Helsinki Institute for Information Technology

Displaying 1-17 of 17 results

  • White Papers // Jun 2012

    Scalable Architecture for Multimedia Multicast Internet Applications

    The authors propose a scalable multicast architecture for potentially large overlay networks. Their techniques address sub-optimality of the Adaptive Hybrid Error Correction (AHEC) scheme in the multicast scenarios. A hierarchical multi-stage multicast tree topology is constructed in order to improve performance of AHEC and guarantee QoS for the multicast clients....

    Provided By Helsinki Institute for Information Technology

  • White Papers // Aug 2011

    Securing Medical Sensor Network With HIP

    Recent developments of embedded wireless technologies, such as low-cost low-power wireless sensor platforms, uncovered big potential for novel applications. Health care and well-being are examples of two applications that can have large impact on society. Medical sensor networks via continuous monitoring of vital health parameters over a long period of...

    Provided By Helsinki Institute for Information Technology

  • White Papers // Jun 2011

    DISPUTE: Distributed Puzzle Tussle

    Distributed Denial of Service (DDoS) attack continues to be one of the main vulnerabilities of today's Internet. Client's puzzle mechanism is a well-known solution against such threat, however with badly tuned puzzle sizes it may harm the clients in the peaceful time, as well as produce additional difficulties during an...

    Provided By Helsinki Institute for Information Technology

  • White Papers // Feb 2011

    Improving TCP-Friendliness and Fairness for mHIP

    Multi-homed environments are getting increasingly common, especially for mobile users. mHIP was designed to provide secure multipath data transmission for the multi-homed hosts and boost throughput of a single TCP connection by effectively distributing data over multiple available paths. In this paper, the authors develop a TCP-friendly congestion control scheme...

    Provided By Helsinki Institute for Information Technology

  • White Papers // Dec 2010

    Multipath Routing, Congestion Avoidance and DDoS Resistance

    In open networks, especially in the global Internet consisting of thousands of independent sub-networks with different policies, a portion of the nodes must be considered malicious. A Distributed Denial of Service (DDoS) attack targets a victim using multiple colluding nodes scattered around the network, that try to deplete the resources...

    Provided By Helsinki Institute for Information Technology

  • White Papers // Aug 2010

    On Application of Host Identity Protocol in Wireless Sensor Networks

    Recent advances in development of low-cost wireless sensor platforms open up opportunities for novel Wireless Sensor Network (WSN) applications. Likewise emerge security concerns of WSNs receiving closer attention of research community. Well known security threats in WSNs range from Denial-of-Service (DoS), Replay and Sybil attacks to those targeted at violating...

    Provided By Helsinki Institute for Information Technology

  • White Papers // Jun 2010

    Playing Defense by Offense: Equilibrium in the DoS-Attack Problem

    The authors develop defenses from resource-exhausting Denial-of-Service attacks initiated by an attacker to a server. The attacker does not have a permanent identity but spoofs the IP addresses for other users. Generalizing the Defense-by-Offense approach they enable benign users to obtain low service time by re-submitting requests according to a...

    Provided By Helsinki Institute for Information Technology

  • White Papers // Jun 2010

    On Applications of Cooperative Security in Distributed Networks

    Many applications running on the Internet operate in fully or semi-distributed fashion including P2P networks or social networks. Distributed applications exhibit many advantages over classical client-server models regarding scalability, fault tolerance, and cost. Unfortunately, the distributed system operation also brings many security threats along that challenge their performance and reliability....

    Provided By Helsinki Institute for Information Technology

  • White Papers // Apr 2010

    A Preliminary Analysis of TCP Performance in an Enterprise Network

    Although TCP behavior is one of the most studied aspects of Internet traffic, little is known about TCP performance within modern enterprise networks. In this paper, the authors analyze aspects of TCP performance observed in packet traces taken over four months from a medium-sized enterprise. They assess the prevalence of...

    Provided By Helsinki Institute for Information Technology

  • White Papers // Mar 2010

    Secure and Efficient IPv4/IPv6 Handovers Using Host-Based Identifier-Locator Split

    Internet architecture is facing at least three major challenges. First, it is running out of IPv4 addresses. IPv6 offers a long-term solution to the problem by offering a vast amount of addresses but is neither supported widely by networking software nor has been deployed widely in different networks. Second, end-to-end...

    Provided By Helsinki Institute for Information Technology

  • White Papers // Jan 2010

    Elliptic Curve Cryptography (ECC) for Host Identity Protocol (HIP)

    The authors compare computational resources required for handling control plane of the Host Identity Protocol (HIP) using Rivest-Shamir-Adleman (RSA) versus Elliptic Curve Cryptography (ECC) encryption algorithms with keys of equivalent strength. They show that servers would establish almost three times more HIP connections per second when ECC is used for...

    Provided By Helsinki Institute for Information Technology

  • White Papers // Jul 2009

    Secure Multipath Transport for Legacy Internet Applications

    Multi-interface mobile devices and multi-homed residential Internet connections are becoming commonplace. However, standard transport protocols TCP and SCTP are unable to take advantage of several available paths so that the application using a single transport connection would receive the aggregate bandwidth of all paths. Multi-homing and advanced security features make...

    Provided By Helsinki Institute for Information Technology

  • White Papers // Jun 2009

    Collaborative Reputation-Based Voice Spam Filtering

    The authors propose a collaborative reputation-based voice spam filtering framework. Their approach uses the cumulative online duration of a VoIP user to derive his reputation value. And they leverage user feedback to mark unsolicited calls. For each unwanted call, their voice spam filter charges the caller a reputation point, and...

    Provided By Helsinki Institute for Information Technology

  • White Papers // Apr 2009

    SAVAH: Source Address Validation With Host Identity Protocol

    Explosive growth of the Internet and lack of mechanisms that validate the authenticity of a packet source produced serious security and accounting issues. In this paper, the authors propose validating source addresses in LAN using Host Identity Protocol (HIP) deployed in a first-hop router. Compared to alternative solutions such as...

    Provided By Helsinki Institute for Information Technology

  • White Papers // Mar 2009

    Performance of Host Identity Protocol on Symbian OS

    The Host Identity Protocol (HIP) has been specified by the IETF as a new solution for secure host mobility and multi-homing in the Internet. HIP uses self-certifying public-private key pairs in combination with IPsec to authenticate hosts and protect user data. While there are three open-source HIP implementations, little experience...

    Provided By Helsinki Institute for Information Technology

  • White Papers // Sep 2008

    BAR Fault Tolerance for Cooperative Services

    For routers and switches to handle ever-increasing bandwidth requirements, the packet "Fast-path" must be handled with specialized hardware. There have been two approaches to building such packet forwarding hardware. The first is to embed particular algorithms in hardware; this is what most commodity forwarding chips do (e.g., those from Broadcom,...

    Provided By Helsinki Institute for Information Technology

  • White Papers // Apr 2008

    Performance Analysis of General Backoff Protocols

    In this paper, the authors analyze backoff protocols, such as the one used in Ethernet. They examine a General Backoff Function (GBF) rather than just the Binary Exponential Backoff (BEB) used by Ethernet. Under some mild assumptions they find stability and optimality conditions for a wide class of backoff protocols...

    Provided By Helsinki Institute for Information Technology

  • White Papers // Apr 2010

    A Preliminary Analysis of TCP Performance in an Enterprise Network

    Although TCP behavior is one of the most studied aspects of Internet traffic, little is known about TCP performance within modern enterprise networks. In this paper, the authors analyze aspects of TCP performance observed in packet traces taken over four months from a medium-sized enterprise. They assess the prevalence of...

    Provided By Helsinki Institute for Information Technology

  • White Papers // Sep 2008

    BAR Fault Tolerance for Cooperative Services

    For routers and switches to handle ever-increasing bandwidth requirements, the packet "Fast-path" must be handled with specialized hardware. There have been two approaches to building such packet forwarding hardware. The first is to embed particular algorithms in hardware; this is what most commodity forwarding chips do (e.g., those from Broadcom,...

    Provided By Helsinki Institute for Information Technology

  • White Papers // Dec 2010

    Multipath Routing, Congestion Avoidance and DDoS Resistance

    In open networks, especially in the global Internet consisting of thousands of independent sub-networks with different policies, a portion of the nodes must be considered malicious. A Distributed Denial of Service (DDoS) attack targets a victim using multiple colluding nodes scattered around the network, that try to deplete the resources...

    Provided By Helsinki Institute for Information Technology

  • White Papers // Feb 2011

    Improving TCP-Friendliness and Fairness for mHIP

    Multi-homed environments are getting increasingly common, especially for mobile users. mHIP was designed to provide secure multipath data transmission for the multi-homed hosts and boost throughput of a single TCP connection by effectively distributing data over multiple available paths. In this paper, the authors develop a TCP-friendly congestion control scheme...

    Provided By Helsinki Institute for Information Technology

  • White Papers // Jun 2012

    Scalable Architecture for Multimedia Multicast Internet Applications

    The authors propose a scalable multicast architecture for potentially large overlay networks. Their techniques address sub-optimality of the Adaptive Hybrid Error Correction (AHEC) scheme in the multicast scenarios. A hierarchical multi-stage multicast tree topology is constructed in order to improve performance of AHEC and guarantee QoS for the multicast clients....

    Provided By Helsinki Institute for Information Technology

  • White Papers // Aug 2011

    Securing Medical Sensor Network With HIP

    Recent developments of embedded wireless technologies, such as low-cost low-power wireless sensor platforms, uncovered big potential for novel applications. Health care and well-being are examples of two applications that can have large impact on society. Medical sensor networks via continuous monitoring of vital health parameters over a long period of...

    Provided By Helsinki Institute for Information Technology

  • White Papers // Jun 2011

    DISPUTE: Distributed Puzzle Tussle

    Distributed Denial of Service (DDoS) attack continues to be one of the main vulnerabilities of today's Internet. Client's puzzle mechanism is a well-known solution against such threat, however with badly tuned puzzle sizes it may harm the clients in the peaceful time, as well as produce additional difficulties during an...

    Provided By Helsinki Institute for Information Technology

  • White Papers // Aug 2010

    On Application of Host Identity Protocol in Wireless Sensor Networks

    Recent advances in development of low-cost wireless sensor platforms open up opportunities for novel Wireless Sensor Network (WSN) applications. Likewise emerge security concerns of WSNs receiving closer attention of research community. Well known security threats in WSNs range from Denial-of-Service (DoS), Replay and Sybil attacks to those targeted at violating...

    Provided By Helsinki Institute for Information Technology

  • White Papers // Jun 2010

    Playing Defense by Offense: Equilibrium in the DoS-Attack Problem

    The authors develop defenses from resource-exhausting Denial-of-Service attacks initiated by an attacker to a server. The attacker does not have a permanent identity but spoofs the IP addresses for other users. Generalizing the Defense-by-Offense approach they enable benign users to obtain low service time by re-submitting requests according to a...

    Provided By Helsinki Institute for Information Technology

  • White Papers // Jun 2010

    On Applications of Cooperative Security in Distributed Networks

    Many applications running on the Internet operate in fully or semi-distributed fashion including P2P networks or social networks. Distributed applications exhibit many advantages over classical client-server models regarding scalability, fault tolerance, and cost. Unfortunately, the distributed system operation also brings many security threats along that challenge their performance and reliability....

    Provided By Helsinki Institute for Information Technology

  • White Papers // Mar 2010

    Secure and Efficient IPv4/IPv6 Handovers Using Host-Based Identifier-Locator Split

    Internet architecture is facing at least three major challenges. First, it is running out of IPv4 addresses. IPv6 offers a long-term solution to the problem by offering a vast amount of addresses but is neither supported widely by networking software nor has been deployed widely in different networks. Second, end-to-end...

    Provided By Helsinki Institute for Information Technology

  • White Papers // Jan 2010

    Elliptic Curve Cryptography (ECC) for Host Identity Protocol (HIP)

    The authors compare computational resources required for handling control plane of the Host Identity Protocol (HIP) using Rivest-Shamir-Adleman (RSA) versus Elliptic Curve Cryptography (ECC) encryption algorithms with keys of equivalent strength. They show that servers would establish almost three times more HIP connections per second when ECC is used for...

    Provided By Helsinki Institute for Information Technology

  • White Papers // Jun 2009

    Collaborative Reputation-Based Voice Spam Filtering

    The authors propose a collaborative reputation-based voice spam filtering framework. Their approach uses the cumulative online duration of a VoIP user to derive his reputation value. And they leverage user feedback to mark unsolicited calls. For each unwanted call, their voice spam filter charges the caller a reputation point, and...

    Provided By Helsinki Institute for Information Technology

  • White Papers // Jul 2009

    Secure Multipath Transport for Legacy Internet Applications

    Multi-interface mobile devices and multi-homed residential Internet connections are becoming commonplace. However, standard transport protocols TCP and SCTP are unable to take advantage of several available paths so that the application using a single transport connection would receive the aggregate bandwidth of all paths. Multi-homing and advanced security features make...

    Provided By Helsinki Institute for Information Technology

  • White Papers // Apr 2009

    SAVAH: Source Address Validation With Host Identity Protocol

    Explosive growth of the Internet and lack of mechanisms that validate the authenticity of a packet source produced serious security and accounting issues. In this paper, the authors propose validating source addresses in LAN using Host Identity Protocol (HIP) deployed in a first-hop router. Compared to alternative solutions such as...

    Provided By Helsinki Institute for Information Technology

  • White Papers // Mar 2009

    Performance of Host Identity Protocol on Symbian OS

    The Host Identity Protocol (HIP) has been specified by the IETF as a new solution for secure host mobility and multi-homing in the Internet. HIP uses self-certifying public-private key pairs in combination with IPsec to authenticate hosts and protect user data. While there are three open-source HIP implementations, little experience...

    Provided By Helsinki Institute for Information Technology

  • White Papers // Apr 2008

    Performance Analysis of General Backoff Protocols

    In this paper, the authors analyze backoff protocols, such as the one used in Ethernet. They examine a General Backoff Function (GBF) rather than just the Binary Exponential Backoff (BEB) used by Ethernet. Under some mild assumptions they find stability and optimality conditions for a wide class of backoff protocols...

    Provided By Helsinki Institute for Information Technology