A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Lessons for Autonomic Services from the Design of an Anonymous DoS Protection Overlay
[chapter]
2006
Lecture Notes in Computer Science
In this paper we report on the design and implementation of a Denial of Service protection overlay, and draw lessons for autonomous services. ...
Our approach is novel in that each node is only aware of a subset of the other nodes within the overlay; the routing topology of the overlay is hidden from internal and external nodes and the overlay uses ...
Conclusion We have presented the design and implementation of an anonymous DoS protection overlay network. ...
doi:10.1007/11880905_8
fatcat:vo6a5wk6tnbennls7fy7o2ykkm
A journey in applying blockchain for cyberphysical systems
[article]
2019
arXiv
pre-print
However, centralised approaches for CPS systems are not capable of addressing the unique challenges of CPS due to the complexity, constraints, and dynamic nature of the interactions. ...
To realize the true potential of CPS, a decentralized approach that takes into account these unique features is required. ...
ACKNOWLEDGMENTS The work has been supported by the Cyber Security Research Centre Limited whose activities are partially funded by the Australian Governments Cooperative Research Centres Programme. ...
arXiv:1912.01606v1
fatcat:ojctmigfojembbrs5azc7iswqy
Anonymizing Masses: Practical Light-weight Anonymity at the Network Level
[article]
2019
arXiv
pre-print
In an era of pervasive online surveillance, Internet users are in need of better anonymity solutions for online communications without sacrificing performance. ...
Existing overlay anonymity tools, such as the Tor network, suffer from performance limitations and recent proposals to embed anonymity into Internet protocols face fundamental deployment challenges. ...
Some of the techniques for DoS mitigation such as ingress filtering [80] , TCP/UDP timeout are lessons applicable to both PANEL and CGNs. ...
arXiv:1911.09642v1
fatcat:gb354rcl3ncqlpbri4vbi7zfkm
Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments
2017
Proceedings on Privacy Enhancing Technologies
We revise fifteen years of research on decentralization and privacy, and provide an overview of key systems, as well as key insights for designers of future systems. ...
We argue that a combination of insights from cryptography, distributed systems, and mechanism design, aligned with the development of adequate incentives, are necessary to build scalable and successful ...
The authors would like to thank the reviewers for insightful comments that helped improving the paper, in particular Prateek Mittal for acting as shepherd. ...
doi:10.1515/popets-2017-0056
dblp:journals/popets/TroncosoIDH17
fatcat:uole5gkxeravhful25scijakpa
Security and privacy issues in P2P streaming systems: A survey
2010
Peer-to-Peer Networking and Applications
Success always implies increased concerns about security, protection, privacy and all the other 'side' properties that transform an experimental application into a service. ...
Starting from existing analyses and security models in the related literature, we give an overview on security and privacy considerations for P2P streaming systems. ...
DoS attacks Denial of Service can take many forms, from system partitioning to sending excessive amounts of requests or duplicate packets intended for their peers. ...
doi:10.1007/s12083-010-0070-6
fatcat:hgg7fujecbdvpd7647lttvh2qm
A Survey on Future Internet Security Architectures
2016
IEEE Access
Motivated by emerging demands for security, mobility, and distributed networking, many research projects have been initiated to design the future Internet from a clean slate. ...
These projects aim to move away from the traditional host-centric networks and replace them with content-centric, mobilitycentric, or service-centric networks. ...
An example design of three layers [24] is presented as follows:
1) THE LOWER LAYER -NETWORK PROVIDER INFRASTRUCTURE OVERLAY This layer is the infrastructure of Internet Service Provider (ISP) and network ...
doi:10.1109/access.2016.2596705
fatcat:ny3dd4naaref7ktsmu32xzosbe
Peer-to-Peer-Based Social Networks: A Comprehensive Survey
2020
SN Computer Science
Second, it gives an exposition of the building blocks for P2P frameworks that allow the creation of such sophisticated and demanding applications, such as user/identity management, reliable data storage ...
The goals of this survey are threefold. First, the survey elaborates the properties of P2P-based online social networks and defines the requirements for such (zero-trust) platforms. ...
From a data analyst point of view, data provided in an OSN are not to be trusted, especially if the OSN aims for anonymity and privacy. ...
doi:10.1007/s42979-020-00315-8
fatcat:iwktgohkjbdalmalaj5h3lulri
Peer-to-Peer based Social Networks: A Comprehensive Survey
[article]
2020
arXiv
pre-print
The goals of this survey are three-fold. Firstly, the survey elaborates the properties of P2P-based online social networks and defines the requirements for such (zero-trust) platforms. ...
As a third point, it gives an overview of proposed P2P-based online social network applications, frameworks and architectures. ...
In general, most applications, and in particular OSNs, designed on the P2P platform, seem to follow a general format for the architecture: an overlay, required services on top of the overlay (here referred ...
arXiv:2001.02611v2
fatcat:nrvp45dy3rbnhmajtvqiect3ty
A conceptual-driven survey on future internet requirements, technologies, and challenges
2013
Journal of the Brazilian Computer Society
This paper provides a comprehensive overview of the contemporary research from an abstract point of view, covering the design requirements and ingredients that are being adopted, interrelating, and analyzing ...
Nowadays, research initiatives to redesign the Internet are popping up around the world. Each of these projects has a particular focus and its own set of design requirements and key technologies. ...
Acknowledgments The author thanks INATEL for the research support. ...
doi:10.1007/s13173-013-0101-2
fatcat:5akftmotn5b6nm5t4erk7thq7y
IPFS and Friends: A Qualitative Comparison of Next Generation Peer-to-Peer Data Networks
[article]
2021
arXiv
pre-print
From the overview, we derive future challenges and research goals concerning data networks. ...
Specifically, we provide a deeper outline of the Interplanetary File System and a general overview of Swarm, the Hypercore Protocol, SAFE, Storj, and Arweave. ...
[89] propose Garlic Cast, a mechanism for improving anonymity in an overlay network. Peers do not request and search content directly. ...
arXiv:2102.12737v2
fatcat:ppg42liybjfwjbjdezk4tp5axe
Data-centric publish/subscribe routing middleware for realizing proactive overlay software-defined networking
2016
Proceedings of the 10th ACM International Conference on Distributed and Event-based Systems - DEBS '16
To that end, we first present the design rationale and architecture of our solution called PO-SEIDON (Proactive brOkerless SubscribEr Interest-Defined Overlay Networking). ...
To address these issues, this paper demonstrates how the strengths of the data-centric, broker-less pub/sub paradigm can be exploited to realize proactive overlay SDN for inter cloud domain federation. ...
Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of Fulbright, NSF and AFOSR. ...
doi:10.1145/2933267.2933314
dblp:conf/debs/HakiriG16
fatcat:b52rz55bejdvbiq7xd4kzlimc4
Vehicular networks and the future of the mobile internet
2011
Computer Networks
In this paper we examine this interplay between wired and wireless and extract a message for the design of a more efficient Future Wireless Internet. ...
operations; (f) mobile sensor data access and search from the internet, and; (g) anonymity, privacy and incentives. ...
This is a radical concept in ad hoc networks traditionally designed for exclusively autonomous operation and thus unable to exploit the interconnection and resource sharing of the wired Internet. ...
doi:10.1016/j.comnet.2010.10.015
fatcat:5smrrhafbzayflzojfonbxefve
The Blockchain as a Software Connector
2016
2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA)
Blockchain is an emerging technology for decentralized and transactional data sharing across a large network of untrusted participants. ...
Additionally, we explore specific implications of using the blockchain as a software connector including design trade-offs regarding quality attributes. ...
ACKNOWLEDGMENTS NICTA is funded by the Australian Government through the Department of Communications and the Australian Research Council through the ICT Centre of Excellence Program. ...
doi:10.1109/wicsa.2016.21
dblp:conf/wicsa/XuPZGPTC16
fatcat:hexjjfxgxzdblafrqzkrzhgcw4
Applications of Blockchains in the Internet of Things: A Comprehensive Survey
2018
IEEE Communications Surveys and Tutorials
From an abstract perspective, a blockchain is a distributed ledger capable of maintaining an immutable log of transactions happening in a network. ...
use blockchains to provide a decentralized, secure medium for the IoT. ...
Many more solutions have been proposed in the years since then, and we present an updated view of the lessons learned from them. ...
doi:10.1109/comst.2018.2886932
fatcat:b6m4roave5c7tpdlzgguustf6e
Towards low-latency service delivery in a continuum of virtual resources: State-of-the-art and Research Directions
2021
IEEE Communications Surveys and Tutorials
ACKNOWLEDGMENT This research was performed within the project "Intelligent DEnse And Longe range IoT networks (IDEAL-IoT)" under Grant Agreement #S004017N, from the fund for Scientific Research-Flanders ...
The authors thank the FlexN-GIA consortium members. ...
LESSONS LEARNED AND PROSPECTS
A. Lessons Learned Several lessons have been derived from the literature review relevant to low latency service delivery. ...
doi:10.1109/comst.2021.3095358
fatcat:vqdli2727rgydid2c2iqsnmnx4
« Previous
Showing results 1 — 15 out of 1,453 results