Presentation is loading. Please wait.

Presentation is loading. Please wait.

Yanfei Fan, Yixin Jiang, Haojin Zhu, Xuemin Shen, Jiming Chen.

Similar presentations


Presentation on theme: "Yanfei Fan, Yixin Jiang, Haojin Zhu, Xuemin Shen, Jiming Chen."— Presentation transcript:

1 Yanfei Fan, Yixin Jiang, Haojin Zhu, Xuemin Shen, Jiming Chen

2 Paper Summary- WINC- Nile University 2

3 3 ItemInformation ConferenceNo (Picked from university of waterloo) Date2009 PlaceCanda AuthorsYanfei Fan, Yixin Jiang, Haojin Zhu, Xuemin Shen,Jiming Chen

4 To solve the privacy threat in multi-hop wireless networks (MWNs) specially traffic analysis and flow tracing. Paper Summary- WINC- Nile University 4

5 Proposed a scheme based on homomorphic encryption function associated with dummy packets to ensure source unobservability Paper Summary- WINC- Nile University 5

6 In the open air wireless transmission; which is vulnerable to malicious attacks, you can guarantee that the attacker can’t identify which source is sending. Paper Summary- WINC- Nile University 6

7 In my opinion… There is no limitations… Due to lack of information about… (I get the paper used from IEEE Explore) Routing Algorithm used…. If an inside was compromised of course this will affect the GEM but the proposed filter scheme may conflict with proposed scheme and may not (need to be study) Paper Summary- WINC- Nile University 7

8 Same work but in a delay tolerant network (taking into consideration limited resources- non- continuous connectivity) Consider another privacy scheme, should be more efficient with an increase throughput and preserve privacy Consider distributed and centralized privacy schemes and compare their performance in securing network coding Keeping network utilization constant even if no events or data to be sent Paper Summary- WINC- Nile University 8

9 THANK YOU, ANY QUESTIONS?


Download ppt "Yanfei Fan, Yixin Jiang, Haojin Zhu, Xuemin Shen, Jiming Chen."

Similar presentations


Ads by Google