Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees

projects 2012 Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees Wireless Mesh Network (WMN) has become an important edge network to provide Internet access to remote areas and wireless connections in a metropolitan scale. In this paper, we study the problem of identifying the maximum available bandwidth path, a fundamental issue in supporting quality-of-service in WMNs. Due to interference among links, bandwidth, a well-known bottleneck metric in wired networks, is neither concave nor additive in wireless networks. We propose a new path weight which captures the available path bandwidth…

Read More

Slicing: A New Approach to Privacy Preserving Data Publishing

Slicing: A New Approach to Privacy Preserving Data Publishing Several anonymization techniques, such as generalization and bucketization, have been designed for privacy preserving microdata publishing. Recent work has shown that general ization loses considerable amount of information, especially for high-dimensional data. Bucketization, on the other hand, does not prevent membership disclosure and does not apply for data that do not have a clear separation between quasi- identifying attributes and sensitive attributes. In this paper, we present a novel technique called slicing, which partitions the data both horizontally and vertically. We…

Read More

Topology Control in Mobile Ad Hoc Networks with Cooperative Communications

projects 2012 Topology Control in Mobile Ad Hoc Networks with Cooperative Communications Wireless Communications – 2012 Cooperative communication has received tremendous interest for wireless networks. Most existing works on cooperative communications are focused on link-level physical layer issues. Consequently, the impacts of cooperative communications on network-level upper layer issues, such as topology control, routing and network capacity, are largely ignored. In this article, we propose a Capacity-Optimized Cooperative (COCO) topology control scheme to improve the network capacity in MANETs by jointly considering both upper layer network capacity and physical layer…

Read More

A New Cell-Counting-Based Attack Against Tor

  A New Cell-Counting-Based Attack Against Tor Networking, 2012 Various low-latency anonymous communication systems such as Tor and Anonymizer have been designed to provide anonymity service for users. In order to hide the communication of users, most of the anonymity systems pack the application data into equal-sized cells (e.g., 512 B for Tor, a known real-world, circuit- based, low-latency anonymous communication network). Via extensive experiments on Tor, we found that the size of IP packets in the Tor network can be very dynamic because a cell is an application concept…

Read More

AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies

AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies – projects 2012 Journal, Communications Magazine – 2012 Handling traffic dynamics in order to avoid network congestion and subsequent service disruptions is one of the key tasks performed by contemporary network management systems. Given the simple but rigid routing and forwarding functionalities in IP base environments, efficient resource management and control solutions against dynamic traffic conditions is still yet to be obtained. In this article, we introduce AMPLE — an efficient traffic engineering and management system that performs adaptive…

Read More