Networking

A computer networking, or data network, is a digital telecommunications network which allows nodes to share resources.

Exploiting Email Tunnels

SWEET: Serving the Web by Exploiting Email Tunnels

SWEET: Serving the Web by Exploiting Email Tunnels Introduction : Open communications over the Internet pose serious threats to countries with repressive regimes, leading them to develop and deploy censorship mechanisms within their networks. Unfortunately, existing censorship circumvention systems do not provide high availability guarantees to their users, as censors can easily identify, hence disrupt, …

SWEET: Serving the Web by Exploiting Email Tunnels Read More »

Routing in Accumulative

Routing in Accumulative Multi-Hop Networks

Routing in Accumulative Multi-Hop Networks Introduction : This paper investigates the problem of finding optimal paths in single-source single-destination accumulative multi-hop networks. We consider a single source that communicates to a single destination assisted by several relays through multiple hops. At each hop, only one node transmits, while all the other nodes receive the transmitted …

Routing in Accumulative Multi-Hop Networks Read More »

Two Tiered Sensor Networks

Privacy and Integrity Preserving Top-k Query Processing for Two Tiered Sensor Networks

Privacy and Integrity Preserving Top-k Query Processing for Two Tiered Sensor Networks Introduction : Privacy and integrity have been the main road block to the applications of two-tiered sensor networks. The storage nodes, which act as a middle tier between the sensors and the sink, could be compromised and allow attackers to learn sensitive data …

Privacy and Integrity Preserving Top-k Query Processing for Two Tiered Sensor Networks Read More »

Localizing Node Failures

Network Capability in Localizing Node Failures via End-to-End Path Measurements

Network Capability in Localizing Node Failures via End-to-End Path Measurements Introduction : We investigate the capability of localizing node failures in communication networks from binary states (normal/failed) of end-to-end paths. Given a set of nodes of interest, uniquely localizing failures within this set requires that different observable path states associate with different node failure events. …

Network Capability in Localizing Node Failures via End-to-End Path Measurements Read More »

FaceChange

FaceChange: Attaining Neighbour Node Anonymity in Mobile Opportunistic Social Networks With Fine-Grained Control

FaceChange: Attaining Neighbour Node Anonymity in Mobile Opportunistic Social Networks With Fine-Grained Control Introduction : In mobile opportunistic social networks (MOSNs), mobile devices carried by people communicate with each other directly when they meet for proximity-based MOSN services (e.g., file sharing) without the support of infrastructures. In current methods, when nodes meet, they simply communicate …

FaceChange: Attaining Neighbour Node Anonymity in Mobile Opportunistic Social Networks With Fine-Grained Control Read More »

Throughput Optimal Multipath Routing

An Overlay Architecture for Throughput Optimal Multipath Routing

An Overlay Architecture for Throughput Optimal Multipath Routing Introduction : Legacy networks are often designed to operate with simple single-path routing, like the shortest path, which is known to be throughput suboptimal. On the other hand, previously proposed throughput optimal policies (i.e., backpressure) require every device in the network to make dynamic routing decisions. In …

An Overlay Architecture for Throughput Optimal Multipath Routing Read More »