Hannes Tschofenig

Learn More
—The Internet of Things (IoT) is the next wave of innovation that promises to improve and optimize our daily life based on intelligent sensors and smart objects working together. Through Internet Protocol (IP) connectivity, devices can now be connected to the Internet, thus allowing them to be read, controlled, and managed at any time and at any place.(More)
The General Internet Signaling Transport (GIST) protocol is currently being developed as the base protocol compo-nent in the IETF Next Steps In Signaling (NSIS) protocol stack to support a variety of signaling applications. We present our study on the protocol overhead and performance aspects of GIST. We quantify network-layer protocol overhead and observe(More)
— The Geographic Location/Privacy (geopriv) working group defines the concept of a 'using protocol', a protocol that carries Geopriv location objects. Geopriv also defines various scenarios for the distribution of location objects that require the concept of subscriptions and asynchronous notifications. This document shows the big picture with the alignment(More)
— Current network access protocol stacks consist of a number of layers and components that are only loosely aware of each other. While this provides flexibility, it also results in a number of limitations, including high signaling latency due to duplicated tasks at multiple layers, vulnerabilities, and deployment problems when new components and protocols(More)
The Internet is facing ever-increasing complexity in the construction , configuration and management of heterogeneous networks. New communication paradigms are undermining its original design principles. The mobile Internet demands a level of optimum that is hard to achieve with a strictly-layered protocol stack. Questioning if layering is still an adequate(More)
— The pre-shared key based mechanisms for Transport Layer Security (TLS) were recently standardized by the IETF to extend the set of ciphersuites by utilizing existing key management infrastructures. The benefit of pre-shared based mechanisms is the avoidance or reduction of the cryptographic operations used in public-key based mechanisms. However, so far(More)
This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Helsinki University of Technology's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for(More)
The public-key based handshake process of TLS is part of bottleneck that significantly degrades the performance. The pre-shared key based mechanisms for Transport Layer Security were recently standardized by the IETF to extend the existing set of ciphersuites by utilizing existing key management infrastructures. The benefit of the pre-shared based(More)