Non—cryptographic methods for improving real time transmission security and integrity
Abstract
In this paper we present a few non cryptographic methods for improving the security, integrity
and reliability of real time services. The methods presented in this paper apply to real time
transmitting systems, which are based on the Peer-to-Peer (P2P) model. A basic idea of
the first technique is to use agents for detecting steganographic content in packet headers,
so packets with suspicious entries in the IP header fields will be blocked or the fields will be
erased. The two other presented techniques are based on reputation and trust systems, so
trust and reputation basic definitions, types and modelling methods are shown. Also a simple
design scheme of using these mechanisms in a P2P real-time data transmitting infrastructure
is presented. Additionally, we describe an idea of path selecting technique, which can be used
to avoid paths that are susceptible to eavesdropping.
and reliability of real time services. The methods presented in this paper apply to real time
transmitting systems, which are based on the Peer-to-Peer (P2P) model. A basic idea of
the first technique is to use agents for detecting steganographic content in packet headers,
so packets with suspicious entries in the IP header fields will be blocked or the fields will be
erased. The two other presented techniques are based on reputation and trust systems, so
trust and reputation basic definitions, types and modelling methods are shown. Also a simple
design scheme of using these mechanisms in a P2P real-time data transmitting infrastructure
is presented. Additionally, we describe an idea of path selecting technique, which can be used
to avoid paths that are susceptible to eavesdropping.
Full Text:
PDFDOI: http://dx.doi.org/10.2478/v10065-011-0017-4
Date of publication: 2011-01-01 00:00:00
Date of submission: 2016-04-28 09:04:14
Statistics
Total abstract view - 379
Downloads (from 2020-06-17) - PDF - 0
Indicators
Refbacks
- There are currently no refbacks.
Copyright (c) 2015 Annales UMCS Sectio AI Informatica
This work is licensed under a Creative Commons Attribution 4.0 International License.