Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Dagmara Spiewak is active.

Publication


Featured researches published by Dagmara Spiewak.


wireless telecommunications symposium | 2007

Acimn protocol: A protocol for anonymous communication in multi hop wireless networks

Volker Fusenig; Dagmara Spiewak; Thomas Engel

Summary form only given. Anonymity is the state of not being identifiable within a set of subjects. Different strategies exist for assuring anonymity in computer networks, such as the dining cryptographers network and mix networks. But these strategies were designed for wired networks requiring direct communication links or fixed infrastructure. Therefore they are not applicable to multi hop wireless networks without modification. The Acimn protocol bases on the combination of these two main strategies enabling nodes to communicate anonymously among each other. Every node of the network acts as a mix so that the Mix approach can be used to hide the multi hop communication. By using this technique only one message overhead per communication path is generated because of the key establishment among the nodes on the path. During following communications only little computational power is needed by every node on the path to decrypt the messages before forwarding them to the next node. Additionally every one hop communication is kept anonymously by using the DC-net protocol. Therefor the nodes are arranged in groups of at most three members that are in communication range of each other. Sending of messages takes place in rounds where in every round only one group member is able to transmit information but every member has to send data. Because of the maximal group size of three there can be maximally three times more messages compared to the sending without the DC-net approach. By utilizing the combination of both techniques neither non participating eavesdropper nor nodes on the communication path are able to track the communication partners while the overhead is kept small.


wireless telecommunications symposium | 2007

Mobility diversifies Trust: Introducing TrustRings

Dagmara Spiewak; Volker Fusenig; Thomas Engel

Summary form only given. In this paper, we focus on trust establishment in mobile wireless networks and introduce the idea of TrustRings. The concept of TrustRings facilitates the calculation of trust-values for nodes in mobiity networks based on an egocentric network model. Each node concentrates autonomously on the establishment of its own TrustRings by placing itself as the centric node in the middle of the network. Then, it starts building 3-dimensional spheres using the multiple of its own transmission range as the radius of each sphere. The innermost sphere is generated by exactly the transmission range of each node. By further iterating this process, the second sphere is created by using the doubled transmission range and so on. Furthermore, each node maintains a trust-value-database to store the initial-trust-value of other network participants, which results from positive and negative experiences with network participants only within the nodes direct transmission range. After a node has located its communication partner in a specific TrustRing, the initial-trust-value offers the foundation for calculating the nodes trust-values within a specific TrustRing. The main advantage of the proposed model is that it takes the characteristics of mobile networks, such as uncertainty of reliable communication, into account and provides the opportunity to deploy a sophisticated trust model.


AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81 | 2008

Acimn protocol: a protocol for anonymous communication in multi hop wireless networks

Volker Fusenig; Dagmara Spiewak; Thomas Engel


artificial intelligence and symbolic computation | 2008

Acimn: A protocol for Anonymous Communication In Multi hop wireless networks.

Volker Fusenig; Dagmara Spiewak; Thomas Engel


international conference on information security | 2006

Towards a threat model for mobile ad-hoc networks

Dagmara Spiewak; Thomas Engel; Volker Fusenig


Archive | 2007

Applying Trust in Mobile and Wireless Networks

Dagmara Spiewak; Thomas Engel


international conference on information security | 2006

Trusting the Trust-Model in mobile wireless ad-hoc network settings

Dagmara Spiewak; Thomas Engel


Archive | 2010

K-Anonymity in Mobile Ad-Hoc Networks

Dagmara Spiewak


WSEAS TRANSACTIONS on COMMUNICATIONS archive | 2008

The importance of location on trust in mobile networks

Dagmara Spiewak; Volker Fusenig; Thomas Engel


Journal of Research and Practice in Information Technology | 2008

Anonymous Communication in Multi Hop Wireless Networks

Volker Fusenig; Dagmara Spiewak; Thomas Engel

Collaboration


Dive into the Dagmara Spiewak's collaboration.

Top Co-Authors

Avatar

Thomas Engel

University of Luxembourg

View shared research outputs
Top Co-Authors

Avatar

Volker Fusenig

University of Luxembourg

View shared research outputs
Researchain Logo
Decentralizing Knowledge