Term Projects Cs5090: Advanced Computer Networks, fall 2004 Department of Computer Science Michigan Tech University Byung Choi.

Slides:



Advertisements
Similar presentations
ACHIEVING NETWORK LEVEL PRIVACY IN WIRELESS SENSOR NETWORKS.
Advertisements

Josh Alcorn Larry Brachfeld An in depth review of ad hoc mobile network & cloud security concerns.
CS223 Advanced Data Structures and Algorithms 1 Greedy Algorithms Neil Tang 4/8/2010.
David B. Johnson Rice University Department of Computer Science DSR Status Update Monarch Project 55th.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
Small Worlds Presented by Geetha Akula For the Faculty of Department of Computer Science, CALSTATE LA. On 8 th June 07.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
EECS 122 Communications Networks Department of Electrical Engineering and Computer Sciences University of California Berkeley Slides: K. Fall, K. Lai,
PSMC Proxy Server-based Multipath Connection CS 526 Advanced Networking - Richard White.
CSE331: Introduction to Networks and Security Lecture 14 Fall 2002.
MANETs A Mobile Ad Hoc Network (MANET) is a self-configuring network of mobile nodes connected by wireless links. Characteristics include: no fixed infrastructure.
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering.
Mobility Increases Capacity In Ad-Hoc Wireless Networks Lecture 17 October 28, 2004 EENG 460a / CPSC 436 / ENAS 960 Networked Embedded Systems & Sensor.
Secure Routing in Ad Hoc Wireless Networks
Welcome to CS580S!!! KD Kang. What are sensor networks? Small, wireless, battery-powered sensors MICA2 mote Smart Dust.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Mobile Ad-hoc Networks -- Overview and a case study Yinzhe Yu Oct. 8, 2003.
Winter 2008Logistics1 Advanced Computer Networks Prof. Venus W. Samawi Welcome to Time: 2pm –5pm Tuesday Winter credits.
Anonymity Cs5090: Advanced Computer Networks, fall 2004 Department of Computer Science Michigan Tech University Byung Choi.
Ad-Hoc Wireless Networks Prepared by: Khalid Al-Hawaj Hanni Al-Sufiani Muhammed Khan.
Focus on Distributed Hash Tables Distributed hash tables (DHT) provide resource locating and routing in peer-to-peer networks –But, more than object locating.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures ProtocolRelevant Attacks TinyOS beaconingBogus routing information, selective forwarding,
Delay-aware Routing in Low Duty-Cycle Wireless Sensor Networks Guodong Sun and Bin Xu Computer Science and Technology Department Tsinghua University, Beijing,
Successful Grad Student © Dr. Ayman Abdel-Hamid, CS5014, Fall CS5014 Research Methods in CS Dr. Ayman Abdel-Hamid Computer Science Department Virginia.
Self-Organizing Adaptive Networks Hari Balakrishnan MIT Laboratory for Computer Science
Special Topics on Algorithmic Aspects of Wireless Networking Donghyun (David) Kim Department of Mathematics and Computer Science North Carolina Central.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Advanced Computer Networks by Behzad Akbari Spring 2011 In the Name of the Most High.
Stochastic sleep scheduling (SSS) for large scale wireless sensor networks Yaxiong Zhao Jie Wu Computer and Information Sciences Temple University.
2015/10/1 A color-theory-based energy efficient routing algorithm for mobile wireless sensor networks Tai-Jung Chang, Kuochen Wang, Yi-Ling Hsieh Department.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Easwari Engineering College Department of Computer Science and Engineering IDENTIFICATION AND ISOLATION OF MOBILE REPLICA NODES IN WSN USING ORT METHOD.
CS 447 Networks and Data Communication Department of Computer Science Southern Illinois University Edwardsville Fall, 2013 Dr. Hiroshi Fujinoki
CS 447 Network & Data Communication QoS (Quality of Service) & DiffServ Introduction Department of Computer Science Southern Illinois University Edwardsville.
Advanced Computer Networks Fall 2013
EILEEN BALCI GPSR: Greedy Perimeter Stateless Routing for Wireless Networks.
KAIST CS710 컴퓨터구조 특강 유비쿼터스 네트워크와 보안 Syllabus Network & Security Lab.
Department of Computer Science Southern Illinois University Edwardsville Fall, 2013 Dr. Hiroshi Fujinoki MANET (Mobile Ad-hoc.
Wireless Networks Fall 2009 Saewoong Bahk. –Room: Office hours: Tue,Thu 4-5PM TA: 남창원
Department of Computer Science A Scalable, Commodity Data Center Network Architecture Mohammad Al-Fares Alexander Loukissas Amin Vahdat SIGCOMM’08 Reporter:
Integrating HaSAFSS into R.E.D for Node Replication Detection in Wireless Sensor Networks Shajith Ravi School of EECS - OSU CS519 - Advanced Network Security.
ODMRP-ASYM(On Demand Multicast Routing Protocol) For Linux Implementation CS218, Fall 2003, Professor Gerla Eric Bostrom, Jason Lin Tutor: Joon-Sang Park.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
A+MAC: A Streamlined Variable Duty-Cycle MAC Protocol for Wireless Sensor Networks 1 Sang Hoon Lee, 2 Byung Joon Park and 1 Lynn Choi 1 School of Electrical.
1 CDA 4527 Computer Communication Networking (not “analysis”) Prof. Cliff Zou School of Electrical Engineering and Computer Science University of Central.
Data and Computer Communications Chapter 10 – Circuit Switching and Packet Switching.
Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
A Deafness Free MAC Protocol for Ad Hoc Networks Using Directional Antennas Jia Feng, Pinyi Ren, and Shuangcheng Yan Department of Electronic Engineering.
Access Point Fall Semester, School of Computer Science & Engineering, Seoul National University. Professor Yanghee Choi Student : MyungHoon Kim.
1 CNT 4704 Analysis of Computer Communication Networks Cliff Zou Department of Electrical Engineering and Computer Science University of Central Florida.
A Multicast Routing Algorithm Using Movement Prediction for Mobile Ad Hoc Networks Huei-Wen Ferng, Ph.D. Assistant Professor Department of Computer Science.
Security “Automatic Border Detection” is essential – For service discovery scope – For prefix assignment and routing – For security Default filters (ULAs?)
Effects of Adding Arbitrary Physical Nodes(APNs) to a Mobile Ad-Hoc Network (MANET)Utilizing a Anonymous Routing Protocol.
Selection and Navigation of Mobile Sensor Nodes Using a Sensor Network Atul Verma, Hemjit Sawant and Jindong Tan Department of Electrical and Computer.
EASE: An Energy-Efficient In-Network Storage Scheme for Object Tracking in Sensor Networks Jianliang Xu Department of Computer Science Hong Kong Baptist.
CSE Wireless and Adhoc networks Instructor: Ayman Alharbi Computer Engineering Dept. (Head of dept. ) Why ?
WIRELESS SENSOR NETWORK 1 ASIS KUMAR TRIPATHY Department of Information Technology
KAIST CS710 Topics in Computational Architecture Wireless Networks and Security : Issues, Challenges and Research Trends Syllabus Network &
Networking & Communications Prof. Javad Ghaderi
COMPUTER NETWORKS CS610 Lecture-9 Hammad Khalid Khan.
Information Security at Florida State University
Faloutsos: My Areas of Research
Information Security at Florida State University
Information Security at Florida State University
V. Arun College of Information and Computer Sciences
Wireless & Mobile Networking CS 752/852 - Spring 2011
EEL 6935 Wireless Ad Hoc Networks
Efficient Flooding Techniques for Mobile Ad Hoc Networks
Research in Networking (NSF Workshop Report)
Presentation transcript:

Term Projects Cs5090: Advanced Computer Networks, fall 2004 Department of Computer Science Michigan Tech University Byung Choi

Schedule Sept/22: Project release Sept/29: project selection (by ) Oct/01: Exam 1 material (3 papers) Oct/04: Exam 1 (Take home) Oct/06: Exam 1 report (pdf, by ) Oct/11: Term Project Phase 1, research problem formulation (pdf, by )

Providing bi-directional anonymity using unstructured overlay networks Sender anonymity Receiver anonymity Bi-directional (mutual) anonymity! Anonymity through overlay networks –Structured –Unstructured Example application: electronic voting

Unstructured overlay networks: An effective measure against DDoS An easy way to detect and filter attack packets? –Using overlay as a front end How to detect? How to filter? How to route? Exploit anonymity of overlay networks?

Dynamic topology for efficient routing in wireless ad-hoc mobile sensor networks Routing and packet forwarding –in wired networks –in wireless ad-hoc mobile networks –In wireless ad-hoc mobile sensor networks IP-based? Bottom-up vs. top-down development Dynamic vs. static

Scoping? All topics good enough for PhD Solutions to a part pf the research problem will be OK! –Try to formulate a research problem, which is part of the grand research problem. Be open minded always Don’t forget 30 reference papers