Dagmara Spiewak
University of Luxembourg
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Dagmara Spiewak.
wireless telecommunications symposium | 2007
Volker Fusenig; Dagmara Spiewak; Thomas Engel
Summary form only given. Anonymity is the state of not being identifiable within a set of subjects. Different strategies exist for assuring anonymity in computer networks, such as the dining cryptographers network and mix networks. But these strategies were designed for wired networks requiring direct communication links or fixed infrastructure. Therefore they are not applicable to multi hop wireless networks without modification. The Acimn protocol bases on the combination of these two main strategies enabling nodes to communicate anonymously among each other. Every node of the network acts as a mix so that the Mix approach can be used to hide the multi hop communication. By using this technique only one message overhead per communication path is generated because of the key establishment among the nodes on the path. During following communications only little computational power is needed by every node on the path to decrypt the messages before forwarding them to the next node. Additionally every one hop communication is kept anonymously by using the DC-net protocol. Therefor the nodes are arranged in groups of at most three members that are in communication range of each other. Sending of messages takes place in rounds where in every round only one group member is able to transmit information but every member has to send data. Because of the maximal group size of three there can be maximally three times more messages compared to the sending without the DC-net approach. By utilizing the combination of both techniques neither non participating eavesdropper nor nodes on the communication path are able to track the communication partners while the overhead is kept small.
wireless telecommunications symposium | 2007
Dagmara Spiewak; Volker Fusenig; Thomas Engel
Summary form only given. In this paper, we focus on trust establishment in mobile wireless networks and introduce the idea of TrustRings. The concept of TrustRings facilitates the calculation of trust-values for nodes in mobiity networks based on an egocentric network model. Each node concentrates autonomously on the establishment of its own TrustRings by placing itself as the centric node in the middle of the network. Then, it starts building 3-dimensional spheres using the multiple of its own transmission range as the radius of each sphere. The innermost sphere is generated by exactly the transmission range of each node. By further iterating this process, the second sphere is created by using the doubled transmission range and so on. Furthermore, each node maintains a trust-value-database to store the initial-trust-value of other network participants, which results from positive and negative experiences with network participants only within the nodes direct transmission range. After a node has located its communication partner in a specific TrustRing, the initial-trust-value offers the foundation for calculating the nodes trust-values within a specific TrustRing. The main advantage of the proposed model is that it takes the characteristics of mobile networks, such as uncertainty of reliable communication, into account and provides the opportunity to deploy a sophisticated trust model.
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81 | 2008
Volker Fusenig; Dagmara Spiewak; Thomas Engel
artificial intelligence and symbolic computation | 2008
Volker Fusenig; Dagmara Spiewak; Thomas Engel
international conference on information security | 2006
Dagmara Spiewak; Thomas Engel; Volker Fusenig
Archive | 2007
Dagmara Spiewak; Thomas Engel
international conference on information security | 2006
Dagmara Spiewak; Thomas Engel
Archive | 2010
Dagmara Spiewak
WSEAS TRANSACTIONS on COMMUNICATIONS archive | 2008
Dagmara Spiewak; Volker Fusenig; Thomas Engel
Journal of Research and Practice in Information Technology | 2008
Volker Fusenig; Dagmara Spiewak; Thomas Engel