14,179 research outputs found

    2 P2P or Not 2 P2P?

    Full text link
    In the hope of stimulating discussion, we present a heuristic decision tree that designers can use to judge the likely suitability of a P2P architecture for their applications. It is based on the characteristics of a wide range of P2P systems from the literature, both proposed and deployed.Comment: 6 pages, 1 figur

    U-ATM: An Autonomous Trust Model for Exploring Ubiquitous Collective

    Get PDF
    Ubiquitous e-service is one of the most recent links in the chain of evolution that has characterized the different eras of the internetworking environment. In order to leap the trust barrier for the user to embracing these ubiquitous e-services, we propose an Autonomous Trust Model for exploring collective wisdom in the ubiquitous environment (hereafter termed “U-ATM”) as an instance of ASEM. ASEM (Ambient e-Service Embracing Model) addresses the core elements (of relevance to the integrated concern of trust, reputation and privacy) required for assuring such desired features as convenience, safety, fairness and collaboration for mobile users when they engage with ambient e-services. The U-ATM highlights the distributed peer-to-peer interactions under an ad-hoc network composition. It especially accommodates the dynamic short-lived identity characteristics and lightweight computational capacity of mobile devices. The U-ATM we have developed is based on the ZigBee architecture as a collaborative application in the upper layer of the ubiquitous environment. U-ATM design concepts are elaborated and evaluated. A simulation is conducted. Simulation outcomes for trust decision quality enhancement show significant improvement over traditional designs. U-ATM makes it possible for users to collaborate with the nearby user groups for establishing a reliable and trustworthy interaction environment. It also facilitates and empowers the potential benefits of various ubiquitous e-service applications

    A Survey on Wireless Sensor Network Security

    Full text link
    Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Security in sensor networks is, therefore, a particularly challenging task. This paper discusses the current state of the art in security mechanisms for WSNs. Various types of attacks are discussed and their countermeasures presented. A brief discussion on the future direction of research in WSN security is also included.Comment: 24 pages, 4 figures, 2 table

    Ambient E-Services: Framework and Applications

    Get PDF
    Most of existing mobile services were designed based on the client/server architecture. Those mobile services neither paid much attention to mobile users’ interactions with their environments nor considered the cooperation efforts between the mobile users in a dynamic peer group. In this paper, the notion of ambient e-services is defined to identify a new scope of mobile e-services. The notable features of ambient e-services are the exhilarated linkage based on social context and significantly rapid growth of connections. We also present an ambient e-service framework that characterizes ambient e-services with three dimensions (value stack, environment stack and technology stack). We exemplify several ambient e-service applications, which rest on the mobile peer-to-peer technology and ambient context aware sensors environments. Ambient e-services make a mobile user not only connect to dynamic ambient environments but also build channels that connect with other mobile users in the nearby surrounding environment, capitalizing dynamic environmental values as well as dynamic social values. Lastly, we identify for ambient e-services certain important issues worthy of future intensive research
    • …
    corecore