Home > Research > Researchers > Professor Utz Roedig > Publications

Professor Utz Roedig

Formerly at Lancaster University

  1. Other
  2. Published

    Demo Abstract: Home Jamming

    Brown, J., Bagci, I. E., King, A. & Roedig, U., 13/02/2013.

    Research output: Contribution to conference - Without ISBN/ISSN Otherpeer-review

  3. Published

    Demo Abstract: GinLITE - A MAC Protocol for Real-Time Sensor Networks

    Brown, J. & Roedig, U., 15/02/2012.

    Research output: Contribution to conference - Without ISBN/ISSN Otherpeer-review

  4. Abstract
  5. Published

    Atomic-scale authentication with Resonant Tunnelling Diodes

    Roberts, J., Bagci, I. E., Zawawi, M. A. M., Sexton, J., Hulbert, N., Noori, Y., Woodhead, C., Missous, M., Migliorato, M. A., Roedig, U. & Young, R., 27/07/2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  6. Published

    Atomic-scale authentication using imperfect semiconductor structures

    Roberts, J., Bagci, I. E., Hulbert, N., Young, M., Woodhead, C., Noori, Y., Mogg, L., Migliorato, M. A., Missous, M., Roedig, U. & Young, R., 1/07/2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  7. Published

    Quantum authentication

    Roberts, J., Bagci, I. E., Hulbert, N., Young, M., Woodhead, C., Noori, Y., Mogg, L., Migliorato, M., Missous, M., Roedig, U. & Young, R., 15/01/2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  8. Poster
  9. Published

    Smart Speaker Privacy Control - Acoustic Tagging for Personal Voice Assistants

    Cheng, P., Bagci, I., Yan, J. & Roedig, U., 20/05/2019. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  10. Published

    Quantum Confinement in Security Elements

    McGrath, T., Bernardo Gavito, R., Bagci, I. E., Wang, C., Astbury, B., Young, R. J. & Roedig, U., 9/09/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  11. Published

    Using context switches for VM scaling

    Hadley, J., Roedig, U. & Elkhatib, Y., 9/12/2016. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  12. Published

    Who are you? Proving your identity with physics

    Roberts, J., Bagci, I. E., Hulbert, N., Young, M., Woodhead, C., Noori, Y., Mogg, L., Migliorato, M., Missous, M., Roedig, U. & Young, R., 14/12/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  13. Published

    OpenCL as Wireless Sensor Network programming abstraction

    Bor, M. & Roedig, U., 12/05/2014. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  14. Published

    Network Coding with Limited Overhearing

    Samarasinghe, K., Voigt, T., Mottola, L. & Roedig, U., 23/02/2011.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  15. Published

    GINSENG: Performance Control in Wireless Sensor Networks

    Brown, J., Roedig, U., O’Donovan, T., Sreenan, C. J., He, Z., Voigt, T., Pottner, B., Wolf, L., Klein, A., Silva, J. S., Vassiliou, V. & doO, J., 1/02/2011, p. 51-52. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  16. Published

    An Implementation of Distance-Based Message Authentication for WSNs

    Chung, A. & Roedig, U., 02/2010.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  17. Published

    A MAC Protocol for Industrial Process Automation and Control

    Suriyachai, P., Brown, J. & Roedig, U., 02/2010.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  18. Published

    Performance Control in Wireless Sensor Networks

    Sreenan, C., Roedig, U., Brown, J., Boano, C. A., Dunkels, A., He, Z., Voigt, T., Vassiliou, V., Silva, J. S., Wolf, L., Wellnitz, O., Eiras, R., Hackenbroich, G., Klein, A. & Agrawal, D., 06/2009.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  19. Published

    Combining Positioning and Communication Using Ultra Wideband Transceivers

    Alcock, P. & Roedig, U., 11/02/2009.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  20. Published

    DHB-KEY - A Diffie-Hellman Key Distribution Protocol for Wireless Sensor Networks

    Chung, A. & Roedig, U., 01/2008.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  21. Published

    Implementation of a Deterministic Wireless Sensor Network

    Suriyachai, P., Roedig, U. & Scott, A., 01/2008.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  22. Published

    Efficient Key Establishment for Wireless Sensor Networks Using Elliptic Curve Diffie-Hellman

    Chung, A. & Roedig, U., 10/2007.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  23. Published

    A Generic Hand-Over Framework for 4G Networks

    Roedig, U. & Sreenan, C. J., 10/2006.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  24. Published

    Optimized usage of network resources based on context information

    Roedig, U. & Sreenan, C. J., 1/10/2003.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  25. Conference paper
  26. Published

    Pains, Gains and PLCs: Ten Lessons from Building an Industrial Control Systems Testbed for Security Research

    Green, B., Le, A. T., Antrobus, R., Roedig, U., Hutchison, D. & Rashid, A., 14/08/2017. 8 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  27. Published

    Demo Abstract: How temperature affects IoT communication

    Brown, J., Roedig, U., Boano, C. A., Romer, K. & Tsiftes, N., 02/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  28. Published

    Hot packets: a systematic evaluation of the effect of temperature on low power wireless transceivers

    Boano, C. A., Wennerstrom, H., Zuniga, M. A., Brown, J., Keppitiyagama, C., Oppermann, F. J., Roedig, U., Norden, L-A., Voigt, T. & Roemer, K., 08/2013.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  29. Published

    Codo: confidential data storage for wireless sensor networks

    Bagci, I. E., Raza, S., Roedig, U. & Voigt, T., 8/10/2012.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  30. Published

    Wireless sensor networking in E-NEXT

    Sreenan, C. J. & Roedig, U., 1/02/2005.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  31. Other chapter contribution
  32. Published

    IP-Telefonie: Protokolle, Herausforderungen, Loesungen und kritische Analyse der Sicherheit

    Steinmetz, R., Ackermann, R., Roedig, U., Goertz, M. & Schumacher, M., 1/01/2002, IP-Plattform fuer moderne Kommunikation: Presentation Series - Arbeitsgemeinschaft des VDE Rhein-Main. Arbeitsgemeinschaft des VDE Rhein-Main, p. 57-77 21 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  33. Conference contribution/Paper
  34. Published

    Adversarial Machine Learning in Smart Energy Systems

    Bor, M., Marnerides, A., Molineux, A., Wattam, S. & Roedig, U., 25/06/2019, e-Energy '19 Proceedings of the Tenth ACM International Conference on Future Energy Systems. New York: ACM, p. 413-415 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  35. Published

    Smart Speaker Privacy Control - Acoustic Tagging for Personal Voice Assistants

    Cheng, P., Bagci, I. E., Yan, J. & Roedig, U., 23/05/2019, SafeThings 2019 : IEEE Workshop on the Internet of Safe Things. IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  36. Published

    Optically Interrogated Unique Object with Simulation Attack Prevention

    Marcinkevicius, P., Bagci, I. E., Abdelazim, N. M. S. I., Woodhead, C. S., Young, R. J. & Roedig, U., 25/03/2019, 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, p. 198-203 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  37. Published

    Towards Reactive Acoustic Jamming for Personal Voice Assistants

    Cheng, P., Bagci, I. E., Yan, J. & Roedig, U., 15/10/2018, 2nd International Workshop on Multimedia Privacy and Security. ACM Press, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  38. Published

    LASARUS: Lightweight Attack Surface Reduction for Legacy Industrial Control Systems

    Le, A. T., Roedig, U. & Rashid, A., 4/07/2017, Engineering Secure Software and Systems: 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings. Bodden, E., Payer, M. & Athanasopoulos, E. (eds.). Cham: Springer, p. 36-52 17 p. (Lecture Notes in Computer Science; vol. 10379).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  39. Published

    LoRa Transmission Parameter Selection

    Bor, M. & Roedig, U., 5/06/2017, 2017 13th International Conference on Distributed Computing in Sensor Systems (DCOSS). IEEE, p. 27-34 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  40. Published

    Mitigating Inter-Network Interference in LoRa Networks

    Voigt, T., Bor, M., Roedig, U. & Alonso, J., 20/02/2017, EWSN ’17 Proceedings of the 2017 International Conference on Embedded Wireless Systems and Networks. New York: ACM Press, p. 323-328 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  41. Published

    A Distributed Caching Approach for Improved Data Availability in Rural Wireless Mesh Networks

    Ajayi, A. O., Edwards, C. J. & Roedig, U., 16/12/2016, Computational Science and Computational Intelligence (CSCI), 2016 International Conference on. 16772962: IEEE, p. 904 - 910 7 p. 16772962

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  42. Published

    Do LoRa low-power wide-area networks scale?

    Bor, M., Roedig, U., Voigt, T. & Alonso, J., 14/11/2016, MSWiM '16 Proceedings of the 19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems. New York: ACM Press, p. 59-67 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  43. Published

    LoRa for the Internet of Things

    Bor, M., Vidler, J. E. & Roedig, U., 15/02/2016, EWSN '16 Proceedings of the 2016 International Conference on Embedded Wireless Systems and Networks. Canada: Junction Publishing, p. 361-366 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  44. Published

    Poster: RI-MAC enhancements for interference resilience

    King, A. & Roedig, U., 2016, Proceedings of the 2016 International Conference on Embedded Wireless Systems and Networks. USA: Junction Publishing, p. 283-284 2 p. (EWSN '16).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  45. Published

    Competition: ContikiMAC with differentiating clear channel assessment

    King, A., Hadley, J. & Roedig, U., 2016, Proceedings of the 2016 International Conference on Embedded Wireless Systems and Networks. USA: Junction Publishing, p. 301-302 2 p. (EWSN '16).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  46. Published

    Using Channel State Information for Tamper Detection in the Internet of Things

    Bagci, I. E., Roedig, U., Martinovic, I., Schulz, M. & Hollick, M., 5/12/2015, ACSAC 2015 Proceedings of the 31st Annual Computer Security Applications Conference. New York: ACM, p. 131-140 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  47. Published

    MultiBox: lightweight containers for vendor-independent multi-cloud deployments

    Hadley, J., El Khatib, Y., Blair, G. & Roedig, U., 21/11/2015, Embracing Global Computing in Emerging Economies: First Workshop, EGC 2015, Almaty, Kazakhstan, February 26-28, 2015. Proceedings. Horne, R. (ed.). Springer Verlag, p. 79-90 12 p. (Communications in Computer and Information Science ; vol. 514).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  48. Published

    Estimating node lifetime in interference environments

    King, A., Brown, J., Vidler, J. & Roedig, U., 26/10/2015, Local Computer Networks Conference Workshops (LCN Workshops), 2015 IEEE 40th. IEEE, p. 796-803 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  49. Published

    DCCA: Differentiating Clear Channel Assessment for improved 802.11/802.15.4 coexistence

    King, A., Brown, J. & Roedig, U., 1/10/2014, 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, p. 45-50 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  50. Published

    Socio-technical security analysis of Industrial Control Systems (ICS)

    Green, B., Prince, D., Roedig, U., Busby, J. & Hutchison, D., 11/09/2014, 2nd International Symposium for ICS & SCADA Cyber Security Research 2014. Janicke, H. (ed.). Swindon: BCS Learning and Development Limited, p. 10-14 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  51. Published

    Estimating packet reception rate in noisy environments

    Brown, J., Roedig, U., Boano, C. A. & Roemer, K., 8/09/2014, Proceedings of the 39rd IEEE Conference on Local Computer Networks, 2014. LCN 2014. IEEE, p. 583-591 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  52. Published

    A survey of rural Wireless Mesh Network (WMN) deployments

    Ajayi, A. O., Roedig, U., Edwards, C. & Race, N., 28/08/2014, Wireless and Mobile, 2014 IEEE Asia Pacific Conference on. IEEE, p. 119-125 7 p. 14664869

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  53. Published

    Short paper: gathering tamper evidence in wi-fi networks based on channel state information

    Bagci, I. E., Roedig, U., Schulz, M. & Hollick, M., 23/07/2014, WiSec '14 Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks. New York: ACM Press, p. 183-188 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  54. Published

    TempLab: a testbed infrastructure to study the impact of temperature on wireless sensor networks

    Boano, C. A., Zuniga, M. A., Brown, J., Roedig, U., Keppitiyagama, C. & Roemer, K., 15/04/2014, Proceedings of the 13th International Conference on Information Processing in Sensor Networks (IPSN '14). New York: ACM, p. 95-106 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  55. Published

    Demo abstract: A testbed infrastructure to study the impact of temperature on WSN

    Boano, C. A., Roemer, K., Brown, J., Roedig, U. & Zúñiga, M. A., 24/03/2014, Pervasive Computing and Communications Workshops (PERCOM Workshops), 2014 IEEE International Conference on. IEEE, p. 154-156 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  56. Published

    Neighborhood watch: on network coding throughput and key sharing

    Strohmeier, M., Martinovic, I., Roedig, U., Defrawy, K. E. & Schmitt, J., 9/12/2013, Global Communications Conference (GLOBECOM), 2013 IEEE . IEEE Xplore, p. 849-854 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top