Seminar on Internet Technologies — Initial Readings

Florian Tegeler

 

 

This site provides some initial readings for various topics under my supervision. Please note that this should be some starting literature for you and that you are not obliged to read every sentence in every document. Important is the general understanding of concepts and the problem space related to certain scenarios / network topologies (as e.g. Delay Tolerant Networks or P2P networks…). You should in the end have a general idea of the keywords and what’s behind them. Please feel always free to drop me an email (see here) if you have questions on the topics or problems with your talk/report.

 

Topics:

Challendes and solutions for stressed networks

Trust management in decentralized systems - P2P Security

 

 

 

 

Topic: Challenges and solutions for stressed networks

 

In contrast to classically wired/static networks, stressed networking environments are those with intermittent connectivity, large and/or variable delays, and high bit error rates. Due to these circumstances, routing, session handling and much more needs to be modified to cope with e.g. interrupted connections.

 

Always a good idea to use a search engine. Keywords: DTN, Stressed Networks, Epidemic Routing, Spray & Wait Algorithm, Bundle Protocol

 

 

An easy start: http://en.wikipedia.org/wiki/Delay_Tolerant_Networking

 

One of the first SIGCOMM papers about DTN routing: Practical Routing in Delay-Tolerant Networks

 

The Delay Tolerant Network Research Group at the IRTF: http://www.dtnrg.org/wiki/Docs

 

 

 

 

Topic: Trust management in decentralized systems - P2P Security

 

This topic deals with the security in P2P networks. Multiple attacks are possible and a common way to counter some of them is to establish a network of trust. Hereby a trust value is associated to each of the nodes and the node’s interaction patterns depend heavily on that value. Unwanted behavior can now be punished and nodes could be excluded from the network. The trust networks themselves need to be protected from malicious user behavior as well, which makes designing such a network a difficult task.

 

Always a good idea to use a search engine. Keywords: TrustMe, Trust and Reputation, Anonymous Networks, Security in P2P

 

 

An overview document: Building trust in peer-to-peer systems: a review

 

Another overview: A Survey of Trust and Reputation Systems for Online Service Provision (the P2P section is of interest here)

 

A Bayesian protocol: Wang Y. and Vassileva J. Trust and Reputation Model in Peer-to-Peer Networks. Proc. of IEEE Conference on P2P Computing, Linkoeping, Sweden, September 2003

 

The TrustMe Protocol: Singh A. and Liu L. TrustMe: Anonymous management of trust relationships in decentralized P2P systems. The Third IEEE International Conference on Peer-to-Peer Computing, September 2003