Skip to main content

Showing 1–7 of 7 results for author: Vucinic, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.07444  [pdf, other

    cs.CR

    EDHOC is a New Security Handshake Standard: An Overview of Security Analysis

    Authors: Elsa López Pérez, Inria Göran Selander, John Preuß Mattsson, Thomas Watteyne, Mališa Vučinić

    Abstract: The paper wraps up the call for formal analysis of the new security handshake protocol EDHOC by providing an overview of the protocol as it was standardized, a summary of the formal security analyses conducted by the community, and a discussion on open venues for future work.

    Submitted 10 July, 2024; originally announced July 2024.

    Journal ref: IEEE Computer Society, 2024

  2. arXiv:2101.07541  [pdf

    cs.NI

    Sniffing Multi-hop Multi-channel Wireless Sensor Networks

    Authors: Jelena Kovač, Jovan Crnogorac, Enis Kočan, Malisa Vucinic

    Abstract: As wireless sensor networks grow larger, more complex and their role more significant, it becomes necessary to have an insight into the network traffic. For this purpose, sniffers play an irreplaceable role. Since a sniffer is a device of limited range, to cover a multi-hop network it is necessary to consider the deployment of multiple sniffers. This motivates the research on the optimal number an… ▽ More

    Submitted 19 January, 2021; originally announced January 2021.

    Comments: 2020 28th Telecommunications Forum (TELFOR), Nov 2020, Belgrade, Serbia

  3. Multiple Redundancy Constants with Trickle

    Authors: Titouan Coladon, Malisa Vucinic, Bernard Tourancheau

    Abstract: Wireless sensor network protocols very often use the Trickle algorithm to govern information dissemination. For example, the widely used IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) uses Trickle to emit control packets. We derive an analytical model of Trickle to take into account multiple redundancy constants and the common lack of synchronization among nodes. Moreover, we demonst… ▽ More

    Submitted 21 July, 2015; originally announced July 2015.

    Comments: International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC - 2015), IEEE, IEEE, 2015, http://pimrc2015.eee.hku.hk/index.html

  4. arXiv:1507.05810  [pdf, other

    cs.NI

    DTLS Performance in Duty-Cycled Networks

    Authors: Malisa Vucinic, Bernard Tourancheau, Thomas Watteyne, Franck Rousseau, Andrzej Duda, Roberto Guizzetti, Laurent Damon

    Abstract: The Datagram Transport Layer Security (DTLS) protocol is the IETF standard for securing the Internet of Things. The Constrained Application Protocol, ZigBee IP, and Lightweight Machine-to-Machine (LWM2M) mandate its use for securing application traffic. There has been much debate in both the standardization and research communities on the applicability of DTLS to constrained environments. The main… ▽ More

    Submitted 21 July, 2015; originally announced July 2015.

    Comments: International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC - 2015), IEEE, IEEE, 2015, http://pimrc2015.eee.hku.hk/index.html

  5. arXiv:1404.7803  [pdf, other

    cs.NI

    Topology Construction in RPL Networks over Beacon-Enabled 802.15.4

    Authors: Malisa Vucinic, Gabriele Romaniello, Laurene Guelorget, Bernard Tourancheau, Franck Rousseau, Olivier Alphand, Andrzej Duda, Laurent Damon

    Abstract: In this paper, we propose a new scheme that allows coupling beacon-enabled IEEE 802.15.4 with the RPL routing protocol while kee** full compliance with both standards. We provide a means for RPL to pass the routing information to Layer 2 before the 802.15.4 topology is created by encapsulating RPL DIO messages in beacon frames. The scheme takes advantage of 802.15.4 command frames to solicit RPL… ▽ More

    Submitted 30 April, 2014; originally announced April 2014.

    Journal ref: 19th IEEE Symposium on Computers and Communications (IEEE ISCC 2014) (2014)

  6. arXiv:1404.7799  [pdf, other

    cs.NI cs.CR

    OSCAR: Object Security Architecture for the Internet of Things

    Authors: Malisa Vucinic, Bernard Tourancheau, Franck Rousseau, Andrzej Duda, Laurent Damon, Roberto Guizzetti

    Abstract: Billions of smart, but constrained objects wirelessly connected to the global network require novel paradigms in network design. New protocol standards, tailored to constrained devices, have been designed taking into account requirements such as asynchronous application traffic, need for caching, and group communication. The existing connection oriented security architecture is not able to keep up… ▽ More

    Submitted 30 April, 2014; originally announced April 2014.

    Journal ref: 15th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (IEEE WoWMoM 2014) (2014)

  7. arXiv:1401.0997  [pdf, other

    cs.NI

    Performance Comparison of the RPL and LOADng Routing Protocols in a Home Automation Scenario

    Authors: Malisa Vucinic, Bernard Tourancheau, Andrzej Duda

    Abstract: RPL, the routing protocol proposed by IETF for IPv6/6LoWPAN Low Power and Lossy Networks has significant complexity. Another protocol called LOADng, a lightweight variant of AODV, emerges as an alternative solution. In this paper, we compare the performance of the two protocols in a Home Automation scenario with heterogenous traffic patterns including a mix of multipoint-to-point and point-to-mult… ▽ More

    Submitted 6 January, 2014; originally announced January 2014.

    Journal ref: Wireless Communications and Networking Conference (WCNC), 2013 IEEE (2013)