In this paper, we revisit the use of honeypots for detecting reflective
...
Security is essential for the Internet of Things (IoT). Cryptographic
op...
Embedded digital devices, such as Field-Programmable Gate Arrays (FPGAs)...
In this paper, we revisit the performance of the QUIC connection setup a...
The IPv6 over Bluetooth Low Energy (BLE) standard defines the transfer o...
In this paper, we study the potentials of passive measurements to gain
a...
Connecting long-range wireless networks to the Internet imposes challeng...
IoT devices differ widely in crypto-supporting hardware, ranging from no...
In this paper, we present the design, implementation, and analysis of DN...
The critical remote-code-execution (RCE) Log4Shell is a severe vulnerabi...
This paper presents LoRa-ICN, a comprehensive IoT networking system base...
Constrained devices on the Internet of Things (IoT) continuously produce...
LoRa is a popular wireless technology that enables low-throughput (bytes...
Large-scale Internet scans are a common method to identify victims of a
...
In this paper, we revisit the open DNS (ODNS) infrastructure and, for th...
When the global rollout of the DNS Security Extensions (DNSSEC) began in...
In this paper, we present first measurements of Internet background radi...
In this paper, we shed new light on the DNS amplification ecosystem, by
...
Security in the Internet of Things (IoT) requires ways to regularly upda...
Developing an operating system (OS) for low-end embedded devices require...
Content replication to many destinations is a common use case in the Int...
Clock configuration within constrained general-purpose microcontrollers ...
During disasters, crisis, and emergencies the public relies on online
se...
Security and trust are essential building blocks for the emerging Intern...
The emerging Internet of Things (IoT) challenges the end-to-end transpor...
IP spoofing enables reflection and amplification attacks, which cause ma...
Energy-constrained sensor nodes can adaptively optimize their energy
con...
Bluetooth (BT) mesh is a new mode of BT operation for low-energy devices...
Quality of Service (QoS) in the IP world mainly manages forwarding resou...
This paper evaluates two forwarding strategies for fragmented datagrams ...
Industrial control systems (ICS) are managed remotely with the help of
d...
Reproducibility is one of the key characteristics of good science, but h...
Information Centric Networking is considered a promising communication
t...
Industrial production plants traditionally include sensors for monitorin...
In this paper, we analyze the evolution of Certificate Transparency (CT)...
This paper takes a comprehensive view on the protocol stacks that are un...
This paper revisits NDN deployment in the IoT with a special focus on th...
The Internet of Things (IoT) is rapidly evolving based on low-power comp...