1,453 Hits in 9.3 sec

Lessons for Autonomic Services from the Design of an Anonymous DoS Protection Overlay [chapter]

David Ellis, Ian Wakeman
2006 Lecture Notes in Computer Science  
In this paper we report on the design and implementation of a Denial of Service protection overlay, and draw lessons for autonomous services.  ...  Our approach is novel in that each node is only aware of a subset of the other nodes within the overlay; the routing topology of the overlay is hidden from internal and external nodes and the overlay uses  ...  Conclusion We have presented the design and implementation of an anonymous DoS protection overlay network.  ... 
doi:10.1007/11880905_8 fatcat:vo6a5wk6tnbennls7fy7o2ykkm

A journey in applying blockchain for cyberphysical systems [article]

Volkan Dedeoglu, Ali Dorri, Raja Jurdak, Regio A. Michelin, Roben C. Lunardi, Salil S. Kanhere, Avelino F. Zorzo
2019 arXiv   pre-print
However, centralised approaches for CPS systems are not capable of addressing the unique challenges of CPS due to the complexity, constraints, and dynamic nature of the interactions.  ...  To realize the true potential of CPS, a decentralized approach that takes into account these unique features is required.  ...  ACKNOWLEDGMENTS The work has been supported by the Cyber Security Research Centre Limited whose activities are partially funded by the Australian Governments Cooperative Research Centres Programme.  ... 
arXiv:1912.01606v1 fatcat:ojctmigfojembbrs5azc7iswqy

Anonymizing Masses: Practical Light-weight Anonymity at the Network Level [article]

Hooman Mohajeri Moghaddam, Arsalan Mosenia
2019 arXiv   pre-print
In an era of pervasive online surveillance, Internet users are in need of better anonymity solutions for online communications without sacrificing performance.  ...  Existing overlay anonymity tools, such as the Tor network, suffer from performance limitations and recent proposals to embed anonymity into Internet protocols face fundamental deployment challenges.  ...  Some of the techniques for DoS mitigation such as ingress filtering [80] , TCP/UDP timeout are lessons applicable to both PANEL and CGNs.  ... 
arXiv:1911.09642v1 fatcat:gb354rcl3ncqlpbri4vbi7zfkm

Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments

Carmela Troncoso, Marios Isaakidis, George Danezis, Harry Halpin
2017 Proceedings on Privacy Enhancing Technologies  
We revise fifteen years of research on decentralization and privacy, and provide an overview of key systems, as well as key insights for designers of future systems.  ...  We argue that a combination of insights from cryptography, distributed systems, and mechanism design, aligned with the development of adequate incentives, are necessary to build scalable and successful  ...  The authors would like to thank the reviewers for insightful comments that helped improving the paper, in particular Prateek Mittal for acting as shepherd.  ... 
doi:10.1515/popets-2017-0056 dblp:journals/popets/TroncosoIDH17 fatcat:uole5gkxeravhful25scijakpa

Security and privacy issues in P2P streaming systems: A survey

Gabriela Gheorghe, Renato Lo Cigno, Alberto Montresor
2010 Peer-to-Peer Networking and Applications  
Success always implies increased concerns about security, protection, privacy and all the other 'side' properties that transform an experimental application into a service.  ...  Starting from existing analyses and security models in the related literature, we give an overview on security and privacy considerations for P2P streaming systems.  ...  DoS attacks Denial of Service can take many forms, from system partitioning to sending excessive amounts of requests or duplicate packets intended for their peers.  ... 
doi:10.1007/s12083-010-0070-6 fatcat:hgg7fujecbdvpd7647lttvh2qm

A Survey on Future Internet Security Architectures

Wenxiu Ding, Zheng Yan, Robert H. Deng
2016 IEEE Access  
Motivated by emerging demands for security, mobility, and distributed networking, many research projects have been initiated to design the future Internet from a clean slate.  ...  These projects aim to move away from the traditional host-centric networks and replace them with content-centric, mobilitycentric, or service-centric networks.  ...  An example design of three layers [24] is presented as follows: 1) THE LOWER LAYER -NETWORK PROVIDER INFRASTRUCTURE OVERLAY This layer is the infrastructure of Internet Service Provider (ISP) and network  ... 
doi:10.1109/access.2016.2596705 fatcat:ny3dd4naaref7ktsmu32xzosbe

Peer-to-Peer-Based Social Networks: A Comprehensive Survey

Newton Masinde, Kalman Graffi
2020 SN Computer Science  
Second, it gives an exposition of the building blocks for P2P frameworks that allow the creation of such sophisticated and demanding applications, such as user/identity management, reliable data storage  ...  The goals of this survey are threefold. First, the survey elaborates the properties of P2P-based online social networks and defines the requirements for such (zero-trust) platforms.  ...  From a data analyst point of view, data provided in an OSN are not to be trusted, especially if the OSN aims for anonymity and privacy.  ... 
doi:10.1007/s42979-020-00315-8 fatcat:iwktgohkjbdalmalaj5h3lulri

Peer-to-Peer based Social Networks: A Comprehensive Survey [article]

Newton Masinde, Kalman Graffi
2020 arXiv   pre-print
The goals of this survey are three-fold. Firstly, the survey elaborates the properties of P2P-based online social networks and defines the requirements for such (zero-trust) platforms.  ...  As a third point, it gives an overview of proposed P2P-based online social network applications, frameworks and architectures.  ...  In general, most applications, and in particular OSNs, designed on the P2P platform, seem to follow a general format for the architecture: an overlay, required services on top of the overlay (here referred  ... 
arXiv:2001.02611v2 fatcat:nrvp45dy3rbnhmajtvqiect3ty

A conceptual-driven survey on future internet requirements, technologies, and challenges

Antonio Marcos Alberti
2013 Journal of the Brazilian Computer Society  
This paper provides a comprehensive overview of the contemporary research from an abstract point of view, covering the design requirements and ingredients that are being adopted, interrelating, and analyzing  ...  Nowadays, research initiatives to redesign the Internet are popping up around the world. Each of these projects has a particular focus and its own set of design requirements and key technologies.  ...  Acknowledgments The author thanks INATEL for the research support.  ... 
doi:10.1007/s13173-013-0101-2 fatcat:5akftmotn5b6nm5t4erk7thq7y

IPFS and Friends: A Qualitative Comparison of Next Generation Peer-to-Peer Data Networks [article]

Erik Daniel, Florian Tschorsch
2021 arXiv   pre-print
From the overview, we derive future challenges and research goals concerning data networks.  ...  Specifically, we provide a deeper outline of the Interplanetary File System and a general overview of Swarm, the Hypercore Protocol, SAFE, Storj, and Arweave.  ...  [89] propose Garlic Cast, a mechanism for improving anonymity in an overlay network. Peers do not request and search content directly.  ... 
arXiv:2102.12737v2 fatcat:ppg42liybjfwjbjdezk4tp5axe

Data-centric publish/subscribe routing middleware for realizing proactive overlay software-defined networking

Akram Hakiri, Aniruddha Gokhale
2016 Proceedings of the 10th ACM International Conference on Distributed and Event-based Systems - DEBS '16  
To that end, we first present the design rationale and architecture of our solution called PO-SEIDON (Proactive brOkerless SubscribEr Interest-Defined Overlay Networking).  ...  To address these issues, this paper demonstrates how the strengths of the data-centric, broker-less pub/sub paradigm can be exploited to realize proactive overlay SDN for inter cloud domain federation.  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of Fulbright, NSF and AFOSR.  ... 
doi:10.1145/2933267.2933314 dblp:conf/debs/HakiriG16 fatcat:b52rz55bejdvbiq7xd4kzlimc4

Vehicular networks and the future of the mobile internet

Mario Gerla, Leonard Kleinrock
2011 Computer Networks  
In this paper we examine this interplay between wired and wireless and extract a message for the design of a more efficient Future Wireless Internet.  ...  operations; (f) mobile sensor data access and search from the internet, and; (g) anonymity, privacy and incentives.  ...  This is a radical concept in ad hoc networks traditionally designed for exclusively autonomous operation and thus unable to exploit the interconnection and resource sharing of the wired Internet.  ... 
doi:10.1016/j.comnet.2010.10.015 fatcat:5smrrhafbzayflzojfonbxefve

The Blockchain as a Software Connector

Xiwei Xu, Cesare Pautasso, Liming Zhu, Vincent Gramoli, Alexander Ponomarev, An Binh Tran, Shiping Chen
2016 2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA)  
Blockchain is an emerging technology for decentralized and transactional data sharing across a large network of untrusted participants.  ...  Additionally, we explore specific implications of using the blockchain as a software connector including design trade-offs regarding quality attributes.  ...  ACKNOWLEDGMENTS NICTA is funded by the Australian Government through the Department of Communications and the Australian Research Council through the ICT Centre of Excellence Program.  ... 
doi:10.1109/wicsa.2016.21 dblp:conf/wicsa/XuPZGPTC16 fatcat:hexjjfxgxzdblafrqzkrzhgcw4

Applications of Blockchains in the Internet of Things: A Comprehensive Survey

Muhammad Salek Ali, Massimo Vecchio, Miguel Pincheira, Koustabh Dolui, Fabio Antonelli, Mubashir Husain Rehmani
2018 IEEE Communications Surveys and Tutorials  
From an abstract perspective, a blockchain is a distributed ledger capable of maintaining an immutable log of transactions happening in a network.  ...  use blockchains to provide a decentralized, secure medium for the IoT.  ...  Many more solutions have been proposed in the years since then, and we present an updated view of the lessons learned from them.  ... 
doi:10.1109/comst.2018.2886932 fatcat:b6m4roave5c7tpdlzgguustf6e

Towards low-latency service delivery in a continuum of virtual resources: State-of-the-art and Research Directions

Jose Santos, Tim Wauters, Bruno Volckaert, Filip De Turck
2021 IEEE Communications Surveys and Tutorials  
ACKNOWLEDGMENT This research was performed within the project "Intelligent DEnse And Longe range IoT networks (IDEAL-IoT)" under Grant Agreement #S004017N, from the fund for Scientific Research-Flanders  ...  The authors thank the FlexN-GIA consortium members.  ...  LESSONS LEARNED AND PROSPECTS A. Lessons Learned Several lessons have been derived from the literature review relevant to low latency service delivery.  ... 
doi:10.1109/comst.2021.3095358 fatcat:vqdli2727rgydid2c2iqsnmnx4
« Previous Showing results 1 — 15 out of 1,453 results