The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Peer-to-peer file sharing applications are increasingly popular and they enable users to share various files with high scalability. However, in intermittently connected mobile network environment, existing file sharing systems are hindered by the lack of node stable connectivity and constant network topology change. We propose a social network based file sharing system in mobile P2P networks. It takes...
We analyze two commercial peer-to-peer (P2P) video streaming systems via active measurements: a tree-based overlay multicast and a mesh-based overlay. Our controlled IP test-bed allows us to reproduce near-identical network conditions for both the systems and to test them under varying network conditions and peer behavior. We report on the bandwidth efficiency of these P2P video streaming systems...
In this paper, we introduce a novel lightweight anonymization technique called Shalon. It is based on onion routing, aims to reduce complexity, and delivers high bandwidth. We have, compared to the widely known approach Tor, slightly reduced the level of security in favor for greatly increased performance. The most significant advantage compared to other approaches is that Shalon is fully based on...
We address the issue of asserting the accuracy of coordinates advertised by nodes of Internet coordinate systems during distance estimations. Indeed, some nodes may lie deliberately about their coordinates to mount various attacks against applications and overlays. Our proposed method consists in two steps: 1) establish the correctness of a node's claimed coordinate (which leverages our previous work...
Layered streaming is an effective solution to address receiver heterogeneity in a peer-to-peer (P2P) network. This paper addresses the problem of rate allocation for layered video stream in p2p mesh networks. We present a distributed rate allocation algorithm that achieves close to optimal layer allocation among peers receiving the same video. We use load balancing technique that evenly distributes...
"Botnet" is a network of computers that are compromised and controlled by an attacker. Botnets are one of the most serious threats to today's Internet. Most current botnets have centralized command and control (C&C) architecture. However, peer-to-peer (P2P) structured botnets have gradually emerged as a new advanced form of botnets. Without central C&C servers, P2P botnets are more...
On-demand video delivery with a content delivery network (CDN) solely based on set-top-boxes has been introduced. In previous works, videos are separated into pieces and randomly stored in boxes, requests from clients being redirected to the nearest boxes. However, random strategy may lead to some costly and inefficient allocation. For example, a video part could be placed much further than other...
In this paper, we propose a P2P-based IPTV system using a multiple chain architecture. The proposed system robustly accommodates peer churn. As opposed to the Internet, the IPTV network managed by a single ISP has fewer bandwidth constraints and guarantees stability. Therefore, we emphasize preferentially the robustness of a P2P network in an IPTV environment. A single chain structure, which was proposed...
In this research, we propose a robust Sybil attack detection framework for MANETs based on cooperative monitoring of network activities. We do not require designated and honest monitors to perform the Sybil attack detection. Each mobile node in the network observes packets passing through it and periodically exchanges its observations in order to determine the presence of an attack. Malicious nodes...
In terms of intercarrier compensation traffic flows are measured to allocate the costs between networks. This method provides a poor basis for sharing any costs. In this work we analyze the benefits of the traffic differentiation on the interconnection charges in unilateral and bilateral arrangements. We determine an original initiator of a transmission and compensate differently for the distinguished...
Efficient, scalable and robust grid service provisioning is one of the cornerstones of next generation grid systems. In agreement with this vision, we propose a flexible grid service provisioning framework built on a two layer architecture. A lower layer provides membership management and basic communication upon a self-organized peer-to-peer overlay maintained and optimized using a fully distributed...
One of the main goals of BitTorrent is to reduce load on Web servers by encouraging clients to share content between themselves. However, BitTorrent's current design relies heavily on the original source to serve a disproportionate amount of the file. We modify standard BitTorrent software so that a source determines the current popularity of each of the blocks of a file and tries to serve only those...
Massively multi-user virtual environments (MMVEs) are highly interactive systems. They require the propagation of state updates to users with little delay. In this paper we propose a novel update propagation approach for MMVEs that enables such low-latency propagation while offering the scalability needed to support MMVEs with massive user numbers. Our approach combines peer-based and server-based...
The blind flooding algorithm under a time-to-live (TTL) constraint used in unstructured peer-to-peer (P2P) networks, such as Gnutella, may cause a large amount of network traffic. The algorithm cannot guarantee for acquiring the required data objects, especially for rare ones. To mitigate these problems, this paper proposes PercolationNET, a multi-tree sub-overlay, which is built on top of an existing...
With emerging Internet-scale open content and resource sharing, social networks, and complex cyber-physical systems, trust issues become prominent. In this paper, we propose a trust vector based scheme (VectorTrust) for aggregation of distributed trust scores. Leveraging a Bellman-Ford based algorithm for fast trust score aggregation, VectorTrust features localized and distributed concurrent communication...
P2P-based video-on-demand (P2P-VoD) streaming service has recently emerged as a new paradigm of Internet application. Unlike streaming live content, P2P-VoD system require each user to contribute a small amount of storage since it has less synchrony in the users sharing video content. At the same time, new mechanisms for peer service scheduling are carefully designed. On briefly describing the architectural...
We propose a new mechanism for generating networks with a wide variety of degree distributions. The idea is a modification of the well-studied preferential attachment scheme in which the degree of each node is used to determine its evolving connectivity. Modifications to this base protocol to include features other than connectivity have been considered in building the network. However, schemes based...
The popularity of a new generation of smart peer-to-peer applications has resulted in several new challenges for accurately classifying network traffic. In this paper, we propose a novel 2-stage P2P traffic classifier, called self learning traffic classifier (SLTC), that can accurately identify P2P traffic in high speed networks. The first stage classifies P2P traffic from the rest of the network...
In BGP, autonomous systems (ASes) advertise routes. Unfortunately, malicious ASes can advertise false routes that do not exist in the Internet. Many extensions of BGP have been proposed to allow each AS to check whether the received routes are false. It turns out that none of these extensions can defend against collusions among malicious ASes. In this paper, we present an extension of BGP that can...
With research effort of Ubiquitous computing development, Wireless Sensor Networks have also been studied and deployed in many places. Recently various works for sharing the existing sensor data have been tried. In this paper we propose a P2P based system for sharing sensor data. It uses a structured P2P - Pastry to provide DHT based routing without server and has been deployed in KOREN. We classify...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.