Team C.O.B.R.A. Derrick Chiu Matthew Denker Kyle Morse Mark Srebro.

Slides:



Advertisements
Similar presentations
Project Wrap-up Module 5 Project Wrap Up
Advertisements

Hash Tables CSC220 Winter What is strength of b-tree? Can we make an array to be as fast search and insert as B-tree and LL?
Microsoft Dynamics® SL
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
Lecture 6 Hashing. Motivating Example Want to store a list whose elements are integers between 1 and 5 Will define an array of size 5, and if the list.
SKIP GRAPHS Slides adapted from the original slides by James Aspnes Gauri Shah.
JOSE Open Issue Discussion Chairs Jim Schaad. Process Room vote for Closure – Three Choices for topics We adopt the change We reject the change We discuss.
Scribe: A Large-Scale and Decentralized Application-Level Multicast Infrastructure Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, and Antony L. T.
Progress Report Wireless Routing By Edward Mulimba.
INTRODUCTION COMPUTATIONAL MODELS. 2 What is Computer Science Sciences deal with building and studying models of real world objects /systems. What is.
HASH ALGORITHMS - Chapter 12
CS 307 Fundamentals of Computer Science 1 Abstract Data Types many slides taken from Mike Scott, UT Austin.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
Computational Astrophysics: Methodology 1.Identify astrophysical problem 2.Write down corresponding equations 3.Identify numerical algorithm 4.Find a computer.
Sets and Maps Chapter 9. Chapter 9: Sets and Maps2 Chapter Objectives To understand the Java Map and Set interfaces and how to use them To learn about.
Cryptography and Network Security (CS435) Part Ten (Hash and MAC algorithms)
1 Analysis of the Linux Random Number Generator Zvi Gutterman, Benny Pinkas, and Tzachy Reinman.
Authenticating streamed data in the presence of random packet loss March 17th, Philippe Golle, Stanford University.
Security & Efficiency in Ad- Hoc Routing Protocol with emphasis on Distance Vector and Link State. Ayo Fakolujo Wichita State University.
Secure Routing in Ad Hoc Wireless Networks
1 Load Balance and Efficient Hierarchical Data-Centric Storage in Sensor Networks Yao Zhao, List Lab, Northwestern Univ Yan Chen, List Lab, Northwestern.
1 Load Balance and Efficient Hierarchical Data-Centric Storage in Sensor Networks Yao Zhao, List Lab, Northwestern Univ Yan Chen, List Lab, Northwestern.
Wide-area cooperative storage with CFS
1 ES 314 Advanced Programming Lec 2 Sept 3 Goals: Complete the discussion of problem Review of C++ Object-oriented design Arrays and pointers.
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
C.O.B.R.A. Kyle Morse Matthew Denker Mark Srebro Derrick Chiu.
Effizientes Routing in P2P Netzwerken Chord: A Scalable Peer-to- peer Lookup Protocol for Internet Applications Dennis Schade.
1 Hash Tables  a hash table is an array of size Tsize  has index positions 0.. Tsize-1  two types of hash tables  open hash table  array element type.
Routing and Routing Protocols Dynamic Routing Overview.
NECP: the Network Element Control Protocol IETF WREC Working Group November 11, 1999.
Routing and Routing Protocols Routing Protocols Overview.
M.Menelaou CCNA2 ROUTING. M.Menelaou ROUTING Routing is the process that a router uses to forward packets toward the destination network. A router makes.
Performance Analysis of AODV and SAODV Routing Protocols in Ad-Hoc Mesh Networks- A Simulation Study Sangeeta Ghangam Division of Computing Studies, Arizona.
Hash and MAC Algorithms Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 12/3/2009 INCS 741: Cryptography 12/3/20091Dr. Monther Aldwairi.
Chapter 3 List Stacks and Queues. Data Structures Data structure is a representation of data and the operations allowed on that data. Data structure is.
DNA REASSEMBLY Using Javaspace Sung-Ho Maeung Laura Neureuter.
Hashing Chapter 20. Hash Table A hash table is a data structure that allows fast find, insert, and delete operations (most of the time). The simplest.
Chapter 5: Hashing Collision Resolution: Separate Chaining Mark Allen Weiss: Data Structures and Algorithm Analysis in Java Lydia Sinapova, Simpson College.
Hash and MAC Functions CS427 – Computer Security
Confidentiality Confidentiality is maintained so long as private keys are secure. Authenticity is possible via public-key encryption by encrypting messages.
“Enthusiasm releases the drive to carry you over obstacles and adds significance to all you do.” – Norman Vincent Peale Thought for the Day.
Middleware for Secure Environments Presented by Kemal Altıntaş Hümeyra Topcu-Altıntaş Osman Şen.
Can’t provide fast insertion/removal and fast lookup at the same time Vectors, Linked Lists, Stack, Queues, Deques 4 Data Structures - CSCI 102 Copyright.
Hashing Hashing is another method for sorting and searching data.
File Processing - Hash File Considerations MVNC1 Hash File Considerations.
The new protocol of freenet Taken from Ian Clarke and Oskar Sandberg (The Freenet Project)
Chapter 5: Hashing Part I - Hash Tables. Hashing  What is Hashing?  Direct Access Tables  Hash Tables 2.
Chapter 11 Hash Tables © John Urrutia 2014, All Rights Reserved1.
SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.
Routing Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific Institute of Information.
Chapter 5: Hashing Collision Resolution: Open Addressing Extendible Hashing Mark Allen Weiss: Data Structures and Algorithm Analysis in Java Lydia Sinapova,
Collections Data structures in Java. OBJECTIVE “ WHEN TO USE WHICH DATA STRUCTURE ” D e b u g.
UNIT 5.  The related activities of sorting, searching and merging are central to many computer applications.  Sorting and merging provide us with a.
Hashtables. An Abstract data type that supports the following operations: –Insert –Find –Remove Search trees can be used for the same operations but require.
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
CS440 Computer Networks 1 Link State Routing and OSPF Neil Tang 10/31/2008.
1 Networking and Internetworking Devices we need networking and internetworking devices to extend physical distance and to improve efficiency and manageability.
Data Structures and Algorithms Instructor: Tesfaye Guta [M.Sc.] Haramaya University.
S E A D Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks Yih-Chun Hu,David B.Johnson, Adrian Perrig.
Whatsapp Security Ahmad Hijazi Systèmes de Télécommunications & Réseaux Informatiques (STRI) 20 April 2016.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
Building Java Programs Generics, hashing reading: 18.1.
Lecture 13 review Explain how distance vector algorithm works.
Hash table another data structure for implementing a map or a set
Hash Tables.
Resolving collisions: Open addressing
DISCRETE ASCENT OPTIMAL PROGRAMMING APPLIED TO NETWORK CONFIGURATION IN ELECTRICAL DISTRIBUTION SYSTEMS B. A. Souza H. A. Ferreira H. N. Alves.
Presentation transcript:

Team C.O.B.R.A. Derrick Chiu Matthew Denker Kyle Morse Mark Srebro

Overview of Project  Secure Efficient Distance Vector Based Routing Destination Sequence Distance Vector  Game

Goals  Develop Algorithm  Research Improvements  Visualize

Improvements  Load Balancing Distribute routing tasks evenly through network Extend overall battery life of adhoc devices in network

Improvements  Hash Chain: R  H0  H1  H2  H3  …  Hn-2  Hn-1 R = random root n = chain length  Naïve approaches: Calculate chain up to element needed Store entire chain

Improvements  Our approach: Store only key elements from chain Find nearest key element and use to calculate needed element  6k element chain, every 60th: Memory:  60x less Hash operations, average:  3000 vs. 27

Improvements

Metrics  The Grand Equation

Hash Algorithms  MD5  SHA-160/256/384  RIPEMD-128/160  Tiger  Whirlpool  HAVAL-256-3/4/5

Improvements

Metric Equation results:  Original Value:  New Efficient Value (RIPEMD-128):  New Secure Value (SHA-256):  % Efficient Improvement:  % Secure Improvement:

Goals met?  A resounding yes  Seven hashing algorithms tested  Visualization/game demo later  Improvements Hashing Network Load

Lessons Learned  Planning is like money: you can never have enough.  Communication is more of the same.  Setting numerous short term goals is more effective than numerous long term goals.

Changes  Add Advanced Visualization More tests (Load Balancing) Support for Generics  Remove Unnecessary Hash Algorithms Testing Code (for actual release)

The Future  Further hashing improvements  Implementing more demonstrations  Honing metric to include general improvements

Demo!