U-NET '09Pub Date : 2009-12-01DOI: 10.1145/1659029.1659032
Damien Leroy, M. Manulis, O. Bonaventure
{"title":"Enhanced wireless roaming security using three-party authentication and tunnels","authors":"Damien Leroy, M. Manulis, O. Bonaventure","doi":"10.1145/1659029.1659032","DOIUrl":"https://doi.org/10.1145/1659029.1659032","url":null,"abstract":"Many organizations and many home users have deployed WiFi networks permitting external users to connect to the Internet through their networks. Such WiFi sharing poses many security risks for the visited network as well as for the visiting user.\u0000 In this paper, we focus on the recently introduced concept for tunneled WiFi roaming in which the infrastructure of the visited network is considered as part of the security architecture. A secure layer-2 tunneling between the user's device and his home network is performed by the visited network only after the successful authentication of all three parties. The authentication protocol provides the mobile device and its home network with a secret key that protects their end-to-end communication. Additionally, it provides another tunnel key, shared with the visited network, that protects the actual traffic exchanged between the visited and home networks and prevents diverse resource consumption attacks against the latter. This concept encourages users to provide roaming service in a more secure and privacy-friendly way. We show how to implement this concept using the IEEE802.11i/EAP framework, based on existing infrastructures and standard tunneling protocols.","PeriodicalId":378194,"journal":{"name":"U-NET '09","volume":"2010 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124991555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
U-NET '09Pub Date : 2009-12-01DOI: 10.1145/1659029.1659034
J. Link, Nicolai Viol, André Goliath, Klaus Wehrle
{"title":"SimBetAge: utilizing temporal changes in social networks for pocket switched networks","authors":"J. Link, Nicolai Viol, André Goliath, Klaus Wehrle","doi":"10.1145/1659029.1659034","DOIUrl":"https://doi.org/10.1145/1659029.1659034","url":null,"abstract":"In this paper, we present SimBetAge, a delay and disruption tolerant routing protocol for highly dynamic socially structured mobile networks. We exploit the lightweight and ego-centric scheme of SimBet routing while at the same time taking the strength and the gradual aging of social relations into account and thereby increase the performance by one order of magnitude, especially in evolving network structures. We explore the model of similarity and betweenness over weighted graphs, and present a simulation on realistic traces from previous experiments, comparing our approach to the original SimBet, Epidemic Routing and Prophet.","PeriodicalId":378194,"journal":{"name":"U-NET '09","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131411307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
U-NET '09Pub Date : 2009-12-01DOI: 10.1145/1659029.1659039
Wolfgang Richter
{"title":"GridDL: an HTTP bandwidth sharing framework","authors":"Wolfgang Richter","doi":"10.1145/1659029.1659039","DOIUrl":"https://doi.org/10.1145/1659029.1659039","url":null,"abstract":"Peer-to-peer (P2P) applications have become a mainstream technology for content distribution. Yet widely used P2P applications, such as BitTorrent and Gnutella, suffer from flaws that are currently open topics of research---from the problem of freeriders to discrimination against peers with asymmetric Internet connections.\u0000 This paper presents the design of Grid-DL---a software framework for studying the new P2P paradigm that focuses not on exchanging content, but on exchanging bandwidth. Grid-DL provides researchers a tool to implement any algorithm for bandwidth sharing or bandwidth trading, while imposing as few limitations as possible on the researchers. Grid-DL creates a P2P network that executes a given algorithm for bandwidth sharing. Grid-DL also provides the first P2P bandwidth sharing application that does not require a pre-existing P2P network or infrastructure other than the individual peers.","PeriodicalId":378194,"journal":{"name":"U-NET '09","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115434737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
U-NET '09Pub Date : 2009-12-01DOI: 10.1145/1659029.1659031
G. Biczók, László Toka, A. Vidács, T. Trinh
{"title":"On incentives in global wireless communities","authors":"G. Biczók, László Toka, A. Vidács, T. Trinh","doi":"10.1145/1659029.1659031","DOIUrl":"https://doi.org/10.1145/1659029.1659031","url":null,"abstract":"The wireless community networking paradigm shows great promise in achieving a global status. However, both user participation and support from traditional Internet Service Providers (ISPs) play key roles in creating worldwide coverage; for this end a viable incentive system is essential. In this paper we study the economic interactions between users, ISPs and community providers. Our main contribution is threefold. First, we propose a model of the global wireless community concept as a Stackelberg game of two levels and construct the respective payoff functions of each player. Second, we show how both users and ISPs may fail to join the community in equilibrium. Third, we explore the parameter space of the mechanism designer and show how the technology diffusion process and expected payoffs can be controlled by adjusting roaming prices and revenue shares.","PeriodicalId":378194,"journal":{"name":"U-NET '09","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117028281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
U-NET '09Pub Date : 2009-12-01DOI: 10.1145/1659029.1659035
Sara Bury, J. Ishmael, N. Race, M. Rouncefield, Paul Smith
{"title":"Reconciling community resource requirements in U-Nets","authors":"Sara Bury, J. Ishmael, N. Race, M. Rouncefield, Paul Smith","doi":"10.1145/1659029.1659035","DOIUrl":"https://doi.org/10.1145/1659029.1659035","url":null,"abstract":"A challenge for future user-provided networks will be reconciling potentially conflicting demands for a finite resource, such as network bandwidth. In this position paper, we discuss how this problem is tackled in an operational community-driven wireless mesh network. A key outcome of this discussion is that, although the approach that has evolved is not ideal, it allows the reconciliation of conflicting demands for use of the shared network to reflect communal concerns; a property we believe is essential to its success, and that of user-provided networks. We argue that user-driven distributed arbitration of requests for resource is necessary in a user-provided network, and via a simple abstraction we discuss design options to enable this. The consequences of incorrect design decisions could negatively impact a network and its community of users. To help us make appropriate design decisions, we could look to scientific methods, such as game theory. However, we find them unable to model the intricacies of communal life, leading us to suggest it is necessary to stop considering users as anonymous rational persons and to start factoring in their personalities and beliefs.","PeriodicalId":378194,"journal":{"name":"U-NET '09","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121638887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
U-NET '09Pub Date : 2009-12-01DOI: 10.1145/1659029.1659037
M. Stiemerling, S. Kiesel
{"title":"A system for peer-to-peer video streaming in resource constrained mobile environments","authors":"M. Stiemerling, S. Kiesel","doi":"10.1145/1659029.1659037","DOIUrl":"https://doi.org/10.1145/1659029.1659037","url":null,"abstract":"Peer-to-Peer based near-live video streaming is becoming more and more popular with users of fixed-line broadband network access, but it is mostly unavailable to mobile users, as cellular networks, such as GPRS/UMTS, cannot meet the bitrate requirements, while other wireless technologies, such as WLAN, may be fast enough but cover only very limited areas. However, there is a small but important set of scenarios, where several mobile users in close physical proximity are interested in retrieving the same content. We propose a P2P-TV system that enables them to retrieve video chunks in a cooperative way. The coordinated and efficient usage of all wireless resources available to a group of mobile hosts is the key to enable P2P-TV in mobile environments. This paper introduces our general concept. Simulation based studies are presented to assess different resource allocation strategies and to demonstrate the feasibility of our approach for delivering near-live TV in resource constrained mobile environments.","PeriodicalId":378194,"journal":{"name":"U-NET '09","volume":"299 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132703416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
U-NET '09Pub Date : 2009-12-01DOI: 10.1145/1659029.1659041
Rute C. Sofia, P. Mendes, S. Panwar, D. Kennedy, J. Vallejo, D. Trossen
{"title":"User-provided networking: challenges and opportunities","authors":"Rute C. Sofia, P. Mendes, S. Panwar, D. Kennedy, J. Vallejo, D. Trossen","doi":"10.1145/1659029.1659041","DOIUrl":"https://doi.org/10.1145/1659029.1659041","url":null,"abstract":"PANEL SUMMARY or OVERVIEW The U-NET’09 workshop is dedicated to the debate of concepts, challenges, and opportunities concerning userprovided networking, i.e., scenarios where users cooperate by sharing wireless resources as well as Internet services. To provide a specific example that relates to Internet access (connectivity), the end-user (or a community of end-users) is a micro-operator in the sense that he/she shares his/her subscribed broadband Internet access based on some form of incentive scheme. In addition, the end-user may or may not provide other network functionality such as local mobility management, or persistent storage and forwarding services. This new role is disruptive in what concerns Internet service models, since there is no distinction between what is today known as end-user device and network device: in the future, end-user devices will actively participate as part of the network. In contrast, the Internet has been up to now mostly the means for end-users to obtain some form of network service, originally related to connectivity, person-to-person communication, or information retrieval. Such user-centric provider role is also disruptive given that the regular network boundaries of trust have to be extended in a way that should mimic social behavior: there is the need to form networks of trust in order to accommodate a robust network growth, given that the key to such growth is the willingness to cooperate.","PeriodicalId":378194,"journal":{"name":"U-NET '09","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127061314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
U-NET '09Pub Date : 2009-12-01DOI: 10.1145/1659029.1659038
M. Fouquet, H. Niedermayer, G. Carle
{"title":"Cloud computing for the masses","authors":"M. Fouquet, H. Niedermayer, G. Carle","doi":"10.1145/1659029.1659038","DOIUrl":"https://doi.org/10.1145/1659029.1659038","url":null,"abstract":"Cloud Computing provides virtual server infrastructures for companies. The intended benefit is that enterprises do not have to buy their own hardware to provide services for their customers. Therefore, end-users usually do not directly access the raw cloud service (Infrastructure as a Service) as of yet, they use derived services instead.\u0000 In this position paper we present a novel way of making cloud-based infrastructure directly useful for end-users by integrating it into peer-to-peer systems. We show one example application which could make use of the cloud without requiring a business relationship between the software vendor and the cloud operator. This software could for example be distributed as open source.","PeriodicalId":378194,"journal":{"name":"U-NET '09","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133413949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}