1 A secure model for controlling the hubs in P2P wireless network based on trust value Authors: Y. Liu, N. Xiong, K. Xu, J. H. Park, and C. Lin Source:

Slides:



Advertisements
Similar presentations
1 P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains Authors: P. Dewan and P. Dasgupta Source: IEEE Transactions.
Advertisements

11 Efficient and Secure Certificateless Authentication and Key Agreement Protocol for Hybrid P2P Network Authors: Z. B. Xu and Z. W. Li Source: The 2nd.
Kerberos Assisted Authentication in Mobile Ad-hoc Networks Authors: Asad Amir Pirzada and Chris McDonald Sources: Proceedings of the 27th Australasian.
1 Vol. 01. p Vol. 01. p Vol. 01. p.20.
1 Vol. 03. p Vol. 03. p Vol. 03. p.21.
1 Vol. 02. p Vol. 02. p Vol. 02. p.19.
1 Vol. 03. p Vol. 03. p Vol. 03. p.16.
1 Vol. 02. p Vol. 02. p Vol. 02. p.30.
1 Vol. 03. p Vol. 03. p Vol. 03. p.35.
1 Vol. 02. p Vol. 02. p Vol. 02. p.10.
1 Vol. 01. p Vol. 01. p Vol. 01. p.14.
1 Fingerprint verification Speaker: Shu-Fen Chiou ( 邱淑芬 ) Date:2005/06/03.
S oftware- H ardware I nformation F low T racking + M ulticore Colleen Lewis & Cynthia Sturton SHIFT+M.
T F Select … (5, F) (4, F) (3, F) (2, T) (1, T) … (3, ‘Z’) (2, ‘Y’) (1, ‘X’) … (1, ‘A’)
What is a Computer Network? Two or more computers which are connected together.
1 Analysis of SMTP Connection Characteristics for Detecting Spam Relays Authors: P. J. Sandford, J. M. Sandford, and D. J. Parish Speaker: Shu-Fen Chiou(
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks DAOJING HE, YI GAO, SAMMY CHAN, CHUN CHEN, JIAJUN BU Ad Hoc & Sensor Wireless.
1 A Collaboration Scheme for Making Peer-to-Peer Anonymous Routing Resilient Authors: X. Wang and J. Luo Source: 12th International Conference on Computer.
Design of the multi-level security network switch system which restricts covert channel Conference: Communication Software and Networks (ICCSN), 2011 IEEE.
9/15/2015CS622 - MIRO Presentation1 Wen Xu and Jennifer Rexford Department of Computer Science Princeton University Chuck Short CS622 Dr. C. Edward Chow.
How Kazaa Works The inner workings of Kazaa and other Peer-2-Peer technologies By Troy Jessup.
Computer network is a collection of computing devices that are connected in various ways in order to communicate and share resources Usually, the connections.
Can Cloud Computing be Used for Planning? An Initial Study Authors: Qiang Lu*, You Xu†, Ruoyun Huang†, Yixin Chen† and Guoliang Chen* from *University.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
1 Proteomics: APPROACHES AND IMAGE ANALYSIS TOOLS FOR DRUG DISCOVERY Authors: Sophia R. HE, Edmond J. Breen and Sybille M. N. Hunt Source: ICME 2003, pp.
Title page! By: Chris Macon.
1 Bounding Virus Proliferation in P2P Networks with a Diverse-Parameter Trust Management Scheme Authors: C. Lin and R. C. Roberto Source: IEEE Communications.
1 A peer mutual authentication method on super peer based peer-to- peer network Authors: Byeong-Thaek Oh, Sang-Bong Lee, and Ho-Jin Park Source: IEEE International.
Partition and multi-path transmission-An encryption-free reputation sharing protocol in Gnutella-like peer-to-peer network Author: X. X. Ma, and Z. G.
1 A connection management protocol for promoting cooperation in Peer-to-Peer networks Authors: Murat Karakaya, Ibrahim Korpeoglu, and Ozgur Ulusoy Source:
1 Efficient User Authentication and Key Management for Peer-to- Peer Live Streaming Systems Authors: X. Liu, Y. Hao, C. Lin, and C. Du Source: Tsinghua.
1 Source: Journal of Chemical Information & Computer Sciences, 2003, vol.43, pp Authors: K. Kaczmarek, B. Walczak, S. de Jong, and B. G. M. Vandeginste.
1 Distinct types of diffuse large B-cell lymphoma identified by gene expression profiling Author: Ash A. Alizadeh, Michael B. Eisen et al. Source: Nature.
1 Biometric template selection and update: a case study in fingerprints Source:Pattern Recognition, Vol. 37, 2004, pp Authors: Umut Uludag, Arun.
Local Correlation-based Fingerprint Matching
1 Signature Protocol for Peer-to- peer Massively Multiplayer Online Games Speaker: Shu-Fen Chiou ( 邱淑芬 )
Key Establishment Scheme against Storage-Bounded Adversaries in Wireless Sensor Networks Authors: Shi-Chun Tsai, Wen-Guey Tzeng, and Kun-Yi Zhou Source:
Visual Cryptography for Gray-Level Images by Dithering Techniques
Fair Blind Signature Based Authentication for Super Peer P2P Network Authors: Xiaoliang Wang and Xingming Sun Source: 2009, Information Technology Journal,
Data and Computer Communications Chapter 10 – Circuit Switching and Packet Switching.
Key Pre-distribution Approach in Wireless Sensor Networks Using LU Matrix Authors: Hangyang Dai and Hongbing Xu Source: IEEE Sensor Journal, vol.10, no.8,
1 Reversible and lossless data hiding in the integer wavelet transform domain (Review) Authors: S. Yousefi, H. R. Rabiee, E. Yousefi, and M. Ghanbari Speaker:
1 SepRep: A Novel Reputation Evaluation Model in Peer-to-Peer Networks Authors: Xiaowei Chen, Kaiyong Zhao, and Xiaowen Chu Source: Autonomic and Trusted.
RSA-based password authenticated key exchange protocol Presenter: Jung-wen Lo( 駱榮問 )
1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,
Hellenic Navy Hydrographic Service HELLENIC NAVY HYDROGRAPHIC SERVICE Proposal for consideration for implementing a common Bathymetric Database under the.
1 An Ordered Multi-Proxy Multi-Signature Scheme Authors: Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou Speaker: Shu-Fen Chiou.
1 DCMP: A Distributed Cycle Minimization Protocol for Peer- to-Peer Networks Authors: Zhenzhou Zhu, Panos Kalnis and Spiridon Bakiras Source: IEEE Transactions.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
A Social-Network-Aided Efficient Peer-to-Peer Live Streaming System IEEE/ACM TRANSACTIONS ON NETWORKING, JUNE 2015 Haiying Shen, Yuhua Lin Dept. of Electrical.
1 Block Truncation Coding Using Pattern Fitting Source: Pattern Recognition, vol.37, 2004, pp Authors: Bibhas Chandra Dhara, Bhabatosh Chanda.
RFID Paper presentation The Security of EPC Gen2 Compliant RFID Protocols Source : Applied Cryptography and Network Security, VOL. 5037, 2008, pp
Price range varies from $17.99 to $34.99 or more. Device 1 Device 2 Network Connection.
©Richard L. Goldman Public Key Policies for Windows 2000 ©Richard Goldman December 5, 2001.
1 Constructing trusted virtual execution environment in P2P grids Authors: D. Zou, W. Zheng, J. Long, H. Jin, and X. Chen Source: Future Generation Computer.
Introduction to Networking. What is a Network? Discuss in groups.
Call Us : (Toll Free) Computer tech support | online computer support | free computer help 99% First Call Resolution
ПЕЧЕНЬ 9. Закладка печени в период эмбрионального развития.
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
A New Security Trust Model for Peer-to-Peer E-commerce
Physics-based simulation for visual computing applications
A Secure and Efficient Cloud Resource Allocation Scheme with Trust
A Novel Latin Square-based Secret Sharing for M2M Communications
An efficient biometric based remote user authentication scheme for secure internet of things environment Source: Journal of Intelligent & Fuzzy Systems.
Controllable and Trustworthy Blockchain-based Cloud Data Management
Source: IEEE Access, Vol. 5, pp –14767, July 2017.
Biometrics-based RSA Cryptosystem for Securing Real-Time Communication
Privacy Protection for E-Health Systems by
Rich QR Codes With Three-Layer Information Using Hamming Code
Presentation transcript:

1 A secure model for controlling the hubs in P2P wireless network based on trust value Authors: Y. Liu, N. Xiong, K. Xu, J. H. Park, and C. Lin Source: Computer Communications, vol. 33, pp , 2010 Speaker: Shu-Fen Chiou ( 邱淑芬 )

2 Free riders Free rider

3 Concepts High trust value and low connections can get better quality of service. Prevent free riders

4 Proposed method

5 VaVa Direct trust value

6 Proposed method VaVa Recommend trust value

7 Proposed method Trust value VaVa

8 Proposed method Select resource provider VaVa 

9 Simulation results

10 Comments The free riders can not respond the request msg. Only the initiator considers the trust value of resource provider.