Download File - Computer Networks & Information Security

Download File - Computer Networks & Information Security Download File - Computer Networks & Information Security

mycnis.weebly.com
from mycnis.weebly.com More from this publisher
22.07.2013 Views

Preventing Traffic Analysis [Jiang00iaas,Jiang00tech] Even with encryption, an eavesdropper may be able to identify the traffic pattern in the network Traffic patterns can give away information about the mode of operation Attack versus retreat Traffic analysis can be prevented by presenting “constant” traffic pattern independent of the underlying operational mode May need insertion of dummy traffic to achieve this 406

Packet Purse Model [Byttayn00MobiHoc] Cost-based approach for motivating collaboration between mobile nodes The packet purse model assigns a cost to each packet transfer Link-level recipient of a packet pays the link-level sender for the service Virtual money (“beans”) used for this purpose Security issues: How to ensure that some node does not sale the same packet to too many people to make money ? How to ensure that each receiver indeed has money to pay for service? 407

Packet Purse Model [Byttayn00MobiHoc]<br />

Cost-based approach for motivating collaboration<br />

between mobile nodes<br />

The packet purse model assigns a cost to each<br />

packet transfer<br />

Link-level recipient of a packet pays the link-level sender for<br />

the service<br />

Virtual money (“beans”) used for this purpose<br />

<strong>Security</strong> issues:<br />

How to ensure that some node does not sale the same<br />

packet to too many people to make money ?<br />

How to ensure that each receiver indeed has money to pay<br />

for service?<br />

407

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!