Self-Organized Aggregation of Wi-Fi Networks Elias C. Efstathiou, Advisor: George C. Polyzos Mobile Multimedia Laboratory, Department of Computer Science.

Slides:



Advertisements
Similar presentations
On the Economics of P2P Systems Speaker Coby Fernandess.
Advertisements

Improving Peer-to-Peer Networks “Limited Reputation Sharing in P2P Systems” “Robust Incentive Techniques for P2P Networks”
Peer-to-Peer Wireless Network Confederation (P2PWNC) George C. Polyzos Mobile Multimedia Laboratory Department of Computer Science Athens.
Elias C. Efstathiou Mobile Multimedia Lab Computer Science Department Athens University of Economics and Business Athens 10434, Greece
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
Trustworthy Accounting for Wireless LAN Sharing Communities Elias C. Efstathiou and George C. Polyzos Mobile Multimedia Laboratory Department of Informatics.
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada Multimedia Streaming in Dynamic Peer-to-Peer Systems and Mobile Wireless.
Διπλωματική Εργασία The Peer-to-Peer Wireless Network Confederation Protocol: Design Specification and Performance Analysis Παρουσίαση: Παντελής Φραγκούδης.
PYP002 Intro.to Computer Science Introduction to Networks1 Networks Chapter 17.
Designing a Peer-to-Peer Wireless Network Confederation Elias C. Efstathiou and George C. Polyzos Department of Computer Science Athens University of Economics.
P2PWNC Wireless Community Network CMSC 711: Computer Networks Yee Lin Tan Adam Phillippy.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
1 Côte d’Azur / France - 21, 22, 23, 24 May 2006 HP OpenView University Association, 13th Workshop Building Secure Media Applications over Wireless Community.
By Abdullah Al-Dossary Ahmad Al-Suhaibani
A Self-Managed Scheme for Free Citywide Wi-Fi Elias C. Efstathiou and George C. Polyzos Mobile Multimedia Laboratory Department of Computer.
A Peer-to-Peer Approach to Wireless LAN Roaming George C. Polyzos Mobile Multimedia Laboratory Department of Informatics Athens University of Economics.
Stimulating Participation in Wireless Community Networks Elias C. Efstathiou, Pantelis A. Frangoudis, George C. Polyzos Mobile Multimedia.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Lecture 12 Security. Summary  PEM  secure  PGP  S/MIME.
A Framework for Cost-Effective Peer-to- Peer Content Distribution Mohamed Hefeeda and Bharat Bhargava Department of Computer Sciences Purdue University.
Peer WLAN Consortium: A P2P Case Study Mobile Multimedia Laboratory Department of Informatics Athens University of Economics & Business Athens MMAPPS Meeting,
What is Commerce? “Seller” “Buyer” Transaction Basic Computer Concepts
Ahmed Nabizadeh. A computer network, often simply referred to as a network, is a collection of hardware components and computers interconnected by communication.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
NETWORKS – NETWORK FUNDAMENTALS. How do computers connect to each other? Wired vs. Wireless Network cards Special device on computer that lets the computer.
Chapter 10: Authentication Guide to Computer Network Security.
Dr. Raimund Ege: Research Summary  Security in the Mobile Context Trust and Access control models Peer-to-peer delivery networks  Opportunities for student.
 Part 1: The definitions of networking -Network -Standalone -LAN -WAN -Clients -Server -Clients/Server Networks -Peer to Peer Networks Part 1NetworkStandaloneLANWANClientsServerClients/Server.
Exploiting super peers for large- scale peer-to-peer Wi-Fi roaming Efstratios G. Dimopoulos, Pantelis A. Frangoudis and George.C.Polyzos.
University of Bologna, Italy How to cheat BitTorrent and why nobody does Simon Patarin and David Hales University of Bologna ECCS 2006,
Business Data Communications, Stallings 1 Chapter 1: Introduction William Stallings Business Data Communications 6 th Edition.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-in 5 NETWORKS and TELECOMMUNICATIONS.
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
A Peer-to-Peer Approach to Sharing Wireless Local Area Networks PhD dissertation Elias C. Efstathiou Adviser: Professor George C. Polyzos Athens University.
Applications of Game Theory for Power Control in Wireless Networks of Autonomous Entities «Το ΟΠΑ Ερευνά», Πρόγραμμα ΗΡΑΚΛΕΙΤΟΣ ΙΙ Vaggelis.
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
Unit – I CLIENT / SERVER ARCHITECTURE. Unit Structure  Evolution of Client/Server Architecture  Client/Server Model  Characteristics of Client/Server.
Annual meeting of GTTI - June 24-26, Ancona, Italy The STEM-Net Project A network element is called a “STEM-Node” when it is able to autonomously.
Dr. V.N.Sastry Professor, IDRBT & Executive Secretary, MPFI to 84 October 30,
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
IP Telephony
Group 3 Sandeep Chinni Arif Khan Venkat Rajiv. Delay Tolerant Networks Path from source to destination is not present at any single point in time. Combining.
ACM SIGACT News Distributed Computing Column 9 Abstract This paper covers the distributed systems issues, concentrating on some problems related to distributed.
Peer-to-Peer Wireless Network Confederation (P2PWNC) Mobile Multimedia Laboratory Athens University of Economics and Business Athens MMAPPS Meeting, September.
® IBM Software Group © 2007 IBM Corporation Best Practices for Session Management
Efficient Labeling Scheme for Scale-Free Networks The scheme in detailsPerformance of the scheme First we fix the number of hubs (to O(log(N))) and show.
P 3 -Coupon: A Probabilistic System for Prompt and Privacy-Preserving Electronic Coupon Distribution Boying ZhangPh.D. Advisor: Dr. Dong Xuan Joint Work.
Project Topics ECE 591. Project 1: Localization through Wi-Fi and Wireless Camera WIFI localization: Wireless Camera: Goal: Understand RF based localization.
Efficient Group Key Management in Wireless LANs Celia Li and Uyen Trang Nguyen Computer Science and Engineering York University.
Interleaving and Collusion Attacks on a Dynamic Group Key Agreement Scheme for Low-Power Mobile Devices * Junghyun Nam 1, Juryon Paik 2, Jeeyeon Kim 2,
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Mobile Peer-to-Peer Video Streaming over Information-Centric Networks The International Journal of Computer and Telecommunications Networking, 2015 Andrea.
CS 347Notes081 CS 347: Parallel and Distributed Data Management Notes 08: P2P Systems.
Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Thomas Repantis Vana Kalogeraki Department of Computer Science & Engineering University.
Security of the Internet of Things: perspectives and challenges
Networks – Network Fundamentals
Presented by Edith Ngai MPhil Term 3 Presentation
A Peer-to-Peer Approach to Wireless LAN Roaming
SECURING WIRELESS LANS WITH CERTIFICATE SERVICES
Distributed Ledger Technology (DLT) and Blockchain
Peer-to-peer networking
Presentation transcript:

Self-Organized Aggregation of Wi-Fi Networks Elias C. Efstathiou, Advisor: George C. Polyzos Mobile Multimedia Laboratory, Department of Computer Science Athens University of Economics and Business Abstract: We present a peer-to-peer (P2P) scheme that could fuel the deployment of free public wireless networks in cities; we call it P2P Wireless Network Confederation (P2PWNC). Unlike existing approaches, P2PWNC does not rely on central planning. In P2PWNC, wireless service is provided to those who provide service to others based on an algorithm that runs in isolation on every peer. 1 Private Wi-Fi networks, connected to the Internet, cover major metropolitan areas We could use one another’s networks to access the Internet Plus, Wi-Fi phones are now available Motorola CN620 2 How to encourage Wi-Fi connection sharing? – “Give to those who give” Design a reciprocity scheme that is – fully self organized – collusion proof – easy to join 3 Participants form small teams, typical teams = households Team IDs are uncertified, no need for authorities Teams operate one or more Wi-Fi access points (APs) Team members sign receipts whenever they access another team’s APs Motivation The Problem Solution Architecture 4 1 1All IDs = unique public/private key (PK/SK) pairs 2 2 Member certificate: 3 3Receipt: 4 4Decision function: Receipt Graph, When to Cooperate? 5 Teams have partial view of receipt graph Teams do not cooperate in a distributed storage scheme and there is no central repository of receipts Must rely on members to disseminate receipts: – members carry a subset of the receipts their team knows about – before requesting service, members transmit these receipts to the prospective provider 6 Assume cost c when providing a unit of service and benefit b when receiving one For various b/c ratios (>1): – let each team follow one of various predefined sharing strategies – let teams interact at random – allow teams to learn, i.e. switch to better-performing strategies When do cooperative strategies outperform non-cooperative ones? Example of a conditionally cooperative strategy from [2] (black) outperforming “never share” (blue) and “always share” (red) 7 Incomplete Information Evolutionary Learning Framework Protocol, Implementation 8 We design, simulate, and implement [2, 3, 4, 5] a self-managed solution for Wi-Fi aggregation, which can be deployed spontaneously Additional information: the Peer-to-Peer Wireless Network Confederation section at and via to (Elias Efstathiou) [1] Feldman, Lai, Stoica, Chuang, Robust Incentive Techniques for Peer-to-Peer Networks, Proc. ACM EC’04. [2] Efstathiou, Polyzos, Self-Organized Peering of Wireless LAN Hotspots, European Transactions on Telecommunications (special issue on Self-Organization in Mobile Networking, in press). [3] Efstathiou, Frangoudis, Polyzos, in preparation. [4] Antoniadis, Courcoubetis, Efstathiou, Polyzos, Strulo, Peer-to-Peer Wireless LAN Consortia: Economic Modelling and Architecture, Proc. IEEE P2P’03. [5] Efstathiou, Polyzos, A Peer-to-Peer Approach to Wireless LAN Roaming, Proc. ACM MobiCom WMASH’03. Summary, Contact, References Simple text-based protocol [3]: – CONN: Client requests service from access point (AP) (request includes member certificate) – CACK: Positive/negative response from AP – RREQ: AP requests an updated receipt for the current session (thus splitting consumer/provider risk) – RCPT: Client transmits a stored or a newly signed receipt – UPDT: Client requests latest receipts from own team Wi-Fi network view Team view : Wi-Fi access point : team member White team Green team Blue team White team PK Green member cert Signed by Green member SK Green team AP: “Should I cooperate with the member from the Blue team who is requesting service?” B W G Y X Z Timestamp Weight timestamp volume of traffic member PK team PK signed by team SK providing team PK consumer cert. signed by consumer SK timestamp volume of traffic 5 5 consult receipt graph: receipt graph contains the community’s history graph arrows encode the owes to relationship we study collusion-proof reciprocity strategies [1] that allow the evolution of cooperation ? 6 AP code runs on the Linux-based Linksys WRT54GS AP Keys and certificates based on Elliptic Curve Cryptography (Receipt size: 150 bytes)