The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Opportunistic networking differs from more conventional architectures by the lack of existing network infrastructure, which can cause intermittent connectivity or increased communication delay between nodes. From a message routing perspective, solving these problems require a different set of techniques than those used in more traditional network schemes. Forwarding algorithms in these scenarios aim...
Wireless mesh networks (WMN) enables the expansion of communication networks and broadband services. This expansion allows the use of applications like streaming multimedia in P2P (Peer-to-Peer). P2P-TV and WMNs share similar features like self-organization and decentralization in dynamic network environments and multi-hop transmission. In this context quality measurement has become essential due...
Recommender systems have been strongly researched within the last decade. With the arising and popularization of digital social networks a new field has been opened for social recommendations. Considering the network topology, users interactions, or estimating trust between users are some of the new strategies that recommender systems can take into account in order to adapt their techniques to these...
Cloud computing has been more and more popular and widely used as a new model of information technology. In order to achieve a reliable and efficient operation of the cloud environment, it is important for cloud providers to detect and deal with system anomalies in time. In this paper, we present a method for anomaly detection in MapReduce environment. This method is based on peer-similarity and uses...
Today, the main usage of the Internet has become increasingly about content generation, sharing, retrieval and massive distribution. Widely used P2P applications, UserGenerated Content (UGC) (e.g., Youtube, Flickr) and increasingly popular Social Networks make the Internet service model become more content-oriented than host-oriented as it has been this far. To match the Internet infrastructure to...
We consider the problem of content distribution to a group of cooperative wireless peer devices that desire the same block of information. The QoS metric is that peers are all required to receive the block by a fixed deadline, with a certain target probability. The block is divided into chunks, which are received via two methods that can be used simultaneously — (i) the B2P (base-station-to-peer)...
The nodes over mobile peer-to-peer networks often show selfish behavior for their limited resource and different interest. So detecting and stimulating selfish nodes to cooperate is a new important research topic. Through allowing nodes to freely express their subjective forwarding willing, the detection mechanism is implemented. Through punishing nodes which have a higher selfish degree than given...
This paper presents a new way of deploying security properties and trust in an open peer-to-peer network. The originality is that the security properties are freely defined by the user and are attached to the exchanged resources that are associated with domains. The paper proposes an implementation of a monitoring agent that looks after an open source peer-to-peer client and detects any attempt of...
The wireless requirement of many applications for sensor networks and in many cases their independent power sources, makes the task of increasing the lifetime and the efficiency of the network challenging. Cooperative information processing between the nodes is represented mainly by the routing protocol. In mobile WSN, the routing protocol has to achieve a certain level of efficiency that prolongs...
Private BitTorrent community (PT), as known as "BitTorrent Darknet", has become a popular research spot in recent years. PTs can provide ultra-high download performance which is much better than public BitTorrent communities. The Sharing Ratio Enhancement (SRE) mechanism is the key to PTs' success. However, it also brings negative side effects to the registered users in PTs. In this paper,...
Geolocated social networks, combining traditional social networking features with geolocation information, have grown tremendously over the last few years. Yet, very few works have looked at implementing geolocated social networks in a fully distributed manner, a promising avenue to handle the growing scalability challenges of these systems. In this paper, we focus on georecommendation, and show that...
New advanced techniques must be developed to support the growth of IPTV services and to boost quality delivered to the consumers. Optimization technique is proposed for the way users access video content delivered via wide area networks. The perceived quality of service will increase because the user accesses video content temporarily stored in nearby geographic locations. Temporary storage for content...
Due to the possibility of cheap identity creation, decentralized online reputation mechanisms are susceptible to sybil attacks. Barter Cast is a reputation mechanism used in the Internet-deployed Tribler file-sharing client. In this paper we study the opportunities for sybil attacks in Barter Cast and we devise a method for making Barter Cast sybil resilient, which is incorporated in a protocol called...
Several proposals exist that try to enhance Distributed Hash Table (DHT) systems with broadcasting capabilities. None of them however specifically addresses the particularities of Kademlia, an important DHT, used in well known real applications. Our work analyzes the implications of Kademlia's use of XOR-based distance metrics and subsequently discusses the applicability of existing broadcasting proposals...
The recent developments in cloud computing technology show an increase in security, privacy and trust related problems, in many ways, which haven't been predicted by the ones who have been designing clouding environments. Among them, the users trust problem and cloud computing resources secure access warranty have deserved special attention. Computing systems trust representation have been widely...
There has been a spurt of works showing that the existence of sybil attacks is a serious threat to Peer-to-Peer networks, where one or more attackers can forge a large number of fictitious identities. In this paper, we present a distributed protocol to reduce the adverse effects of sybil attacks in free riding problem. Our approach focuses on restricting nodes to obtain the number of service units...
The distribution of multimedia streaming requires efficient management strategies in multisite environment with multiple senders and receivers. The intermediate nodes between senders and receivers act as the Streaming Routers (SR1). They play an important role in the distribution of required contents by relaying and dropping video frames which depends on the network characteristics of peer receivers...
Heterogeneous Mobile Ad-hoc Networks (MANETs) are composed of nodes with different transmission range. Due to the difference of transmission range and relative velocity for network nodes, the link between two nodes can or will be unidirectional. In the standard AODV protocol, the shortest path is always selected. But this shortest path is the easiest broken one. In this paper, we propose an improvement...
In this paper, we propose a new gossip-based signaling dissemination method for the Next Steps in Signaling protocol family. In more detail, we propose to extend the General Internet Signaling Transport (GIST) protocol, so as to leverage these new dissemination capabilities from all NSIS Signaling Layer Protocol applications using its transport capabilities. The extension consists of two main procedures:...
Mobile peer-to-peer networks combining a mobile ad hoc network underlay with a peer-to-peer overlay offer a flexible means for providing communication services in absence of a communication infrastructure. However, mobile peer-to-peer networks inherit several challenges from the underlying architectures as, e.g., strongly limited resources and a highly dynamic topology. Due to this, the overlay has...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.