Participating researchers include:
Prof. Paul Van
The problem of service discovery is about dynamically locating
on a network servers that fulfill requirements of clients. Service discovery
protocols have been designed for that purpose and they can always been applied
in several different ways. A strategy is way to apply a service discovery
protocol. For example, in a strategy, that we call uniform memory less, each
server posts to a random set of l nodes all the services it has to offer
and each client queries a random set of l' nodes for the services it requires.
The goal of this work is to devise service discovery strategies and to characterize
them in terms of cost and latency.
Regarding satellite transport protocols, we look at the problem of handling
communication errors compromising the reliable and efficient delivery of units
of data from application to application. Satellite networks have a unique
set of link errors including bit corruption, handoff and limited connectivity
as well as higher variation of latency over short time periods. Unfortunately,
most transport protocols are only designed to handle congestion-related errors
common in wired networks. This inability to handle multiple kinds of errors
results in severe degradation in effective throughput and energy saving, which
are relevant metrics for a satellite environment. Our approach consists of
integrating differentiating error control strategies in transport protocols.
Threats to security of mobile and wireless networks are facts of life. The
research on intrusion detection in mobile and wireless networks acknowledges
the fact that creating a defense for every possible method of attack is an
impossible task. The long term goal of this research is to develop tools to
help network managers to detect and pinpoint sources of attacks and tools
to quickly recover and repair damages caused by attacks (e.g. contaminated
data). Currently, the focus is on detecting and pinpointing tools, that is
to say, intrusion detection systems.
Spontaneous communication is about the establishment, on the fly, of communication
among members of a group of users for collaboration purposes. It a model of
user level communication typically encountered in mobile and wireless networks.
Collaboration groups are said virtual because their topology doesn’t necessarily
matches the underlying physical topology. Virtual private services address
the challenges associated with distributed responsibility for access control
of resources. Virtual private services ensure security and privacy policies
that are adhered to through coordinated policy enforcement points. The core
challenge faced in this communication model is the ability to develop a solution
that ensures consistent access-control policies across a set of distributed
firewalls between disparate enterprises. While current tools can easily distribute
policy files, the deeper problem in ensuring consistent access policies,
across many different systems, is far more difficult.
Additional information can be found in the NETWORKS