Christian Rohner
Professor at Department of Information Technology; Division of Computer Systems
- Mobile phone:
- +46 70 167 93 61
- E-mail:
- Christian.Rohner@it.uu.se
- Visiting address:
- Ångströmlaboratoriet, Lägerhyddsvägen 1
- Postal address:
- Box 534
751 21 UPPSALA

Publications
Recent publications
Desynchronized Querying of Analog Backscatter Tags
2025
Security and Privacy for Fat Intra-Body Communication: Mechanisms and Protocol Stack
Part of Proceedings of the 49th IEEE Conference on Local Computer Networks, p. 1-9, 2024
Unlocking the Potential of Low-cost High-resolution Sensing with Analog Backscatter
Part of 2024 IEEE International Conference on RFID (RFID), p. 1-6, 2024
- DOI for Unlocking the Potential of Low-cost High-resolution Sensing with Analog Backscatter
- Download full text (pdf) of Unlocking the Potential of Low-cost High-resolution Sensing with Analog Backscatter
Channel Estimation for Analog Backscatter Tags
Part of RFCom '24, p. 1-7, 2024
- DOI for Channel Estimation for Analog Backscatter Tags
- Download full text (pdf) of Channel Estimation for Analog Backscatter Tags
Quantifying redundancies and synergies with measures of inequality
Part of PLOS ONE, 2024
- DOI for Quantifying redundancies and synergies with measures of inequality
- Download full text (pdf) of Quantifying redundancies and synergies with measures of inequality
All publications
Articles in journal
Quantifying redundancies and synergies with measures of inequality
Part of PLOS ONE, 2024
- DOI for Quantifying redundancies and synergies with measures of inequality
- Download full text (pdf) of Quantifying redundancies and synergies with measures of inequality
Part of Entropy, 2024
- DOI for Non-Negative Decomposition of Multivariate Information: From Minimum to Blackwell-Specific Information
- Download full text (pdf) of Non-Negative Decomposition of Multivariate Information: From Minimum to Blackwell-Specific Information
Decomposing and Tracing Mutual Information by Quantifying Reachable Decision Regions
Part of Entropy, 2023
- DOI for Decomposing and Tracing Mutual Information by Quantifying Reachable Decision Regions
- Download full text (pdf) of Decomposing and Tracing Mutual Information by Quantifying Reachable Decision Regions
Part of Computers & security (Print), 2022
- DOI for Towards an information-theoretic framework of intrusion detection for composed systems and robustness analyses
- Download full text (pdf) of Towards an information-theoretic framework of intrusion detection for composed systems and robustness analyses
Probabilistic network sparsification with ego betweenness
Part of Applied Network Science, 2021
- DOI for Probabilistic network sparsification with ego betweenness
- Download full text (pdf) of Probabilistic network sparsification with ego betweenness
Defining and measuring probabilistic ego networks
Part of Social Network Analysis and Mining, 2021
Comparing node degrees in probabilistic networks
Part of Journal of Complex Networks, p. 749-763, 2019
Link quality estimation for arbitrary packet sizes over wireless links using packet reception events
Part of International Journal of Communication Systems, 2019
- DOI for Link quality estimation for arbitrary packet sizes over wireless links using packet reception events
- Download full text (pdf) of Link quality estimation for arbitrary packet sizes over wireless links using packet reception events
Security in Visible Light Communication: Novel Challenges and Opportunities
Part of Sensors & Transducers Journal, p. 9-15, 2015
Estimating packet delivery ratio for arbitrary packet sizes over wireless links
Part of IEEE Communications Letters, p. 609-612, 2015
Haggle: Opportunistic mobile content sharing using search
Part of Computer Communications, p. 121-132, 2014
Resilience and Opportunistic Forwarding: Beyond Average Value Analysis
Part of Computer Communications, p. 111-120, 2014
Comparing wireless flooding protocols using trace-based simulations
Part of EURASIP Journal on Wireless Communications and Networking, 2013
- DOI for Comparing wireless flooding protocols using trace-based simulations
- Download full text (pdf) of Comparing wireless flooding protocols using trace-based simulations
Leveraging a power save protocol to improve performance in ad hoc networks
Part of ACM SIGMOBILE Mobile Computing and Communications Review, p. 51-52, 2007
A Search-based Network Architecture for Content-oriented and Opportunistic Communication
Chapters in book
Modularity-Based Selection of the Number of Slices in Temporal Network Clustering
Part of Temporal Network Theory, p. 435-447, Springer Nature, 2023
Conference papers
Desynchronized Querying of Analog Backscatter Tags
2025
Security and Privacy for Fat Intra-Body Communication: Mechanisms and Protocol Stack
Part of Proceedings of the 49th IEEE Conference on Local Computer Networks, p. 1-9, 2024
Unlocking the Potential of Low-cost High-resolution Sensing with Analog Backscatter
Part of 2024 IEEE International Conference on RFID (RFID), p. 1-6, 2024
- DOI for Unlocking the Potential of Low-cost High-resolution Sensing with Analog Backscatter
- Download full text (pdf) of Unlocking the Potential of Low-cost High-resolution Sensing with Analog Backscatter
Channel Estimation for Analog Backscatter Tags
Part of RFCom '24, p. 1-7, 2024
- DOI for Channel Estimation for Analog Backscatter Tags
- Download full text (pdf) of Channel Estimation for Analog Backscatter Tags
Impact of Attack Variations and Topology on IoT Intrusion Detection Model Generalizability
Part of 2024 IEEE 21st International Conference on Mobile Ad-Hoc and Smart Systems (MASS), p. 364-370, 2024
A PUF-Based Indirect Authentication and Key Establishment Protocol for Wearable Devices
Part of ICC 2023 - IEEE International Conference on Communications, p. 615-621, 2023
Faster FunctionalWarming with Cache Merging
Part of PROCEEDINGS OF SYSTEM ENGINEERING FOR CONSTRAINED EMBEDDED SYSTEMS, DRONESE AND RAPIDO 2023, p. 39-47, 2023
RFID Tags as Passive Temperature Sensors
Part of 17th annual international conference on RFID, Seattle, WA, USA, June 13-15, 2023., p. 48-53, 2023
- DOI for RFID Tags as Passive Temperature Sensors
- Download full text (pdf) of RFID Tags as Passive Temperature Sensors
Poster: A Battery-free Backscatter Communication System for Non-persistent Carriers
2023
Demo: An Educational Platform to Learn Radio Frequency Wireless Communication
Part of Proceedings of the 21st Annual International Conference on Mobile Systems, Applications and Services, p. 600-601, 2023
HarmonicID: An Identification System for Low-Power Analog Backscatter Tags
Part of 2022 IEEE International Conference on RFID (RFID), p. 1-6, 2022
- DOI for HarmonicID: An Identification System for Low-Power Analog Backscatter Tags
- Download full text (pdf) of HarmonicID: An Identification System for Low-Power Analog Backscatter Tags
Part of 2022 16TH EUROPEAN CONFERENCE ON ANTENNAS AND PROPAGATION (EUCAP), 2022
RRF: A Robust Radiometric Fingerprint System that Embraces Wireless Channel Diversity
Part of WiSec '22, p. 85-97, 2022
- DOI for RRF: A Robust Radiometric Fingerprint System that Embraces Wireless Channel Diversity
- Download full text (pdf) of RRF: A Robust Radiometric Fingerprint System that Embraces Wireless Channel Diversity
Reliable Flooding in Dense Backscatter-based Tag-to-Tag Networks
Part of 2021 IEEE International Conference On RFID (RFID), 2021
- DOI for Reliable Flooding in Dense Backscatter-based Tag-to-Tag Networks
- Download full text (pdf) of Reliable Flooding in Dense Backscatter-based Tag-to-Tag Networks
PHY-IDS: a physical-layer spoofing attack detection system for wearable devices
Part of WearSys '20, 2020
Sensitivity of radiometric fingerprint against wireless channel: Poster Abstract
Part of SenSys '20, p. 719-720, 2020
Towards Secure Backscatter-based In-Body Sensor Networks
2020
Radiometric Signatures for Wireless Device Identification over Dynamic Channels: Poster
Part of 2020 IEEE Symposium On Security And Privacy Workshops (SPW 2020), p. 127-127, 2020
TagAlong: Efficient Integration of Battery-free Sensor Tags in Standard Wireless Networks
Part of Proceedings of the 19th ACM/IEEE International Conference on Information Processing in Sensor Networks, p. 169-180, 2020
Towards Physical-Layer Authentication for Backscatter Devices: Extended Abstract
Part of International Workshop on Attacks and Defenses for Internet-of-Things, 2020
- DOI for Towards Physical-Layer Authentication for Backscatter Devices: Extended Abstract
- Download full text (pdf) of Towards Physical-Layer Authentication for Backscatter Devices: Extended Abstract
A Fast Carrier Scheduling Algorithm for Battery-free Sensor Tags in Commodity Wireless Networks
Part of IEEE INFOCOM 2020 - IEEE Conference on Computer Communications, p. 994-1003, 2020
- DOI for A Fast Carrier Scheduling Algorithm for Battery-free Sensor Tags in Commodity Wireless Networks
- Download full text (pdf) of A Fast Carrier Scheduling Algorithm for Battery-free Sensor Tags in Commodity Wireless Networks
Backscatter Communication for Wireless Robotic Materials
Part of EWSN'19, p. 336-340, 2019
Tiek: Two-tier Authentication and Key Distribution for Wearable Devices
Part of 2019 INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), IEEE , 2019, 2019
Tumor Sensing Privacy in In-Body Networks
2019
2019
Age of Information-Aware Scheduling for Timely and Scalable Internet of Things Applications
Part of IEEE Conference On Computer Communications (IEEE INFOCOM 2019), p. 2476-2484, 2019
Poster: Tiek: Two-tier Authentication and Key Distribution for Wearable Devices
2019
Integration of a Platform for Energy Storage Experiments into a Generic Testbed Framework
Part of Proc. 12th International Workshop on Wireless Network Testbeds, Experimental Evaluation & Characterization, p. 77-78, 2018
A Platform for Experiments with Energy Storage Devices for Low-power Wireless Networks
Part of Proc. 12th International Workshop on Wireless Network Testbeds, Experimental Evaluation & Characterization, p. 68-76, 2018
Towards Battery-free Radio Tomographic Imaging: Demo Abstract
2018
On Performance Observability in IoT Systems using Active Measurements
Part of NOMS 2018 - 2018 IEEE/IFIP Network operations and management symposium, 2018
Environmental Control at the Edge
2018
Demo: Towards Battery-free Radio Tomographic Imaging
Part of WISEC'18, p. 293-295, 2018
Towards Long-range Backscatter Communication with Tunnel Diode Reflection Amplifier
2018
Enabling Ambient Backscatter Using a Low-Cost Software Defined Radio
2017
Towards wide-area backscatter networks
Part of Proc. 4th ACM Workshop on Hot Topics in Wireless, p. 49-53, 2017
Demo: LoRea: A backscatter architecture that achieves a long communication range
Part of Proc. 15th ACM Conference on Embedded Network Sensor Systems, 2017
LoRea: A backscatter architecture that achieves a long communication range
Part of Proc. 15th ACM Conference on Embedded Network Sensor Systems, 2017
- DOI for LoRea: A backscatter architecture that achieves a long communication range
- Download full text (pdf) of LoRea: A backscatter architecture that achieves a long communication range
Towards realistic lifetime estimation in battery-powered IoT devices
Part of Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems Article No. 67, 2017
Making batteries a first class element in the design and evaluation of embedded wireless systems
Part of Proc. 14th International Conference on Embedded Wireless Systems and Networks, p. 242-243, 2017
Poster Abstract:BouKey: Location-Based Key Sharing Using Visible LightCommunication
2016
Do Multiple Bits per Symbol Increase the Throughput of Ambient Backscatter Communications?
Part of EWSN '16 Proceedings of the 2016 International Conference on Embedded Wireless Systems and Networks, p. 355-360, 2016
Towards even coverage monitoring with opportunistic sensor networks
Part of Proc. 11th ACM MobiCom Workshop on Challenged Networks, p. 81-86, 2016
FOCUS: Robust visual codes for everyone
Part of Proc. 14th International Conference on Mobile Systems, Applications, and Services, p. 319-332, 2016
Considering Multi-Contact Encounters in Opportunistic Networks
Part of Proceedings of the 10th ACM MobiCom Workshop on Challenged Networks, 2015
Supporting Heterogeneous LCD/Camera Links
Part of Proc. 13th International Symposium on Information Processing in Sensor Networks, p. 289-290, 2014
All is not lost: Understanding and exploiting packet corruption in outdoor sensor networks
Part of Wireless Sensor Networks, p. 116-132, 2014
How do the dynamics of battery discharge affect sensor lifetime?
Part of 2014 11th Annual Conference on Wireless On-demand Network Systems and Services (WONS), p. 49-56, 2014
A Study of Packet Errors on Outdoor 802.15.4 Links
Part of The 9th Swedish National Computer Networking Workshop 2013, 2013
Towards adaptive zero-knowledge protocols: A case study with Fiat–Shamir identification protocol
Part of Proc. 9th Swedish National Computer Networking Workshop, p. 67-70, 2013
Transmission errors in a sensor network at the edge of the world
Part of Proc. 5th Extreme Conference on Communication, 2013
A long-term study of correlations between meteorological conditions and 802.15.4 link performance
Part of Proc. 10th International Conference on Sensing, Communications, and Networking, p. 221-229, 2013
Evaluating Battery Models in Wireless Sensor Networks
Part of Wired/Wireless Internet Communication, p. 29-42, 2013
Resilience and Opportunistic Forwarding: Beyond Average Value Analysis
Part of CHANTS '13 Proceedings of the 8th ACM MobiCom workshop on Challenged networks, 2013
A Long-Term Study on the Effects of Meteorological Conditions on 802.15.4 Links
Part of 8th Swedish National Computer Networking Workshop, Stockholm, June 7-8, 2012
On Resilience in Opportunistic Networks
Part of 8th Swedish National Computer Networking Workshop SNCNW 2012, 2012
The impact of trace and adversary models on location privacy provided by K-anonymity
Part of Proc. 1st Workshop on Measurement, Privacy, and Mobility, 2012
Making the Most of Your Contacts: Transfer Ordering in Data-Centric Opportunistic Networks
Part of Proceedings of the 2012 ACM MobiOpp Workshop on Mobile Opportunistic Networks, 2012
On location privacy and quality of information in participatory sensing
Part of Proc. 8th ACM Symposium on QoS and Security for Wireless and Mobile Networks, p. 55-62, 2012
A social node model for realising information dissemination strategies in delay tolerant networks
Part of Proceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems, p. 79-88, 2012
- DOI for A social node model for realising information dissemination strategies in delay tolerant networks
- Download full text (pdf) of A social node model for realising information dissemination strategies in delay tolerant networks
Mining Conversations of Geographically Changing Users
Part of Proceedings of the World Wide Web 2012 Workshop on Social Web for Disaster (SWDM2012), 2012
Trace-based performance analysis of opportunistic forwarding under imperfect node cooperation
Part of Proceedings of the 31st Annual IEEE International Conference on Computer Communications (IEEE INFOCOM 2012), 2012
Lower trees with fixed degrees: a recipe for efficient secure hierarchical aggregation in WSNs
Part of 2011 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), p. 659-664, 2011
Privacy-aware probabilistic sampling for data collection in wireless sensor networks
Part of Proc. 7th International Wireless Communications and Mobile Computing Conference, p. 314-319, 2011
Congestion Avoidance in a Data-Centric Opportunistic Network
Part of Proceedings of the 2011 ACM SIGCOMM Workshop on Information-Centric Networking (ICN-2011), 2011
Haggle Testbed: a Testbed for Opportunistic Networks
Part of In Proceedings of the 7th Swedish National Computer Networking Workshop, 2011
Twitter in Disaster Mode: Security Architecture
Part of Conference on emerging Networking EXperiments and Technologies (CoNEXT), 2011
Twitter in Disaster Mode: Opportunistic Communication and Distribution of Sensor Data in Emergencies
Part of ExtremeCom2011, 2011
Interest dissemination in a searchable data-centric opportunistic network
Part of Proc. European Wireless Conference, p. 889-895, 2010
Secure Overlays: Making Static Key Distribution Schemes Work with Mobile Base Stations in WSNs
Part of Wired/Wireless Internet Communications, p. 386-397, 2010
On realising a strategy for resilience in opportunistic networks
Part of Future Network and Mobile Summit, 2010
Using Search to Enhance Picture Sharing with Mobile Phones: Demo
Part of ACM MobiSys, 2009
Search-Based Picture Sharing With Mobile Phones: Demo
Part of ACM MobiHoc, 2009
Haggle: A Data-centric Network Architecture for Mobile Devices
2009
2009
n-LDA: n-Layers Data Aggregation in Sensor Networks
Part of Proc. 28th International Conference on Distributed Computing Systems Workshops, p. 400-405, 2008
Presentation of the VINN Excellence Center for Wireless Sensor Networks (WISENET)
Part of Conference on Radio Science (RVK08), 2008
ARPD: Asynchronous random key predistribution in the LEAP framework for Wireless Sensor Networks
Part of 3rd IEEE International Workshop on Wireless and Sensor Networks Security (IEEE WSNS 2007), 2007
Testbed and Methodology for Experimental Evaluation of Opportunistic Networks
Part of 7th Scandinavian Workshop on Wireless Ad-hoc Networks (ADHOC'07), 2007
Part of Proceedings of the 1st international workshop on System evaluation for mobile platforms (MobiEval'07), p. 29-34, 2007
n-LQA: n-Layers Query Authentication in Sensor Networks
Part of 3rd IEEE International Workshop on Wireless and Sensor Networks Security (IEEE WSNS 2007), 2007
Part of IEEE Wireless Communications and Networking Conference, 2007
Modeling Capacity in Ad Hoc Networks: Extended Poster Abstract
2006
Part of The Twelfth Annual International Conference on Mobile Computing and Networking (Mobicom2006), 2006
A model for evaluating asynchronous protocols in Ad hoc Networks
Part of 6th Scandinavian Workshop on Wireless Ad-hoc Networks (ADHOC'06), 2006
Comparing Simulation, Emulation, and Real-World Experimental Results in Mobile Ad hoc Networks
Part of 6th Scandinavian Workshop on Wireless Ad-hoc Networks (ADHOC'06), 2006
Implementing Agreement Protocols in Sensor
Part of The Second International Workshop on Wireless and Sensor Networks Security (WSNS'06), 2006
Verifiable Agreement: Limits of Non-Repudiation in Mobile Peer-to-Peer Ad Hoc Networks
Part of Third European Workshop on Security and Privacy in Ad hoc and Sensor Networks, 2006
Interactions between TCP, UDP and Routing Protocols in Wireless Multi-hop Ad hoc Networks
Part of Proceedings of the 1st IEEE ICPS Workshop on Multi-hop Ad hoc Networks: from theory to reality (REALMAN 2005), 2005
Interaction between TCP and UDP flows in Wireless Multi-hop Ad hoc Networks
Part of Proceedings of the 5th Scandinavian Workshop on Wireless Ad-hoc Networks (Adhoc'05), 2005
Using Ad Hoc Networking in Orienteering A Demonstration
Part of 4th Scandinavian Workshop on Wireless Ad-hoc Networks (AdHoc'04), 2004
Building Secure Communities in Spontaneously Networked Environments
Part of 4th Scandinavian Workshop on Wireless Ad-hoc Networks (AdHoc'04), 2004
Security Bootstrapping for Networked Devices
2004