Secure overlay routing for large scale networks

M Gharib, H Yousefi'zadeh… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Probabilistic key pre-distribution schemes have recently emerged as major tools of
addressing secure routing challenge in wireless networks. In our previous work, we propose …

Secure overlay routing using key pre-distribution: A linear distance optimization approach

M Gharib, H Yousefi'zadeh… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Key pre-distribution algorithms have recently emerged as efficient alternatives of key
management in today's secure communications landscape. Secure routing techniques using …

A survey of key pre-distribution and overlay routing in unstructured wireless networks

M Gharib, H Yousefi'Zadeh… - Scientia Iranica, 2016 - scientiairanica.sharif.edu
Unstructured wireless networks such as mobile ad hoc networks and wireless sensor
networks have been rapidly growing in the past decade. Security is known as a challenging …

A novel methodology for constructing secure multipath overlays

MS Artigas, PG Lopez… - IEEE Internet Computing, 2005 - ieeexplore.ieee.org
One technique for securely delivering data in structured overlays is to increase the number
of disjoint paths among peers. However, most overlays do not offer a substrate to …

Secure interoperable architecture construction for overlay networks

P Jyothirmai, JS Raj - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
Delay-tolerant networking (DTN) is an approach to computer network architecture that seeks
to address the technical issues in heterogeneous networks that may lack continuous …

Identity theft protection in structured overlays

L Ganesh, BY Zhao - 1st IEEE ICNP Workshop on Secure …, 2005 - ieeexplore.ieee.org
Structured peer-to-peer (P2P) overlays rely on consistent and robust key-based routing to
support large-scale network applications such as multicast and global-scale storage. We …

Mediated overlay services (MOSES): Network security as a composable service

S Sidiroglou, A Stavrou… - 2007 IEEE Sarnoff …, 2007 - ieeexplore.ieee.org
In recent years, organizations have been shifting focus to their core business competencies,
and reducing total cost of ownership (TCO) associated with training and management of …

Chord-PKI: Embedding a public key infrastructure into the chord overlay network

A Avramidis, P Kotzanikolaou, C Douligeris - Public Key Infrastructure: 4th …, 2007 - Springer
Our goal in this paper is to provide authentication, encryption and non-repudiation services
for nodes within Peer-to-Peer networks, in an efficient and scalable way. To accomplish this …

Efficient security mechanisms for overlay multicast based content delivery

S Zhu, C Yao, D Liu, S Setia, S Jajodia - Computer communications, 2007 - Elsevier
This paper studies the security issues that arise in an overlay multicast architecture where
service providers distribute content such as web pages, static and streaming multimedia …

[PDF][PDF] Towards Scalable and Robust Overlay Networks.

B Awerbuch, C Scheideler - IPTPS, 2007 - ris.uni-paderborn.de
Every peer-to-peer system is based on some overlay network connecting its peers. Many of
the overlay network concepts proposed in the scientific community are based on the concept …