2,988 research outputs found
Blindspot: Indistinguishable Anonymous Communications
Communication anonymity is a key requirement for individuals under targeted
surveillance. Practical anonymous communications also require
indistinguishability - an adversary should be unable to distinguish between
anonymised and non-anonymised traffic for a given user. We propose Blindspot, a
design for high-latency anonymous communications that offers
indistinguishability and unobservability under a (qualified) global active
adversary. Blindspot creates anonymous routes between sender-receiver pairs by
subliminally encoding messages within the pre-existing communication behaviour
of users within a social network. Specifically, the organic image sharing
behaviour of users. Thus channel bandwidth depends on the intensity of image
sharing behaviour of users along a route. A major challenge we successfully
overcome is that routing must be accomplished in the face of significant
restrictions - channel bandwidth is stochastic. We show that conventional
social network routing strategies do not work. To solve this problem, we
propose a novel routing algorithm. We evaluate Blindspot using a real-world
dataset. We find that it delivers reasonable results for applications requiring
low-volume unobservable communication.Comment: 13 Page
Unified Description for Network Information Hiding Methods
Until now hiding methods in network steganography have been described in
arbitrary ways, making them difficult to compare. For instance, some
publications describe classical channel characteristics, such as robustness and
bandwidth, while others describe the embedding of hidden information. We
introduce the first unified description of hiding methods in network
steganography. Our description method is based on a comprehensive analysis of
the existing publications in the domain. When our description method is applied
by the research community, future publications will be easier to categorize,
compare and extend. Our method can also serve as a basis to evaluate the
novelty of hiding methods proposed in the future.Comment: 24 pages, 7 figures, 1 table; currently under revie
The "MIND" Scalable PIM Architecture
MIND (Memory, Intelligence, and Network Device) is an advanced parallel computer architecture for high performance computing and scalable embedded processing. It is a
Processor-in-Memory (PIM) architecture integrating both DRAM bit cells and CMOS logic devices on the same silicon die. MIND is multicore with multiple memory/processor nodes on
each chip and supports global shared memory across systems of MIND components. MIND is distinguished from other PIM architectures in that it incorporates mechanisms for efficient support of a global parallel execution model based on the semantics of message-driven multithreaded split-transaction processing. MIND is designed to operate either in conjunction with other conventional microprocessors or in standalone arrays of like devices. It also incorporates mechanisms for fault tolerance, real time execution, and active power management. This paper describes the major elements and operational methods of the MIND
architecture
TCP in 5G mmWave Networks: Link Level Retransmissions and MP-TCP
MmWave communications, one of the cornerstones of future 5G mobile networks,
are characterized at the same time by a potential multi-gigabit capacity and by
a very dynamic channel, sensitive to blockage, wide fluctuations in the
received signal quality, and possibly also sudden link disruption. While the
performance of physical and MAC layer schemes that address these issues has
been thoroughly investigated in the literature, the complex interactions
between mmWave links and transport layer protocols such as TCP are still
relatively unexplored. This paper uses the ns-3 mmWave module, with its channel
model based on real measurements in New York City, to analyze the performance
of the Linux TCP/IP stack (i) with and without link-layer retransmissions,
showing that they are fundamental to reach a high TCP throughput on mmWave
links and (ii) with Multipath TCP (MP-TCP) over multiple LTE and mmWave links,
illustrating which are the throughput-optimal combinations of secondary paths
and congestion control algorithms in different conditions.Comment: 6 pages, 11 figures, accepted for presentation at the 2017 IEEE
Conference on Computer Communications Workshops (INFOCOM WKSHPS
Integration of Carrier Aggregation and Dual Connectivity for the ns-3 mmWave Module
Thanks to the wide availability of bandwidth, the millimeter wave (mmWave)
frequencies will provide very high data rates to mobile users in next
generation 5G cellular networks. However, mmWave links suffer from high
isotropic pathloss and blockage from common materials, and are subject to an
intermittent channel quality. Therefore, protocols and solutions at different
layers in the cellular network and the TCP/IP protocol stack have been proposed
and studied. A valuable tool for the end-to-end performance analysis of mmWave
cellular networks is the ns-3 mmWave module, which already models in detail the
channel, Physical (PHY) and Medium Access Control (MAC) layers, and extends the
Long Term Evolution (LTE) stack for the higher layers. In this paper we present
an implementation for the ns-3 mmWave module of multi connectivity techniques
for 3GPP New Radio (NR) at mmWave frequencies, namely Carrier Aggregation (CA)
and Dual Connectivity (DC), and discuss how they can be integrated to increase
the functionalities offered by the ns-3 mmWave module.Comment: 9 pages, 7 figures, submitted to the Workshop on ns-3 (WNS3) 201
MPICH-G2: A Grid-Enabled Implementation of the Message Passing Interface
Application development for distributed computing "Grids" can benefit from
tools that variously hide or enable application-level management of critical
aspects of the heterogeneous environment. As part of an investigation of these
issues, we have developed MPICH-G2, a Grid-enabled implementation of the
Message Passing Interface (MPI) that allows a user to run MPI programs across
multiple computers, at the same or different sites, using the same commands
that would be used on a parallel computer. This library extends the Argonne
MPICH implementation of MPI to use services provided by the Globus Toolkit for
authentication, authorization, resource allocation, executable staging, and
I/O, as well as for process creation, monitoring, and control. Various
performance-critical operations, including startup and collective operations,
are configured to exploit network topology information. The library also
exploits MPI constructs for performance management; for example, the MPI
communicator construct is used for application-level discovery of, and
adaptation to, both network topology and network quality-of-service mechanisms.
We describe the MPICH-G2 design and implementation, present performance
results, and review application experiences, including record-setting
distributed simulations.Comment: 20 pages, 8 figure
Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions
Network steganography conceals the transfer of sensitive information within
unobtrusive data in computer networks. So-called micro protocols are
communication protocols placed within the payload of a network steganographic
transfer. They enrich this transfer with features such as reliability, dynamic
overlay routing, or performance optimization --- just to mention a few. We
present different design approaches for the embedding of hidden channels with
micro protocols in digitized audio signals under consideration of different
requirements. On the basis of experimental results, our design approaches are
compared, and introduced into a protocol engineering approach for micro
protocols.Comment: 20 pages, 7 figures, 4 table
- …