1 Côte d’Azur / France - 21, 22, 23, 24 May 2006 HP OpenView University Association, 13th Workshop Building Secure Media Applications over Wireless Community.

Slides:



Advertisements
Similar presentations
Context-Aware Resource Management for Mobile Servers C. Ververidis, E.C. Efstathiou, S. Soursos and G.C. Polyzos Mobile Multimedia Laboratory Department.
Advertisements

Chapter 5 Networks. Learning Objectives After reading this chapter the reader should be able to: Understand the importance of networks in the field of.
Issues of Security and Privacy in Networking in the CBA Karen Sollins Laboratory for Computer Science July 17, 2002.
Peer-to-Peer Wireless Network Confederation (P2PWNC) George C. Polyzos Mobile Multimedia Laboratory Department of Computer Science Athens.
Trustworthy Accounting for Wireless LAN Sharing Communities Elias C. Efstathiou and George C. Polyzos Mobile Multimedia Laboratory Department of Informatics.
Quality of Service Issues in Multi-Service Wireless Internet Links George Xylomenos and George C. Polyzos Department of Informatics Athens University of.
Session 4f, 16 th June 2010 Future Network & MobileSummit 2010 Copyright 2010 Mobile Multimedia Laboratory Socket Emulation over a Publish/Subscribe Network.
Designing a Peer-to-Peer Wireless Network Confederation Elias C. Efstathiou and George C. Polyzos Department of Computer Science Athens University of Economics.
Blog A Blog is a website where entries are written in chronological order and commonly displayed in reverse chronological order.
A Self-Managed Scheme for Free Citywide Wi-Fi Elias C. Efstathiou and George C. Polyzos Mobile Multimedia Laboratory Department of Computer.
A Peer-to-Peer Approach to Wireless LAN Roaming George C. Polyzos Mobile Multimedia Laboratory Department of Informatics Athens University of Economics.
Stimulating Participation in Wireless Community Networks Elias C. Efstathiou, Pantelis A. Frangoudis, George C. Polyzos Mobile Multimedia.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Chapter 6 Network Address Translation (NAT). Network Address Translation  Modification of source or destination IP address  Needed by networks using.
Self-Organized Aggregation of Wi-Fi Networks Elias C. Efstathiou, Advisor: George C. Polyzos Mobile Multimedia Laboratory, Department of Computer Science.
A Framework for Cost-Effective Peer-to- Peer Content Distribution Mohamed Hefeeda and Bharat Bhargava Department of Computer Sciences Purdue University.
Sujeeth Narayan1 Smartphones Security CS 691 Sujeeth Narayan.
Peer WLAN Consortium: A P2P Case Study Mobile Multimedia Laboratory Department of Informatics Athens University of Economics & Business Athens MMAPPS Meeting,
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Cellular IP: Proxy Service Reference: “Incorporating proxy services into wide area cellular IP networks”; Zhimei Jiang; Li Fung Chang; Kim, B.J.J.; Leung,
Chapter CHAPTER SEVEN OVERVIEW SECTION NETWORKS AND TELECOMMUNICATIONS  Network Basics  Voice over IP  Networking Businesses  Increasing.
Voice & Data Convergence Network Services January 11, 2001.
* The Internet’s genesis - Defense Department project to create a network that could survive a nuclear conflict * The first users - Government agencies.
Web2forDev Learning Opportunity [venue], [date] CTA is an ACP-EU institution working in the field of information for development. It operates under the.
Lecture 1 Internet CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger and Daniel Zappala Lecture 1 Introduction.
CHAPTER OVERVIEW SECTION 7.1 – Connectivity: The Business Value of a Networked World Overview of a Connected World Benefits of a Connected World Challenges.
Computer Network By Tahir Saad. Introduction to computer networking Content : The definitions of networking Use of network Network classification.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
Exploiting super peers for large- scale peer-to-peer Wi-Fi roaming Efstratios G. Dimopoulos, Pantelis A. Frangoudis and George.C.Polyzos.
1 MultimEDia transport for mobIlE Video AppLications 9 th Concertation Meeting Brussels, 13 th February 2012 MEDIEVAL Consortium.
Computing Department A Utility-based QoS Model for Emerging Multimedia Applications Mu Mu, Andreas Mauthe Computing Department, Lancaster University Lancaster,
“Securing IP Multimedia Subsystem (IMS) infrastructures …,” M. Tsagkaropoulos UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
19/09/2015 NGN related standardization issues: Service Platform TTA (Korea) GSC-9, Seoul 1 SOURCE: KT TITLE:NGN related standardization issues:
Chapter 7 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Networks, Telecommunications, and Mobile Technology.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Lector: Aliyev H.U. Lecture №15: Telecommun ication network software design multimedia services. TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES THE DEPARTMENT.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 7 NETWORKS, TELECOMMUNICATIONS, AND MOBILE TECHNOLOGY CHAPTER 7 NETWORKS,
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
IT 351 Mobile &Wireless Computing Semester 1, Dr. Hala Mokhtar Room th floor.
Lalit Sharma, JIM The Internet and World Wide Web: E-commerce Infrastructure.
Doc.: IEEE /137r2 Submission June 2000 Tim Godfrey, IntersilSlide 1 TGe Requirements Version r2 8 June 2000.
Towards Exploiting User- Centric Information for Proactive Caching in Mobile Networks ‡ , WWRF28, Athens Xenofon Vasilakos Xenofon Vasilakos,
Internet Real-Time Laboratory Arezu Moghadam and Suman Srinivasan Columbia University in the city of New York 7DS System Design 7DS system is an architecture.
Peer-to-Peer Wireless Network Confederation (P2PWNC) Mobile Multimedia Laboratory Athens University of Economics and Business Athens MMAPPS Meeting, September.
Teachers Name : Suman Sarker Telecommunication Technology Subject Name : Mobile & Wireless Communication-2 Subject Code : 9471 Semester :7th Department.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
1 A VPN based approach to secure WLAN access John Floroiu
Standards and Protocols Slide show for WiFi Characteristics of a wireless local network. It was named after a group of people who invented. The.
For Wi-Fi The is internationally describing characteristics of a wireless local network. It was named after a group of people who invented.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Advanced Computer Network
Doc.: IEEE /345r0 Submission May 2002 Albert Young, Ralink TechnologySlide 1 Enabling Seamless Hand-Off Across Wireless Networks Albert Young.
3G wireless system  Speeds from 125kbps-2Mbps  Performance in computer networking (WCDMA, WLAN Bluetooth) & mobile devices area (cell.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 27 November 23, 2004.
Digital Planet: Tomorrow’s Technology and You Chapter 8 Networking and Digital Communication Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
Multimedia Wireless Network (Chapter 1. Multimedia Application) 2009 년 9 월.
WIDER 3 WiFi in Disaster and Emergency Response Anders Bäck Muhammad Ali Beyhan Kochali Xin Bai David Tlahuetl WiFi in Disaster and Emergency Response.
Voice Over Internet Protocol Nelson Kattula Computer Science, Masters.
INTERNET PROTOCOL TELEVISION (IP-TV)
A Peer-to-Peer Approach to Wireless LAN Roaming
Basic Computer Network
Transfer of data in ICT systems
SECURING WIRELESS LANS WITH CERTIFICATE SERVICES
Basic Computer Network
Computer Networking A computer network, often simply referred to as a network, is a collection of computers and devices connected by communications channels.
Computer Networking A computer network, often simply referred to as a network, is a collection of computers and devices connected by communications channels.
Presentation transcript:

1 Côte d’Azur / France - 21, 22, 23, 24 May 2006 HP OpenView University Association, 13th Workshop Building Secure Media Applications over Wireless Community Networks E.C. Efstathiou, F.A. Elianos, P.A. Frangoudis, V.P. Kemerlis, D.C. Paraskevaidis, G.C. Polyzos, E.C. Stefanis Mobile Multimedia Laboratory Department of Computer Science Athens University of Economics and Business GR Athens, Greece

2 Côte d’Azur / France - 21, 22, 23, 24 May 2006 HP OpenView University Association, 13th Workshop Agenda Motivation Distinctive Characteristics Prior Work QoS Enhancements Secure Decentralized VoIP Local Content Services

3 Côte d’Azur / France - 21, 22, 23, 24 May 2006 HP OpenView University Association, 13th Workshop Motivation Many private WLANs in cities Connected to DSL/Cable links Secured Underutilized Wireless Community Networks Wireless backbone – long distance point-to-point links Operated by volunteers/WLAN enthusiasts Variety of services to members Citywide coverage

4 Côte d’Azur / France - 21, 22, 23, 24 May 2006 HP OpenView University Association, 13th Workshop Distinctive Characteristics Peer-to-Peer Wireless Network Confederation: An incentive scheme for WLAN sharing Relies on (indirect) service reciprocity Fully decentralized User identifiers: Disposable public/private key pairs Metropolitan WLAN coverage through private WLANs Internet access & VoIP to pedestrians through DSL/WLAN internet connection sharing Complementary services to GSM Open protocol specification Accounting based on digital “receipts” Implementation on top of common WLAN equipment and WLAN-enabled smartphones (e.g. QTEK 9100 and similar)

5 Côte d’Azur / France - 21, 22, 23, 24 May 2006 HP OpenView University Association, 13th Workshop Prior Work Centralized design P2PWNC protocol specification (first version) Early P2PWNC implementation Performance analysis of maximum-flow based reciprocity algorithms and cryptographic operations Presented at HPOVUA 2005

6 Côte d’Azur / France - 21, 22, 23, 24 May 2006 HP OpenView University Association, 13th Workshop QoS Enhancements QoS levels to punish/reward roamers Traffic Shaping – protecting WLAN resources P2PWNC protocol extensions Implementation: Application-level daemon based on Linux iproute/tc Use classic algorithms such as HTB, SFQ…

7 Côte d’Azur / France - 21, 22, 23, 24 May 2006 HP OpenView University Association, 13th Workshop Secure Decentralized VoIP Decentralized architecture for secure mobile multimedia Traffic secured from AP eavesdropping End-to-end security possible with minor modifications Free/Secure complementary service to GSM VoIP call setup details: W1, W2 open secure VPN connections to H1, H2 W1 (caller) sends GSM SMS to W2 with caller’s home IP address W2 starts VoIP stream through H2 to H1 Port forwarding is set up at H1 and H2

8 Côte d’Azur / France - 21, 22, 23, 24 May 2006 HP OpenView University Association, 13th Workshop Local Content Services Over P2PWNC Content services Entertainment Video streaming, Podcasting Location-based services Information about nearby venues Accounting scheme Keeping P2PWNC receipt-based accounting Differentially-charged classes of services Assumption Internet traffic more costly to operator than (local) content services traffic Motivation Inexpensive operation for content services Valuable receipts earned