Christian Gottron

Learn More
Mobile peer-to-peer networks combining a mobile ad hoc network underlay with a peer-to-peer overlay offer a flexible means for providing communication services in absence of a communication infrastructure. However, mobile peer-to-peer networks inherit several challenges from the underlying architectures as, e.g., strongly limited resources and a highly(More)
Over the last twenty years, energy conservation has always been of great importance to individuals, societies and decision makers around the globe. As a result, IT researchers have shown a great interest in providing efficient, reliable and easy-to-use IT services which help users saving energy at home by making use of the current advances in Information(More)
Securing the routing service of Mobile Ad-hoc Networks (MANET) is a basic requirement for application scenarios such as emergency response operations. In this paper we analyze the effects of routing attacks on the Ad-hoc On-demand Distance Vector (AODV) protocol. We present results of a testbed-based analysis to consider real-world characteristics of(More)
Understanding and discussing the security aspects of IT systems during their development is challenging for both domain specialists and IT experts - neglecting this aspect leads to communication problems and, eventually, to less secure systems. An important factor for these challenges is the distribution and variety of basic IT security concepts, attacks,(More)
Mobile Ad hoc networks (MANET) and Peer-to-Peer (P2P) networks share central characteristics such as their distributed and decentralized nature. Combining both networking paradigms results in a Mobile Peer-to-Peer (MP2P) system that operates independently from a preexisting infrastructure. Securing MP2P networks in terms of availability and robustness as(More)
Internet access to multimedia content in vehicles today is only possible via cellular networks which offer insufficient bandwidth. By using additional V2X technology in a hybrid manner, vehicles can benefit from additional bandwidth to receive enhanced internet connectivity. We introduce a holistic concept that pursues the vision of an optimal use of(More)
Due to the wide deployment of indoor wireless local area networks (WLANs), the indoor planning became a research of interest for IT as well as networking researchers. As a result of this wide deployment, many IT applications and services started relying on the ready implemented WLAN infrastructure. Therefore, there is a need for reliable propagation models(More)