, Jens Schmitt), In Proceedings of the ACM Conference on Wireless Network Security (WiSec 2008), ACM Press, 2008. [bibtex] [pdf]
Go to top