P 3 -Coupon: A Probabilistic System for Prompt and Privacy-Preserving Electronic Coupon Distribution Boying ZhangPh.D. Advisor: Dr. Dong Xuan Joint Work.

Slides:



Advertisements
Similar presentations
Enhancing Security Using Mobile Based Anomaly Detection in Cellular Mobile Networks Bo Sun, Fei Yu, KuiWu, Yang Xiao, and Victor C. M. Leung. Presented.
Advertisements

PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval Prateek Mittal University of Illinois Urbana-Champaign Joint work with: Femi.
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
Application of Bayesian Network in Computer Networks Raza H. Abedi.
The Future Internet: A clean-slate design? Nicholas Erho.
1 Routing Techniques in Wireless Sensor networks: A Survey.
Massively Distributed Database Systems Distributed Hash Spring 2014 Ki-Joune Li Pusan National University.
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
Rev A8/8/021 ABC Networks
Zhang Fu, Marina Papatriantafilou, Philippas Tsigas Chalmers University of Technology, Sweden 1 ACM SAC 2010 ACM SAC 2011.
Secure Mobile Networking Lab Exercise / Project Winter 2010 Kick-off meeting Prof. Dr.-Ing. Matthias Hollick Technische Universität Darmstadt Secure Mobile.
More routing protocols Alec Woo June 18 th, 2002.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
A Distributed Search Service for Peer-to-Peer File Sharing in Mobile Application Presented by Tony Sung On Loy, MC Lab, CUHK IE 1 A Distributed Search.
On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems.
CS 672 Paper Presentation Presented By Saif Iqbal “CarNet: A Scalable Ad Hoc Wireless Network System” Robert Morris, John Jannotti, Frans Kaashoek, Jinyang.
Self-Organized Aggregation of Wi-Fi Networks Elias C. Efstathiou, Advisor: George C. Polyzos Mobile Multimedia Laboratory, Department of Computer Science.
User-level Internet Path Diagnosis R. Mahajan, N. Spring, D. Wetherall and T. Anderson.
Secure Overlay Services Adam Hathcock Information Assurance Lab Auburn University.
Practical Network Support for IP Traceback Internet Systems and Technologies - Monitoring.
RFID Cardinality Estimation with Blocker Tags
A Survey of Mobile Phone Sensing Michael Ruffing CS 495.
Mark W. Propst Scientific Research Corporation.  Attack Motivations  Vulnerability Classification  Traffic Pattern Analysis  Testing Barriers  Concluding.
Dynamic Load Balancing through Association Control of Mobile Users in WiFi Network Presenter: Chia-Ming Lu Huazhi Gong, Student Member, IEEE, Jong Won.
R 18 G 65 B 145 R 0 G 201 B 255 R 104 G 113 B 122 R 216 G 217 B 218 R 168 G 187 B 192 Core and background colors: 1© Nokia Solutions and Networks 2014.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Multi-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment Dewan Tanvir Ahmed and Shervin Shirmohammadi Distributed & Collaborative Virtual.
09/07/2004Peer-to-Peer Systems in Mobile Ad-hoc Networks 1 Lookup Service for Peer-to-Peer Systems in Mobile Ad-hoc Networks M. Tech Project Presentation.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Profiles and Multi-Topology Routing in Highly Heterogeneous Ad Hoc Networks Audun Fosselie Hansen Tarik Cicic Paal Engelstad Audun Fosselie Hansen – Poster,
A Distributed Scheduling Algorithm for Real-time (D-SAR) Industrial Wireless Sensor and Actuator Networks By Kiana Karimpour.
Stochastic sleep scheduling (SSS) for large scale wireless sensor networks Yaxiong Zhao Jie Wu Computer and Information Sciences Temple University.
A Privacy-Preserving Interdomain Audit Framework Adam J. Lee Parisa Tabriz Nikita Borisov University of Illinois, Urbana-Champaign WPES 2006.
© 2009 Mobile VCE 6 October 2011 Core 4 Secure Applications ‘Instant Knowledge’ Programme Achievements Nigel Jefferies Huawei.
TurfCast: A Service for Controlling Information Dissemination in Wireless Networks Xinfeng Li, Jin Teng, Boying Zhang, Adam Champion and Dong Xuan IEEE.
Using the Small-World Model to Improve Freenet Performance Hui Zhang Ashish Goel Ramesh Govindan USC.
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada Video Streaming over Cooperative Wireless Networks Mohamed Hefeeda (Joint.
SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG.
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
Application Policy on Network Functions (APONF) G. Karagiannis and T.Tsou 1.
Large-Scale IP Traceback in High-Speed Internet : Practical Techniques and Theoretical Foundation Jun (Jim) Xu Networking & Telecommunications Group College.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Taiming Feng, Chuang wang, Wensheng Zhang and Lu Ruan INFOCOM 2008 Presented by Mary Nader.
PRISM: Private Retrieval of the Internet’s Sensitive Metadata Ang ChenAndreas Haeberlen University of Pennsylvania.
User-Centric Data Dissemination in Disruption Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania State University.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
Rendezvous Regions: A Scalable Architecture for Service Location and Data-Centric Storage in Large-Scale Wireless Sensor Networks Karim Seada, Ahmed Helmy.
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
1 Service Sharing with Trust in Pervasive Environment: Now it’s Time to Break the Jinx Sheikh I. Ahamed, Munirul M. Haque and Nilothpal Talukder Ubicomp.
1 Utilizing Shared Vehicle Trajectories for Data Forwarding in Vehicular Networks IEEE INFOCOM MINI-CONFERENCE Fulong Xu, Shuo Gu, Jaehoon Jeong, Yu Gu,
E-Shadow: Lubricating Social Interaction using Mobile Phones Jin TengPh.D. Advisor: Dr. Dong Xuan Joint Work with Boying Zhang, Xinfeng Li, Xiaole Bai.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
A Protocol for Packet Network Intercommunication Wei Zhang
KAIS T Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks Wei Wang, Vikram Srinivasan, Kee-Chaing Chua MobiCom ‘05 Presentation by.
Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
November 4, 2003Applied Research Laboratory, Washington University in St. Louis APOC 2003 Wuhan, China Cost Efficient Routing in Ad Hoc Mobile Wireless.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
Unpredictable Software-based Attestation Solution for Node Compromise Detection in Mobile WSN Xinyu Jin 1 Pasd Putthapipat 1 Deng Pan 1 Niki Pissinou 1.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
Congestion Avoidance with Incremental Filter Aggregation in Content-Based Routing Networks Mingwen Chen 1, Songlin Hu 1, Vinod Muthusamy 2, Hans-Arno Jacobsen.
PATH DIVERSITY WITH FORWARD ERROR CORRECTION SYSTEM FOR PACKET SWITCHED NETWORKS Thinh Nguyen and Avideh Zakhor IEEE INFOCOM 2003.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
Ing-Ray Chen, Member, IEEE, Hamid Al-Hamadi Haili Dong Secure and Reliable Multisource Multipath Routing in Clustered Wireless Sensor Networks 1.
Authors – Johannes Krupp, Michael Backes, and Christian Rossow(2016)
Routing In Wireless Mesh Networks
Amar B. Patel , Shushan Zhao
Dhruv Gupta EEC 273 class project Prof. Chen-Nee Chuah
Network-Wide Routing Oblivious Heavy Hitters
Presentation transcript:

P 3 -Coupon: A Probabilistic System for Prompt and Privacy-Preserving Electronic Coupon Distribution Boying ZhangPh.D. Advisor: Dr. Dong Xuan Joint Work with Jin Teng, Xiaole Bai, Zhimin Yang Electronic Coupon Distribution System Key Factors of Large Scale Distribution A Straightforward Solution Our Solution Incentive Design Implementation Evaluations Related Work Future Work  Preliminaries  Electronic coupon is similar to paper coupons and stored on mobile phones.  Electronic coupons are shared as people come into contact with each other.  If a coupon is redeemed, all forwarders will be rewarded by the store.  Working scenario  Incentives  Encouraging more forwarding behavior  Privacy-preserving  Maintaining all forwarders’ motivation  Recording all forwarders’ IDs in the coupon  However……  Recording the entire forwarding path Private social interactions exposed  Not recording entire the forwarding path Incentives not guaranteed A Dilemma!  Probabilistic sampling on a forwarding path  Keeping only one forwarder for each coupon  Probabilistically flipping coupon ownership at each hop  Reasoning  Statistically meting out individual rewards with enough coupons  Forwarding path information dynamically changed Workflow  Goal  Accurately meting out each forwarder’s reward based on store policy  Always-Flip Model  The coupon ownership always flips with certain probability P i at each hop i.  P i is calculated conforming to each store’s rewarding policy, e.g. the parent forwarder receives k times the reward given to children forwarders.  One-Flip Model  Once flipped at hop i, a coupon’s ownership is fixed in a forwarding path.  P i is calculated conforming to each store’s rewarding policy, e.g. a user at hop i gets q i percent of the total reward.  Comparison of two rewarding schemes  Always-Flip model is good for realizing store policies whose rewards distribution is relevant to the whole path length  One-Flip model is good for realizing store policies whose rewards distribution is irrelevant to the whole path length  Developing tools: J2ME+Sun Java Wireless Toolkit  Mobile phones: Samsung (SGH-i550), Nokia (N82, 6650, N71x) System Architecture Coupon Format  Small-scale experiment results  Coupon forwarding time: avg s  Power consumption: Nokia N82 last 25 hours with our system running in background  Large-scale simulation results  Major results: small deviation between theoretical and actual reward distribution (50-coupon in 5000-people) Always-Flip Model One-Flip ModelCoupon Forwarding Time  Incentive design  Security and privacy protection  Deployment and commercialization Publications: Boying Zhang, Jin Teng, Xiao Bai, Zhimin Yang and Dong Xuan. “P 3 -Coupon: A Probabilistic System for Prompt and Privacy-preserving Electronic Coupon Distribution”, in IEEE PerCom11.  Peer-to-peer electronic coupon distribution system [1]  Recording the entire forwarding path for rewards distribution  Probabilistic packet marking scheme [2]  Designed for IP traceback, aiming to recover the attack route using fixed marking probability [1] A. Garyfalos and K. C. Almeroth, “Coupons: A multilevel incentive scheme for information dissemination in mobile networks”. In IEEE Transactions of Mobile Computing, [2] S. Savage, D. Wetherall, A. Karlin, and T. Anderson, “Practical network support for IP traceback”. In Proceedings of ACM SIGCOMM, 2000.