Server and Clients Node Capture Attacks

  • Upload
    thmb

  • View
    228

  • Download
    0

Embed Size (px)

Citation preview

  • 8/7/2019 Server and Clients Node Capture Attacks

    1/24

    Server and Clients Node Capture Attacks

    Abstract:

    In this project, we addressed the mitigation of control channel jamming by malicious colluding

    insiders and compromised system users as well as the identification of compromised users

    without prior knowledge of the number of compromised users in the system. We mapped the

    problem of control channel access that is robust to jamming by compromised users to the

    problem of secure key establishment under node capture attacks. Based on the mapping, we

    proposed a framework for control channel access schemes using random key assignment. We

    proposed and evaluated metrics for resilience and delay which quantify the availability of control

    messages under control channel jamming attacks. In future work, we will investigate

    modifications to the adversarys jamming strategy and the effect on the availability of control

    messages and the ability to identify compromised users.

    Multi Server Communication In Distributed Management System

    Abstract: This approach has the potential of both distributing the operation processing load

    among the proxies and enabling clients to access the service by communicating with nearby

    proxies rather than a potentially distant centralized server. However, achieving even just

    serializability for operations executed at these proxies using standard replication approaches

    requires that a proxy involve either a centralized server or other (possibly distant) proxies on the

    critical path of each update operation. Our system implements a service with a designated server

    and an unbounded number of proxies. We generically refer to the server and the proxies as

    processes. To support the service, a proxy joins the service. In doing so, it is positioned within a

    tree rooted at the server. All proxies in the subtree rooted at that child are said to disconnect. The

    child (or, if the child failed, each uppermost surviving proxy in the subtree) can inform its

    subtree of the disconnection. The subtree can stay put until the disconnection heals, or they

    might reconnect via the server.

    Intercity Search Query Processing

  • 8/7/2019 Server and Clients Node Capture Attacks

    2/24

    Abstract: This project presented a novel approach for reducing the spatial query access latency

    by leveraging results from nearby peers in wireless broadcast environments. Significantly, our

    scheme allows a mobile client to locally verify whether candidate objects received from peers are

    indeed part of its own spatial query result set. The experiment results indicate that our method

    can reduce the access to the wireless broadcast channel by a significant amount, for example, up

    to 80 percent, in a dense urban area. This is achieved with minimal caching at the peers. By

    virtue of its P2P architecture, the method exhibits great scalability: the higher the mobile peer

    density, the more the queries answered by peers. Therefore, the query access latency can be

    markedly decreased with the increase in clients.

    Server and Clients Node Capture Attacks

    Abstract:

    In this project, we addressed the mitigation of control channel jamming by malicious colluding

    insiders and compromised system users as well as the identification of compromised users

    without prior knowledge of the number of compromised users in the system. We mapped the

    problem of control channel access that is robust to jamming by compromised users to the

    problem of secure key establishment under node capture attacks. Based on the mapping, we

    proposed a framework for control channel access schemes using random key assignment. We

    proposed and evaluated metrics for resilience and delay which quantify the availability of control

    messages under control channel jamming attacks. In future work, we will investigate

    modifications to the adversarys jamming strategy and the effect on the availability of control

    messages and the ability to identify compromised users.

    Multi Server Communication In Distributed Management System

    Abstract: This approach has the potential of both distributing the operation processing load

    among the proxies and enabling clients to access the service by communicating with nearby proxies rather than a potentially distant centralized server. However, achieving even just

    serializability for operations executed at these proxies using standard replication approaches

    requires that a proxy involve either a centralized server or other (possibly distant) proxies on the

    critical path of each update operation. Our system implements a service with a designated server

    and an unbounded number of proxies. We generically refer to the server and the proxies as

  • 8/7/2019 Server and Clients Node Capture Attacks

    3/24

    processes. To support the service, a proxy joins the service. In doing so, it is positioned within a

    tree rooted at the server. All proxies in the subtree rooted at that child are said to disconnect. The

    child (or, if the child failed, each uppermost surviving proxy in the subtree) can inform its

    subtree of the disconnection. The subtree can stay put until the disconnection heals, or they

    might reconnect via the server.

    Intercity Search Query Processing

    Abstract: This project presented a novel approach for reducing the spatial query access latency

    by leveraging results from nearby peers in wireless broadcast environments. Significantly, our

    scheme allows a mobile client to locally verify whether candidate objects received from peers are

    indeed part of its own spatial query result set. The experiment results indicate that our method

    can reduce the access to the wireless broadcast channel by a significant amount, for example, up

    to 80 percent, in a dense urban area. This is achieved with minimal caching at the peers. By

    virtue of its P2P architecture, the method exhibits great scalability: the higher the mobile peer

    density, the more the queries answered by peers. Therefore, the query access latency can be

    markedly decreased with the increase in clients.

    Server and Clients Node Capture Attacks

    Abstract:

    In this project, we addressed the mitigation of control channel jamming by malicious colluding

    insiders and compromised system users as well as the identification of compromised users

    without prior knowledge of the number of compromised users in the system. We mapped the

    problem of control channel access that is robust to jamming by compromised users to the

    problem of secure key establishment under node capture attacks. Based on the mapping, we

    proposed a framework for control channel access schemes using random key assignment. We

    proposed and evaluated metrics for resilience and delay which quantify the availability of control

    messages under control channel jamming attacks. In future work, we will investigate

    modifications to the adversarys jamming strategy and the effect on the availability of control

    messages and the ability to identify compromised users.

  • 8/7/2019 Server and Clients Node Capture Attacks

    4/24

    Multi Server Communication In Distributed Management System

    Abstract: This approach has the potential of both distributing the operation processing load

    among the proxies and enabling clients to access the service by communicating with nearby

    proxies rather than a potentially distant centralized server. However, achieving even just

    serializability for operations executed at these proxies using standard replication approaches

    requires that a proxy involve either a centralized server or other (possibly distant) proxies on the

    critical path of each update operation. Our system implements a service with a designated server

    and an unbounded number of proxies. We generically refer to the server and the proxies as

    processes. To support the service, a proxy joins the service. In doing so, it is positioned within a

    tree rooted at the server. All proxies in the subtree rooted at that child are said to disconnect. The

    child (or, if the child failed, each uppermost surviving proxy in the subtree) can inform its

    subtree of the disconnection. The subtree can stay put until the disconnection heals, or they

    might reconnect via the server.

    Intercity Search Query Processing

    Abstract: This project presented a novel approach for reducing the spatial query access latency

    by leveraging results from nearby peers in wireless broadcast environments. Significantly, our

    scheme allows a mobile client to locally verify whether candidate objects received from peers are

    indeed part of its own spatial query result set. The experiment results indicate that our method

    can reduce the access to the wireless broadcast channel by a significant amount, for example, up

    to 80 percent, in a dense urban area. This is achieved with minimal caching at the peers. By

    virtue of its P2P architecture, the method exhibits great scalability: the higher the mobile peer

    density, the more the queries answered by peers. Therefore, the query access latency can be

    markedly decreased with the increase in clients.

    Server and Clients Node Capture Attacks

    Abstract:

    In this project, we addressed the mitigation of control channel jamming by malicious colluding

    insiders and compromised system users as well as the identification of compromised users

  • 8/7/2019 Server and Clients Node Capture Attacks

    5/24

    without prior knowledge of the number of compromised users in the system. We mapped the

    problem of control channel access that is robust to jamming by compromised users to the

    problem of secure key establishment under node capture attacks. Based on the mapping, we

    proposed a framework for control channel access schemes using random key assignment. We

    proposed and evaluated metrics for resilience and delay which quantify the availability of control

    messages under control channel jamming attacks. In future work, we will investigate

    modifications to the adversarys jamming strategy and the effect on the availability of control

    messages and the ability to identify compromised users.

    Multi Server Communication In Distributed Management System

    Abstract: This approach has the potential of both distributing the operation processing load

    among the proxies and enabling clients to access the service by communicating with nearby

    proxies rather than a potentially distant centralized server. However, achieving even just

    serializability for operations executed at these proxies using standard replication approaches

    requires that a proxy involve either a centralized server or other (possibly distant) proxies on the

    critical path of each update operation. Our system implements a service with a designated server

    and an unbounded number of proxies. We generically refer to the server and the proxies as

    processes. To support the service, a proxy joins the service. In doing so, it is positioned within a

    tree rooted at the server. All proxies in the subtree rooted at that child are said to disconnect. The

    child (or, if the child failed, each uppermost surviving proxy in the subtree) can inform its

    subtree of the disconnection. The subtree can stay put until the disconnection heals, or they

    might reconnect via the server.

    Intercity Search Query Processing

    Abstract: This project presented a novel approach for reducing the spatial query access latencyby leveraging results from nearby peers in wireless broadcast environments. Significantly, our

    scheme allows a mobile client to locally verify whether candidate objects received from peers are

    indeed part of its own spatial query result set. The experiment results indicate that our method

    can reduce the access to the wireless broadcast channel by a significant amount, for example, up

    to 80 percent, in a dense urban area. This is achieved with minimal caching at the peers. By

  • 8/7/2019 Server and Clients Node Capture Attacks

    6/24

    virtue of its P2P architecture, the method exhibits great scalability: the higher the mobile peer

    density, the more the queries answered by peers. Therefore, the query access latency can be

    markedly decreased with the increase in clients.

    Server and Clients Node Capture Attacks

    Abstract:

    In this project, we addressed the mitigation of control channel jamming by malicious colluding

    insiders and compromised system users as well as the identification of compromised users

    without prior knowledge of the number of compromised users in the system. We mapped the

    problem of control channel access that is robust to jamming by compromised users to the

    problem of secure key establishment under node capture attacks. Based on the mapping, we

    proposed a framework for control channel access schemes using random key assignment. We

    proposed and evaluated metrics for resilience and delay which quantify the availability of control

    messages under control channel jamming attacks. In future work, we will investigate

    modifications to the adversarys jamming strategy and the effect on the availability of control

    messages and the ability to identify compromised users.

    Multi Server Communication In Distributed Management System

    Abstract: This approach has the potential of both distributing the operation processing load

    among the proxies and enabling clients to access the service by communicating with nearby

    proxies rather than a potentially distant centralized server. However, achieving even just

    serializability for operations executed at these proxies using standard replication approaches

    requires that a proxy involve either a centralized server or other (possibly distant) proxies on the

    critical path of each update operation. Our system implements a service with a designated server

    and an unbounded number of proxies. We generically refer to the server and the proxies as

    processes. To support the service, a proxy joins the service. In doing so, it is positioned within atree rooted at the server. All proxies in the subtree rooted at that child are said to disconnect. The

    child (or, if the child failed, each uppermost surviving proxy in the subtree) can inform its

    subtree of the disconnection. The subtree can stay put until the disconnection heals, or they

    might reconnect via the server.

  • 8/7/2019 Server and Clients Node Capture Attacks

    7/24

    Intercity Search Query Processing

    Abstract: This project presented a novel approach for reducing the spatial query access latency

    by leveraging results from nearby peers in wireless broadcast environments. Significantly, our

    scheme allows a mobile client to locally verify whether candidate objects received from peers are

    indeed part of its own spatial query result set. The experiment results indicate that our method

    can reduce the access to the wireless broadcast channel by a significant amount, for example, up

    to 80 percent, in a dense urban area. This is achieved with minimal caching at the peers. By

    virtue of its P2P architecture, the method exhibits great scalability: the higher the mobile peer

    density, the more the queries answered by peers. Therefore, the query access latency can be

    markedly decreased with the increase in clients.

    Server and Clients Node Capture Attacks

    Abstract:

    In this project, we addressed the mitigation of control channel jamming by malicious colluding

    insiders and compromised system users as well as the identification of compromised users

    without prior knowledge of the number of compromised users in the system. We mapped the

    problem of control channel access that is robust to jamming by compromised users to the

    problem of secure key establishment under node capture attacks. Based on the mapping, we

    proposed a framework for control channel access schemes using random key assignment. We

    proposed and evaluated metrics for resilience and delay which quantify the availability of control

    messages under control channel jamming attacks. In future work, we will investigate

    modifications to the adversarys jamming strategy and the effect on the availability of control

    messages and the ability to identify compromised users.

    Multi Server Communication In Distributed Management System

    Abstract: This approach has the potential of both distributing the operation processing load

    among the proxies and enabling clients to access the service by communicating with nearby

    proxies rather than a potentially distant centralized server. However, achieving even just

    serializability for operations executed at these proxies using standard replication approaches

  • 8/7/2019 Server and Clients Node Capture Attacks

    8/24

    requires that a proxy involve either a centralized server or other (possibly distant) proxies on the

    critical path of each update operation. Our system implements a service with a designated server

    and an unbounded number of proxies. We generically refer to the server and the proxies as

    processes. To support the service, a proxy joins the service. In doing so, it is positioned within a

    tree rooted at the server. All proxies in the subtree rooted at that child are said to disconnect. The

    child (or, if the child failed, each uppermost surviving proxy in the subtree) can inform its

    subtree of the disconnection. The subtree can stay put until the disconnection heals, or they

    might reconnect via the server.

    Intercity Search Query Processing

    Abstract: This project presented a novel approach for reducing the spatial query access latency

    by leveraging results from nearby peers in wireless broadcast environments. Significantly, our

    scheme allows a mobile client to locally verify whether candidate objects received from peers are

    indeed part of its own spatial query result set. The experiment results indicate that our method

    can reduce the access to the wireless broadcast channel by a significant amount, for example, up

    to 80 percent, in a dense urban area. This is achieved with minimal caching at the peers. By

    virtue of its P2P architecture, the method exhibits great scalability: the higher the mobile peer

    density, the more the queries answered by peers. Therefore, the query access latency can be

    markedly decreased with the increase in clients.

    Server and Clients Node Capture Attacks

    Abstract:

    In this project, we addressed the mitigation of control channel jamming by malicious colluding

    insiders and compromised system users as well as the identification of compromised users

    without prior knowledge of the number of compromised users in the system. We mapped the

    problem of control channel access that is robust to jamming by compromised users to the

    problem of secure key establishment under node capture attacks. Based on the mapping, we

    proposed a framework for control channel access schemes using random key assignment. We

    proposed and evaluated metrics for resilience and delay which quantify the availability of control

  • 8/7/2019 Server and Clients Node Capture Attacks

    9/24

    messages under control channel jamming attacks. In future work, we will investigate

    modifications to the adversarys jamming strategy and the effect on the availability of control

    messages and the ability to identify compromised users.

    Multi Server Communication In Distributed Management System

    Abstract: This approach has the potential of both distributing the operation processing load

    among the proxies and enabling clients to access the service by communicating with nearby

    proxies rather than a potentially distant centralized server. However, achieving even just

    serializability for operations executed at these proxies using standard replication approaches

    requires that a proxy involve either a centralized server or other (possibly distant) proxies on the

    critical path of each update operation. Our system implements a service with a designated server

    and an unbounded number of proxies. We generically refer to the server and the proxies as

    processes. To support the service, a proxy joins the service. In doing so, it is positioned within a

    tree rooted at the server. All proxies in the subtree rooted at that child are said to disconnect. The

    child (or, if the child failed, each uppermost surviving proxy in the subtree) can inform its

    subtree of the disconnection. The subtree can stay put until the disconnection heals, or they

    might reconnect via the server.

    Intercity Search Query Processing

    Abstract: This project presented a novel approach for reducing the spatial query access latency

    by leveraging results from nearby peers in wireless broadcast environments. Significantly, our

    scheme allows a mobile client to locally verify whether candidate objects received from peers are

    indeed part of its own spatial query result set. The experiment results indicate that our method

    can reduce the access to the wireless broadcast channel by a significant amount, for example, up

    to 80 percent, in a dense urban area. This is achieved with minimal caching at the peers. Byvirtue of its P2P architecture, the method exhibits great scalability: the higher the mobile peer

    density, the more the queries answered by peers. Therefore, the query access latency can be

    markedly decreased with the increase in clients.

    Server and Clients Node Capture Attacks

  • 8/7/2019 Server and Clients Node Capture Attacks

    10/24

    Abstract:

    In this project, we addressed the mitigation of control channel jamming by malicious colluding

    insiders and compromised system users as well as the identification of compromised users

    without prior knowledge of the number of compromised users in the system. We mapped the

    problem of control channel access that is robust to jamming by compromised users to the

    problem of secure key establishment under node capture attacks. Based on the mapping, we

    proposed a framework for control channel access schemes using random key assignment. We

    proposed and evaluated metrics for resilience and delay which quantify the availability of control

    messages under control channel jamming attacks. In future work, we will investigate

    modifications to the adversarys jamming strategy and the effect on the availability of control

    messages and the ability to identify compromised users.

    Multi Server Communication In Distributed Management System

    Abstract: This approach has the potential of both distributing the operation processing load

    among the proxies and enabling clients to access the service by communicating with nearby

    proxies rather than a potentially distant centralized server. However, achieving even just

    serializability for operations executed at these proxies using standard replication approaches

    requires that a proxy involve either a centralized server or other (possibly distant) proxies on the

    critical path of each update operation. Our system implements a service with a designated server

    and an unbounded number of proxies. We generically refer to the server and the proxies as

    processes. To support the service, a proxy joins the service. In doing so, it is positioned within a

    tree rooted at the server. All proxies in the subtree rooted at that child are said to disconnect. The

    child (or, if the child failed, each uppermost surviving proxy in the subtree) can inform its

    subtree of the disconnection. The subtree can stay put until the disconnection heals, or they

    might reconnect via the server.

    Intercity Search Query Processing

    Abstract: This project presented a novel approach for reducing the spatial query access latency

    by leveraging results from nearby peers in wireless broadcast environments. Significantly, our

  • 8/7/2019 Server and Clients Node Capture Attacks

    11/24

    scheme allows a mobile client to locally verify whether candidate objects received from peers are

    indeed part of its own spatial query result set. The experiment results indicate that our method

    can reduce the access to the wireless broadcast channel by a significant amount, for example, up

    to 80 percent, in a dense urban area. This is achieved with minimal caching at the peers. By

    virtue of its P2P architecture, the method exhibits great scalability: the higher the mobile peer

    density, the more the queries answered by peers. Therefore, the query access latency can be

    markedly decreased with the increase in clients.

    Server and Clients Node Capture Attacks

    Abstract:

    In this project, we addressed the mitigation of control channel jamming by malicious colluding

    insiders and compromised system users as well as the identification of compromised users

    without prior knowledge of the number of compromised users in the system. We mapped the

    problem of control channel access that is robust to jamming by compromised users to the

    problem of secure key establishment under node capture attacks. Based on the mapping, we

    proposed a framework for control channel access schemes using random key assignment. We

    proposed and evaluated metrics for resilience and delay which quantify the availability of control

    messages under control channel jamming attacks. In future work, we will investigate

    modifications to the adversarys jamming strategy and the effect on the availability of control

    messages and the ability to identify compromised users.

    Multi Server Communication In Distributed Management System

    Abstract: This approach has the potential of both distributing the operation processing load

    among the proxies and enabling clients to access the service by communicating with nearby

    proxies rather than a potentially distant centralized server. However, achieving even just

    serializability for operations executed at these proxies using standard replication approachesrequires that a proxy involve either a centralized server or other (possibly distant) proxies on the

    critical path of each update operation. Our system implements a service with a designated server

    and an unbounded number of proxies. We generically refer to the server and the proxies as

    processes. To support the service, a proxy joins the service. In doing so, it is positioned within a

    tree rooted at the server. All proxies in the subtree rooted at that child are said to disconnect. The

  • 8/7/2019 Server and Clients Node Capture Attacks

    12/24

    child (or, if the child failed, each uppermost surviving proxy in the subtree) can inform its

    subtree of the disconnection. The subtree can stay put until the disconnection heals, or they

    might reconnect via the server.

    Intercity Search Query Processing

    Abstract: This project presented a novel approach for reducing the spatial query access latency

    by leveraging results from nearby peers in wireless broadcast environments. Significantly, our

    scheme allows a mobile client to locally verify whether candidate objects received from peers are

    indeed part of its own spatial query result set. The experiment results indicate that our method

    can reduce the access to the wireless broadcast channel by a significant amount, for example, up

    to 80 percent, in a dense urban area. This is achieved with minimal caching at the peers. By

    virtue of its P2P architecture, the method exhibits great scalability: the higher the mobile peer

    density, the more the queries answered by peers. Therefore, the query access latency can be

    markedly decreased with the increase in clients.

    Server and Clients Node Capture Attacks

    Abstract:

    In this project, we addressed the mitigation of control channel jamming by malicious colluding

    insiders and compromised system users as well as the identification of compromised users

    without prior knowledge of the number of compromised users in the system. We mapped the

    problem of control channel access that is robust to jamming by compromised users to the

    problem of secure key establishment under node capture attacks. Based on the mapping, we

    proposed a framework for control channel access schemes using random key assignment. We

    proposed and evaluated metrics for resilience and delay which quantify the availability of control

    messages under control channel jamming attacks. In future work, we will investigate

    modifications to the adversarys jamming strategy and the effect on the availability of control

    messages and the ability to identify compromised users.

    Multi Server Communication In Distributed Management System

  • 8/7/2019 Server and Clients Node Capture Attacks

    13/24

    Abstract: This approach has the potential of both distributing the operation processing load

    among the proxies and enabling clients to access the service by communicating with nearby

    proxies rather than a potentially distant centralized server. However, achieving even just

    serializability for operations executed at these proxies using standard replication approaches

    requires that a proxy involve either a centralized server or other (possibly distant) proxies on the

    critical path of each update operation. Our system implements a service with a designated server

    and an unbounded number of proxies. We generically refer to the server and the proxies as

    processes. To support the service, a proxy joins the service. In doing so, it is positioned within a

    tree rooted at the server. All proxies in the subtree rooted at that child are said to disconnect. The

    child (or, if the child failed, each uppermost surviving proxy in the subtree) can inform its

    subtree of the disconnection. The subtree can stay put until the disconnection heals, or they

    might reconnect via the server.

    Intercity Search Query Processing

    Abstract: This project presented a novel approach for reducing the spatial query access latency

    by leveraging results from nearby peers in wireless broadcast environments. Significantly, our

    scheme allows a mobile client to locally verify whether candidate objects received from peers are

    indeed part of its own spatial query result set. The experiment results indicate that our method

    can reduce the access to the wireless broadcast channel by a significant amount, for example, up

    to 80 percent, in a dense urban area. This is achieved with minimal caching at the peers. By

    virtue of its P2P architecture, the method exhibits great scalability: the higher the mobile peer

    density, the more the queries answered by peers. Therefore, the query access latency can be

    markedly decreased with the increase in clients.

    Server and Clients Node Capture Attacks

    Abstract:

    In this project, we addressed the mitigation of control channel jamming by malicious colluding

    insiders and compromised system users as well as the identification of compromised users

    without prior knowledge of the number of compromised users in the system. We mapped the

  • 8/7/2019 Server and Clients Node Capture Attacks

    14/24

    problem of control channel access that is robust to jamming by compromised users to the

    problem of secure key establishment under node capture attacks. Based on the mapping, we

    proposed a framework for control channel access schemes using random key assignment. We

    proposed and evaluated metrics for resilience and delay which quantify the availability of control

    messages under control channel jamming attacks. In future work, we will investigate

    modifications to the adversarys jamming strategy and the effect on the availability of control

    messages and the ability to identify compromised users.

    Multi Server Communication In Distributed Management System

    Abstract: This approach has the potential of both distributing the operation processing load

    among the proxies and enabling clients to access the service by communicating with nearby

    proxies rather than a potentially distant centralized server. However, achieving even just

    serializability for operations executed at these proxies using standard replication approaches

    requires that a proxy involve either a centralized server or other (possibly distant) proxies on the

    critical path of each update operation. Our system implements a service with a designated server

    and an unbounded number of proxies. We generically refer to the server and the proxies as

    processes. To support the service, a proxy joins the service. In doing so, it is positioned within a

    tree rooted at the server. All proxies in the subtree rooted at that child are said to disconnect. The

    child (or, if the child failed, each uppermost surviving proxy in the subtree) can inform its

    subtree of the disconnection. The subtree can stay put until the disconnection heals, or they

    might reconnect via the server.

    Intercity Search Query Processing

    Abstract: This project presented a novel approach for reducing the spatial query access latency

    by leveraging results from nearby peers in wireless broadcast environments. Significantly, ourscheme allows a mobile client to locally verify whether candidate objects received from peers are

    indeed part of its own spatial query result set. The experiment results indicate that our method

    can reduce the access to the wireless broadcast channel by a significant amount, for example, up

    to 80 percent, in a dense urban area. This is achieved with minimal caching at the peers. By

    virtue of its P2P architecture, the method exhibits great scalability: the higher the mobile peer

  • 8/7/2019 Server and Clients Node Capture Attacks

    15/24

    density, the more the queries answered by peers. Therefore, the query access latency can be

    markedly decreased with the increase in clients.

    Server and Clients Node Capture Attacks

    Abstract:

    In this project, we addressed the mitigation of control channel jamming by malicious colluding

    insiders and compromised system users as well as the identification of compromised users

    without prior knowledge of the number of compromised users in the system. We mapped the

    problem of control channel access that is robust to jamming by compromised users to the

    problem of secure key establishment under node capture attacks. Based on the mapping, we

    proposed a framework for control channel access schemes using random key assignment. We

    proposed and evaluated metrics for resilience and delay which quantify the availability of control

    messages under control channel jamming attacks. In future work, we will investigate

    modifications to the adversarys jamming strategy and the effect on the availability of control

    messages and the ability to identify compromised users.

    Multi Server Communication In Distributed Management System

    Abstract: This approach has the potential of both distributing the operation processing load

    among the proxies and enabling clients to access the service by communicating with nearby

    proxies rather than a potentially distant centralized server. However, achieving even just

    serializability for operations executed at these proxies using standard replication approaches

    requires that a proxy involve either a centralized server or other (possibly distant) proxies on the

    critical path of each update operation. Our system implements a service with a designated server

    and an unbounded number of proxies. We generically refer to the server and the proxies as

    processes. To support the service, a proxy joins the service. In doing so, it is positioned within a

    tree rooted at the server. All proxies in the subtree rooted at that child are said to disconnect. Thechild (or, if the child failed, each uppermost surviving proxy in the subtree) can inform its

    subtree of the disconnection. The subtree can stay put until the disconnection heals, or they

    might reconnect via the server.

  • 8/7/2019 Server and Clients Node Capture Attacks

    16/24

    Intercity Search Query Processing

    Abstract: This project presented a novel approach for reducing the spatial query access latency

    by leveraging results from nearby peers in wireless broadcast environments. Significantly, our

    scheme allows a mobile client to locally verify whether candidate objects received from peers are

    indeed part of its own spatial query result set. The experiment results indicate that our method

    can reduce the access to the wireless broadcast channel by a significant amount, for example, up

    to 80 percent, in a dense urban area. This is achieved with minimal caching at the peers. By

    virtue of its P2P architecture, the method exhibits great scalability: the higher the mobile peer

    density, the more the queries answered by peers. Therefore, the query access latency can be

    markedly decreased with the increase in clients.

    Server and Clients Node Capture Attacks

    Abstract:

    In this project, we addressed the mitigation of control channel jamming by malicious colluding

    insiders and compromised system users as well as the identification of compromised users

    without prior knowledge of the number of compromised users in the system. We mapped the

    problem of control channel access that is robust to jamming by compromised users to the

    problem of secure key establishment under node capture attacks. Based on the mapping, we

    proposed a framework for control channel access schemes using random key assignment. We

    proposed and evaluated metrics for resilience and delay which quantify the availability of control

    messages under control channel jamming attacks. In future work, we will investigate

    modifications to the adversarys jamming strategy and the effect on the availability of control

    messages and the ability to identify compromised users.

    Multi Server Communication In Distributed Management System

    Abstract: This approach has the potential of both distributing the operation processing load

    among the proxies and enabling clients to access the service by communicating with nearby

    proxies rather than a potentially distant centralized server. However, achieving even just

    serializability for operations executed at these proxies using standard replication approaches

    requires that a proxy involve either a centralized server or other (possibly distant) proxies on the

  • 8/7/2019 Server and Clients Node Capture Attacks

    17/24

    critical path of each update operation. Our system implements a service with a designated server

    and an unbounded number of proxies. We generically refer to the server and the proxies as

    processes. To support the service, a proxy joins the service. In doing so, it is positioned within a

    tree rooted at the server. All proxies in the subtree rooted at that child are said to disconnect. The

    child (or, if the child failed, each uppermost surviving proxy in the subtree) can inform its

    subtree of the disconnection. The subtree can stay put until the disconnection heals, or they

    might reconnect via the server.

    Intercity Search Query Processing

    Abstract: This project presented a novel approach for reducing the spatial query access latency

    by leveraging results from nearby peers in wireless broadcast environments. Significantly, our

    scheme allows a mobile client to locally verify whether candidate objects received from peers are

    indeed part of its own spatial query result set. The experiment results indicate that our method

    can reduce the access to the wireless broadcast channel by a significant amount, for example, up

    to 80 percent, in a dense urban area. This is achieved with minimal caching at the peers. By

    virtue of its P2P architecture, the method exhibits great scalability: the higher the mobile peer

    density, the more the queries answered by peers. Therefore, the query access latency can be

    markedly decreased with the increase in clients.

    Server and Clients Node Capture Attacks

    Abstract:

    In this project, we addressed the mitigation of control channel jamming by malicious colluding

    insiders and compromised system users as well as the identification of compromised users

    without prior knowledge of the number of compromised users in the system. We mapped the

    problem of control channel access that is robust to jamming by compromised users to the

    problem of secure key establishment under node capture attacks. Based on the mapping, we

    proposed a framework for control channel access schemes using random key assignment. We

    proposed and evaluated metrics for resilience and delay which quantify the availability of control

    messages under control channel jamming attacks. In future work, we will investigate

  • 8/7/2019 Server and Clients Node Capture Attacks

    18/24

    modifications to the adversarys jamming strategy and the effect on the availability of control

    messages and the ability to identify compromised users.

    Multi Server Communication In Distributed Management System

    Abstract: This approach has the potential of both distributing the operation processing load

    among the proxies and enabling clients to access the service by communicating with nearby

    proxies rather than a potentially distant centralized server. However, achieving even just

    serializability for operations executed at these proxies using standard replication approaches

    requires that a proxy involve either a centralized server or other (possibly distant) proxies on the

    critical path of each update operation. Our system implements a service with a designated server

    and an unbounded number of proxies. We generically refer to the server and the proxies as

    processes. To support the service, a proxy joins the service. In doing so, it is positioned within a

    tree rooted at the server. All proxies in the subtree rooted at that child are said to disconnect. The

    child (or, if the child failed, each uppermost surviving proxy in the subtree) can inform its

    subtree of the disconnection. The subtree can stay put until the disconnection heals, or they

    might reconnect via the server.

    Intercity Search Query Processing

    Abstract: This project presented a novel approach for reducing the spatial query access latency

    by leveraging results from nearby peers in wireless broadcast environments. Significantly, our

    scheme allows a mobile client to locally verify whether candidate objects received from peers are

    indeed part of its own spatial query result set. The experiment results indicate that our method

    can reduce the access to the wireless broadcast channel by a significant amount, for example, up

    to 80 percent, in a dense urban area. This is achieved with minimal caching at the peers. By

    virtue of its P2P architecture, the method exhibits great scalability: the higher the mobile peerdensity, the more the queries answered by peers. Therefore, the query access latency can be

    markedly decreased with the increase in clients.

    Server and Clients Node Capture Attacks

    Abstract:

  • 8/7/2019 Server and Clients Node Capture Attacks

    19/24

    In this project, we addressed the mitigation of control channel jamming by malicious colluding

    insiders and compromised system users as well as the identification of compromised users

    without prior knowledge of the number of compromised users in the system. We mapped the

    problem of control channel access that is robust to jamming by compromised users to the

    problem of secure key establishment under node capture attacks. Based on the mapping, we

    proposed a framework for control channel access schemes using random key assignment. We

    proposed and evaluated metrics for resilience and delay which quantify the availability of control

    messages under control channel jamming attacks. In future work, we will investigate

    modifications to the adversarys jamming strategy and the effect on the availability of control

    messages and the ability to identify compromised users.

    Multi Server Communication In Distributed Management System

    Abstract: This approach has the potential of both distributing the operation processing load

    among the proxies and enabling clients to access the service by communicating with nearby

    proxies rather than a potentially distant centralized server. However, achieving even just

    serializability for operations executed at these proxies using standard replication approaches

    requires that a proxy involve either a centralized server or other (possibly distant) proxies on the

    critical path of each update operation. Our system implements a service with a designated server

    and an unbounded number of proxies. We generically refer to the server and the proxies as

    processes. To support the service, a proxy joins the service. In doing so, it is positioned within a

    tree rooted at the server. All proxies in the subtree rooted at that child are said to disconnect. The

    child (or, if the child failed, each uppermost surviving proxy in the subtree) can inform its

    subtree of the disconnection. The subtree can stay put until the disconnection heals, or they

    might reconnect via the server.

    Intercity Search Query Processing

    Abstract: This project presented a novel approach for reducing the spatial query access latency

    by leveraging results from nearby peers in wireless broadcast environments. Significantly, our

    scheme allows a mobile client to locally verify whether candidate objects received from peers are

    indeed part of its own spatial query result set. The experiment results indicate that our method

  • 8/7/2019 Server and Clients Node Capture Attacks

    20/24

    can reduce the access to the wireless broadcast channel by a significant amount, for example, up

    to 80 percent, in a dense urban area. This is achieved with minimal caching at the peers. By

    virtue of its P2P architecture, the method exhibits great scalability: the higher the mobile peer

    density, the more the queries answered by peers. Therefore, the query access latency can be

    markedly decreased with the increase in clients.

    Server and Clients Node Capture Attacks

    Abstract:

    In this project, we addressed the mitigation of control channel jamming by malicious colluding

    insiders and compromised system users as well as the identification of compromised users

    without prior knowledge of the number of compromised users in the system. We mapped the

    problem of control channel access that is robust to jamming by compromised users to the

    problem of secure key establishment under node capture attacks. Based on the mapping, we

    proposed a framework for control channel access schemes using random key assignment. We

    proposed and evaluated metrics for resilience and delay which quantify the availability of control

    messages under control channel jamming attacks. In future work, we will investigate

    modifications to the adversarys jamming strategy and the effect on the availability of control

    messages and the ability to identify compromised users.

    Multi Server Communication In Distributed Management System

    Abstract: This approach has the potential of both distributing the operation processing load

    among the proxies and enabling clients to access the service by communicating with nearby

    proxies rather than a potentially distant centralized server. However, achieving even just

    serializability for operations executed at these proxies using standard replication approaches

    requires that a proxy involve either a centralized server or other (possibly distant) proxies on the

    critical path of each update operation. Our system implements a service with a designated serverand an unbounded number of proxies. We generically refer to the server and the proxies as

    processes. To support the service, a proxy joins the service. In doing so, it is positioned within a

    tree rooted at the server. All proxies in the subtree rooted at that child are said to disconnect. The

    child (or, if the child failed, each uppermost surviving proxy in the subtree) can inform its

  • 8/7/2019 Server and Clients Node Capture Attacks

    21/24

    subtree of the disconnection. The subtree can stay put until the disconnection heals, or they

    might reconnect via the server.

    Intercity Search Query Processing

    Abstract: This project presented a novel approach for reducing the spatial query access latency

    by leveraging results from nearby peers in wireless broadcast environments. Significantly, our

    scheme allows a mobile client to locally verify whether candidate objects received from peers are

    indeed part of its own spatial query result set. The experiment results indicate that our method

    can reduce the access to the wireless broadcast channel by a significant amount, for example, up

    to 80 percent, in a dense urban area. This is achieved with minimal caching at the peers. By

    virtue of its P2P architecture, the method exhibits great scalability: the higher the mobile peer

    density, the more the queries answered by peers. Therefore, the query access latency can be

    markedly decreased with the increase in clients.

    Server and Clients Node Capture Attacks

    Abstract:

    In this project, we addressed the mitigation of control channel jamming by malicious colluding

    insiders and compromised system users as well as the identification of compromised users

    without prior knowledge of the number of compromised users in the system. We mapped the

    problem of control channel access that is robust to jamming by compromised users to the

    problem of secure key establishment under node capture attacks. Based on the mapping, we

    proposed a framework for control channel access schemes using random key assignment. We

    proposed and evaluated metrics for resilience and delay which quantify the availability of control

    messages under control channel jamming attacks. In future work, we will investigate

    modifications to the adversarys jamming strategy and the effect on the availability of control

    messages and the ability to identify compromised users.

    Multi Server Communication In Distributed Management System

  • 8/7/2019 Server and Clients Node Capture Attacks

    22/24

    Abstract: This approach has the potential of both distributing the operation processing load

    among the proxies and enabling clients to access the service by communicating with nearby

    proxies rather than a potentially distant centralized server. However, achieving even just

    serializability for operations executed at these proxies using standard replication approaches

    requires that a proxy involve either a centralized server or other (possibly distant) proxies on the

    critical path of each update operation. Our system implements a service with a designated server

    and an unbounded number of proxies. We generically refer to the server and the proxies as

    processes. To support the service, a proxy joins the service. In doing so, it is positioned within a

    tree rooted at the server. All proxies in the subtree rooted at that child are said to disconnect. The

    child (or, if the child failed, each uppermost surviving proxy in the subtree) can inform its

    subtree of the disconnection. The subtree can stay put until the disconnection heals, or they

    might reconnect via the server.

    Intercity Search Query Processing

    Abstract: This project presented a novel approach for reducing the spatial query access latency

    by leveraging results from nearby peers in wireless broadcast environments. Significantly, our

    scheme allows a mobile client to locally verify whether candidate objects received from peers are

    indeed part of its own spatial query result set. The experiment results indicate that our method

    can reduce the access to the wireless broadcast channel by a significant amount, for example, up

    to 80 percent, in a dense urban area. This is achieved with minimal caching at the peers. By

    virtue of its P2P architecture, the method exhibits great scalability: the higher the mobile peer

    density, the more the queries answered by peers. Therefore, the query access latency can be

    markedly decreased with the increase in clients.

    Server and Clients Node Capture Attacks

    Abstract:

    In this project, we addressed the mitigation of control channel jamming by malicious colluding

    insiders and compromised system users as well as the identification of compromised users

    without prior knowledge of the number of compromised users in the system. We mapped the

  • 8/7/2019 Server and Clients Node Capture Attacks

    23/24

    problem of control channel access that is robust to jamming by compromised users to the

    problem of secure key establishment under node capture attacks. Based on the mapping, we

    proposed a framework for control channel access schemes using random key assignment. We

    proposed and evaluated metrics for resilience and delay which quantify the availability of control

    messages under control channel jamming attacks. In future work, we will investigate

    modifications to the adversarys jamming strategy and the effect on the availability of control

    messages and the ability to identify compromised users.

    Multi Server Communication In Distributed Management System

    Abstract: This approach has the potential of both distributing the operation processing load

    among the proxies and enabling clients to access the service by communicating with nearby

    proxies rather than a potentially distant centralized server. However, achieving even just

    serializability for operations executed at these proxies using standard replication approaches

    requires that a proxy involve either a centralized server or other (possibly distant) proxies on the

    critical path of each update operation. Our system implements a service with a designated server

    and an unbounded number of proxies. We generically refer to the server and the proxies as

    processes. To support the service, a proxy joins the service. In doing so, it is positioned within a

    tree rooted at the server. All proxies in the subtree rooted at that child are said to disconnect. The

    child (or, if the child failed, each uppermost surviving proxy in the subtree) can inform its

    subtree of the disconnection. The subtree can stay put until the disconnection heals, or they

    might reconnect via the server.

    Intercity Search Query Processing

    Abstract: This project presented a novel approach for reducing the spatial query access latency

    by leveraging results from nearby peers in wireless broadcast environments. Significantly, ourscheme allows a mobile client to locally verify whether candidate objects received from peers are

    indeed part of its own spatial query result set. The experiment results indicate that our method

    can reduce the access to the wireless broadcast channel by a significant amount, for example, up

    to 80 percent, in a dense urban area. This is achieved with minimal caching at the peers. By

    virtue of its P2P architecture, the method exhibits great scalability: the higher the mobile peer

  • 8/7/2019 Server and Clients Node Capture Attacks

    24/24

    density, the more the queries answered by peers. Therefore, the query access latency can be

    markedly decreased with the increase in clients.