Download File - Computer Networks & Information Security
Download File - Computer Networks & Information Security Download File - Computer Networks & Information Security
Preventing Traffic Analysis [Jiang00iaas,Jiang00tech] Even with encryption, an eavesdropper may be able to identify the traffic pattern in the network Traffic patterns can give away information about the mode of operation Attack versus retreat Traffic analysis can be prevented by presenting “constant” traffic pattern independent of the underlying operational mode May need insertion of dummy traffic to achieve this 406
Packet Purse Model [Byttayn00MobiHoc] Cost-based approach for motivating collaboration between mobile nodes The packet purse model assigns a cost to each packet transfer Link-level recipient of a packet pays the link-level sender for the service Virtual money (“beans”) used for this purpose Security issues: How to ensure that some node does not sale the same packet to too many people to make money ? How to ensure that each receiver indeed has money to pay for service? 407
- Page 355 and 356: Random Errors May Cause Fast Retran
- Page 357 and 358: Sometimes Congestion Response May b
- Page 359 and 360: Burst Errors May Cause Timeouts If
- Page 361 and 362: Impact of Transmission Errors TCP
- Page 363 and 364: This Tutorial This tutorial consid
- Page 365 and 366: Mobile Ad Hoc Networks Mobility ca
- Page 367 and 368: Impact of Multi-Hop Wireless Paths
- Page 369 and 370: Ideal Throughput f(i) = fraction o
- Page 371 and 372: Impact of Mobility 20 m/s 30 m/s Id
- Page 373 and 374: Actual throughput But not always
- Page 375 and 376: mobility causes link breakage, resu
- Page 377 and 378: B C A Why Does Throughput Improve?
- Page 379 and 380: Network feedback How to Improve Thr
- Page 381 and 382: Actual throughput Performance Impro
- Page 383 and 384: Issues Network Feedback Network kn
- Page 385 and 386: To Cache or Not to Cache Average sp
- Page 387 and 388: Issues To Cache or Not to Cache Ca
- Page 389 and 390: TCP Performance Two factors result
- Page 391 and 392: Issues RTO After Route Repair Same
- Page 393 and 394: Impact of Acknowledgements TCP Ack
- Page 395 and 396: Security Issues 395
- Page 397 and 398: Security Issues in Mobile Ad Hoc Ne
- Page 399 and 400: Resurrecting Duckling [Stajano99]
- Page 401 and 402: Secure Routing Establishing a Cert
- Page 403 and 404: Techniques for Intrusion-Resistant
- Page 405: Intrusion Detection [Zhang00Mobicom
- Page 409 and 410: Existing Implementations Several i
- Page 411 and 412: CMU Implementation: Lessons Learned
- Page 413 and 414: BBN Implementation [Ramanathan00Wcn
- Page 415 and 416: Link layer Implementation Issues: W
- Page 417 and 418: Implementation Issues: Address Assi
- Page 419 and 420: Implementation Issues: Security Ho
- Page 421 and 422: Implementation Issues Only some is
- Page 423 and 424: Distributed Algorithms for Mobile A
- Page 425 and 426: Distributed Algorithms There is al
- Page 427 and 428: Related Standards Activities 427
- Page 429 and 430: Internet Engineering Task Force (IE
- Page 431 and 432: Bluetooth [Haartsen98,Bhagawat00Tut
- Page 433 and 434: Bluetooth: Piconet A channel is ch
- Page 435 and 436: Bluetooth: Scatternet Several pico
- Page 437 and 438: Open Issues in Mobile Ad Hoc Networ
- Page 439 and 440: Related Research Areas Algorithms
- Page 441: Thank you !! For more information,
Packet Purse Model [Byttayn00MobiHoc]<br />
Cost-based approach for motivating collaboration<br />
between mobile nodes<br />
The packet purse model assigns a cost to each<br />
packet transfer<br />
Link-level recipient of a packet pays the link-level sender for<br />
the service<br />
Virtual money (“beans”) used for this purpose<br />
<strong>Security</strong> issues:<br />
How to ensure that some node does not sale the same<br />
packet to too many people to make money ?<br />
How to ensure that each receiver indeed has money to pay<br />
for service?<br />
407