215,135 research outputs found

    A TCP/IP Network Emulator

    No full text
    In this paper a Linux based framework of a TCP/IP emulator is introduced. Several advantages can be noted. Firstly, the maintenance of large numbers of processors is unnecessary. Secondly, compared with simulators constructed with conceptual codes, our emulator framework makes it possible to test the interaction and behaviour of TCP/IP in real Linux network environments. Thirdly, the wired network is fully controlled by a single processor enabling us to separate TCP/IP behaviour over the wireless network, which helps distinguish performance functions that occur due to noisy wireless links. The framework was tested on two Linux processors over an IEEE802.11b wireless link. The simulations show that the complex topology of the heterogeneous network was "realistically" constructed

    Secure and privacy-aware proxy mobile IPv6 protocol for vehicle-to-grid networks

    Get PDF
    Vehicle-to-Grid (V2G) networks have emerged as a new communication paradigm between Electric Vehicles (EVs) and the Smart Grid (SG). In order to ensure seamless communications between mobile EVs and the electric vehicle supply equipment, the support of ubiquitous and transparent mobile IP communications is essential in V2G networks. However, enabling mobile IP communications raises real concerns about the possibility of tracking the locations of connected EVs through their mobile IP addresses. In this paper, we employ certificate-less public key cryptography in synergy with the restrictive partially blind signature technique to construct a secure and privacy-aware proxy mobile IPv6 (SP-PMIPv6) protocol for V2G networks. SP-PMIPv6 achieves low authentication latency while protecting the identity and location privacy of the mobile EV. We evaluate the SP-PMIPv6 protocol in terms of its authentication overhead and the information-theoretic uncertainty derived by the mutual information metric to show the high level of achieved anonymity

    The “License as Tax” Fallacy

    Get PDF
    Intellectual property licenses are commonly portrayed as a “tax” that limits access to technology assets, which in turn stunts innovation by intermediate users and inflates prices for end-users. Renewed skepticism toward IP licensing, and associated judicial and regulatory interventions that apply per se-like liability rules under patent and antitrust law to IP licensing, overlook the fact that IP licenses typically play a “positive-sum” enabling function, rather than a “zero-sum” exclusionary function, by mitigating expropriation risks that would otherwise frustrate transactions between the holders of complementary specialized IP and non-IP assets. As illustrated by paradigm examples of licensing and other IP-dependent arrangements in content and technology markets, these transactional structures facilitate value-creating exchanges of knowledge assets, promote the division of labor among innovation and production specialists, and lower entry costs for firms that have strong innovation capacities but weak production and distribution capacities. An analytical framework that overlooks the enabling function of IP licensing is prone to recommend “false positive” policy actions that undermine the formation of markets in IP assets and, more generally, induce organizational distortions and reduce competitive intensity by disadvantaging R&D-specialist entities that rely on licensing-based monetization mechanisms while favoring integrated firms that maintain end-to-end commercialization structures

    IP TRACEBACK Scenarios

    Get PDF
    Internet Protocol (IP) trace back is the enabling technology to control Internet crime. In this paper, we present novel and practical IP traceback systems which provide a defense system with the ability to find out the real sources of attacking packets that traverse through the network. IP traceback is to find the origin of an IP packet on the Internet without relying on the source IP address field. Due to the trusting nature of the IP protocol, the source IP address of a packet is not authenticated. As a result, the source address in an IP packet can be falsified (IP address spoofing). Spoof IP packets can be used for different attacks. The problem of finding the source of a packet is called the IP traceback problem. IP Traceback is a critical ability for identifying sources of attacks and instituting protection measures for the Internet. Most existing approaches to this problem have been tailored toward DDoS attack detection

    HLOC: Hints-Based Geolocation Leveraging Multiple Measurement Frameworks

    Full text link
    Geographically locating an IP address is of interest for many purposes. There are two major ways to obtain the location of an IP address: querying commercial databases or conducting latency measurements. For structural Internet nodes, such as routers, commercial databases are limited by low accuracy, while current measurement-based approaches overwhelm users with setup overhead and scalability issues. In this work we present our system HLOC, aiming to combine the ease of database use with the accuracy of latency measurements. We evaluate HLOC on a comprehensive router data set of 1.4M IPv4 and 183k IPv6 routers. HLOC first extracts location hints from rDNS names, and then conducts multi-tier latency measurements. Configuration complexity is minimized by using publicly available large-scale measurement frameworks such as RIPE Atlas. Using this measurement, we can confirm or disprove the location hints found in domain names. We publicly release HLOC's ready-to-use source code, enabling researchers to easily increase geolocation accuracy with minimum overhead.Comment: As published in TMA'17 conference: http://tma.ifip.org/main-conference

    Enhanced International Space Station Ku-Band Telemetry Service

    Get PDF
    (1) The ISS is diligently working to increase utilization of the resources this unique laboratory provides; (2) Recent upgrades enabled the use of Internet Protocol communication using the CCSDS IP Encapsulation protocol; and (3) The Huntsville Operations Support Center has extended the onboard LAN to payload teams enabling the use of standard IP protocols for payload operations
    corecore