Securing Phoenix Network Coordinate System: Difference between revisions
Jump to navigation
Jump to search
(Created page with '== Details == {{Project Description |supervisor=[http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen] |duration=3 to 6 months |type=Bachelor/Master Thesis or S…') |
|||
Line 6: | Line 6: | ||
|status=open | |status=open | ||
}} | }} | ||
== Description == | |||
Phoenix [1] is an accurate and decentralized Network Coordinate (NC) system. It can be used to predict the distance (latency) between two Internet hosts without performing directly measurement. We have demonstrated and evaluated Phoenix through Internet traces. | |||
In this project, we are going to consider the security issues in Phoenix NC. There are different kinds of attacks [2] [3] in NC systems, and we are going to design and deploy some security method in Phoenix NC. Finally, we will use typical attacks with real measured Internet data sets to evaluate our design. |
Revision as of 14:27, 9 December 2009
Details
Supervisor: | Yang Chen |
Duration: | 3 to 6 months |
Type: | Bachelor/Master Thesis or Student Project |
Status: | open |
Description
Phoenix [1] is an accurate and decentralized Network Coordinate (NC) system. It can be used to predict the distance (latency) between two Internet hosts without performing directly measurement. We have demonstrated and evaluated Phoenix through Internet traces.
In this project, we are going to consider the security issues in Phoenix NC. There are different kinds of attacks [2] [3] in NC systems, and we are going to design and deploy some security method in Phoenix NC. Finally, we will use typical attacks with real measured Internet data sets to evaluate our design.