{"title":"Evaluation of anonymity providing techniques using queuing theory","authors":"Dogan Kesdogan","doi":"10.1109/LCN.2001.990801","DOIUrl":"https://doi.org/10.1109/LCN.2001.990801","url":null,"abstract":"In our work we use queuing theory both for security (ie, anonymity) and performance analysis. A well-known anonymity technique, the MIX method, which is the basis of most of today's deployments, is the object of our investigation. We show shortcomings and problems in the MIX method and suggest possible workarounds. Our investigation reveals the level of security of MIX based systems and their performance characteristics on the Internet.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129586412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chih-Kuang Tseng, Kuen-Pin Wu, J. Lin, Chun-yen Chou, F. Lai
{"title":"A constant size rekeying message framework for secure multicasting","authors":"Chih-Kuang Tseng, Kuen-Pin Wu, J. Lin, Chun-yen Chou, F. Lai","doi":"10.1109/LCN.2001.990813","DOIUrl":"https://doi.org/10.1109/LCN.2001.990813","url":null,"abstract":"We propose a new framework for key management to construct a secure multicasting environment. When rekeying, only one message needs to be generated, and the message size is a constant. Especially when the group size is large, our framework largely reduces the traffic in the network. Two solutions are given to carry out this framework, which are closed curve solution (CCS) and perpendicular space solution (PSS), respectively. One is based on a geometric approach and the other on a linear algebraic approach. Our framework is also compatible to other group communication protocols.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130498703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Congestion handling in dynamic Differentiated Services networks","authors":"Markus Albrecht, M. Köster, P. Martini","doi":"10.1109/LCN.2001.990782","DOIUrl":"https://doi.org/10.1109/LCN.2001.990782","url":null,"abstract":"Differentiated Services is a very promising approach to achieve quality of service in the Internet. However, setting up static service level agreements (SLA) between different Internet service provider domains lacks flexibility and may reduce quality of service as resource reservations cannot be adapted to the actual traffic. With the introduction of bandwidth brokers, a significant step towards a completely dynamic Differentiated Services environment has been made. Bandwidth brokers negotiate and automatically set up SLA according to network load and provider policies. Nevertheless, this automatic set-up may fail if there are bottlenecks in the network caused by physical limitations or policy issues and may lead to congestion. In this paper, we propose a scalable mechanism to handle these congestion situations, that uses four phases each solving a different level of congestion. Our mechanism does not need any destination information thus making it applicable for the majority of Internet applications.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132850363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Frank Hoffmann, James Scott, M. Addlesee, G. Mapp, A. Hopper
{"title":"Data transport on the networked surface","authors":"Frank Hoffmann, James Scott, M. Addlesee, G. Mapp, A. Hopper","doi":"10.1109/LCN.2001.990796","DOIUrl":"https://doi.org/10.1109/LCN.2001.990796","url":null,"abstract":"Networked surfaces are surfaces such as desks which provide network connectivity to specially augmented devices, for example handheld computers. When the devices are physically placed on top of the surface, they can connect to different kinds of services-mainly, but not exclusively to send and receive data. This paper discusses challenges in implementing networked surfaces, paying particular attention to data flow issues, focusing on how the various software and hardware entities comprising the surface interact to transport data to and from objects.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130973334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A capacity and utilization study of mobile ad hoc networks","authors":"Nishant Gupta, Samir R Das","doi":"10.1109/LCN.2001.990838","DOIUrl":"https://doi.org/10.1109/LCN.2001.990838","url":null,"abstract":"We develop an empirical technique to determine the capacity of a mobile ad hoc network. We assume that the network runs on-demand routing and carrier sense-based medium access protocols. The technique, however, is general and should apply to other types of protocols. We develop a tool that determines the network capacity given session-level traffic and node mobility traces. We compare the network capacity so determined with the actual network utilization from output statistics generated by a comprehensive simulator. It is observed that network capacity increases with node mobility; but the routing and medium access protocols fail to take advantage of the increased capacity. Even with high loads, a significant portion of the network capacity is not utilized, while the routing performance remains poor. This study indicates that there is a significant scope for designing aggressive routing protocols that utilize the network capacity better to improve routing performance.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"56 37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128251003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Non-intrusive estimation of Web server delays","authors":"James Hall, I. Pratt, I. Leslie","doi":"10.1109/LCN.2001.990790","DOIUrl":"https://doi.org/10.1109/LCN.2001.990790","url":null,"abstract":"We introduce a novel passive network monitoring architecture which enables us to capture and integrate data from different levels of the protocol stack using a probe which can be placed at any arbitrary point in the network. We subject the data gathered to off-line analysis and show how, by modelling the dynamics of the protocols observed, we are able to extract information which would not be available using existing means. We show how the technique can be used to passively measure Web server response latency. Experiments are described which use artificially generated loads to validate the techniques used, and results obtained from the observation of real traffic are presented.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123116571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed environment for Web-based network management","authors":"Flávio Spolidoro, N. Rodriguez","doi":"10.1109/LCN.2001.990766","DOIUrl":"https://doi.org/10.1109/LCN.2001.990766","url":null,"abstract":"The use of scalable management tools is becoming more and more important for integrated management of different network platforms. This work explores the resources of the interpreted language Lua to create a flexible environment for Web-based distributed network management. This environment includes services for monitoring and asynchronous event handling, both available through CORBA interfaces. The dynamic characteristics of our environment allow the administrator to extend or modify functionality without stopping the system, and also to redefine dynamically the group of servers supporting the network management application.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132709727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Signaling protocols for lightpath provisioning","authors":"S. Seetharaman, A. Durresi, R. Jain","doi":"10.1109/LCN.2001.990772","DOIUrl":"https://doi.org/10.1109/LCN.2001.990772","url":null,"abstract":"Challenges presented by the exponential growth of the Internet have resulted in the intense demand for broadband services. Providing bandwidth and connectivity on demand has risen to be an important goal for service providers. To realize this, signaling in the optical network seems to be a critical component. Provisioning involves establishing a circuit from one client end system to another, through the optical backbone. With this general notion, this paper discusses in brief the role of signaling in all-optical networks, which employ DWDM for lower layer transport. The architectural choices pertaining to lightpath services are outlined. Signaling procedures for ensuring dynamic end-to-end lightpath setup have also been presented. Path provisioning comprises a string of operations like service and neighbor discovery, route computation, signaling requests, and path setup. This paper tries to summarize the various strategies, designed for each step, for use in the all-optical networks.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115325300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure mobile IP communication","authors":"T. Braun, Marc Danzeisen","doi":"10.1109/LCN.2001.990839","DOIUrl":"https://doi.org/10.1109/LCN.2001.990839","url":null,"abstract":"This paper describes a solution called secure mobile IP (SecMIP) to provide mobile IP users secure access to their company's firewall protected virtual private network. The solution requires neither the introduction of new protocols nor the insertion or modification of network components. It only requires a slight adaptation of the end system communication software in order to adapt the mobile IP and IP security protocol implementations to each other. The paper describes the concept, prototype implementation, and initial performance measurement results.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114497270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A protocol independent Internet gateway for ad hoc wireless networks","authors":"A. Striegel, R. Ramanujan, J. Bonney","doi":"10.1109/LCN.2001.990774","DOIUrl":"https://doi.org/10.1109/LCN.2001.990774","url":null,"abstract":"An autonomous wireless local area network (AWLAN) is a collection of wireless computers that can be rapidly deployed as an ad hoc network without the aid of any established infrastructure or centralized administration. However, existing routing protocols for such networks neither scale nor function on the Internet. Therefore, a solution is required that provides a gateway between the ad hoc network and the Internet. In this paper, we propose a protocol-independent Internet gateway for ad hoc networks, the Cluster Gateway (CG). The proposed Cluster Gateway (CG) provides Internet access by acting as both a service access point and a Mobile IP foreign agent for ad hoc networks. In this paper, we describe the requirements for supporting the CG in any ad hoc routing protocol, the messages sent in order to provide CG support, and several optional enhancements for the CG. Finally, we briefly describe an implementation of the CG over an existing ad hoc routing protocol.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114670317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}