Reconfigurable peer-to-peer connectivity overlays for information assurance applications

  • Authors:
  • K. Ravindran

  • Affiliations:
  • The City University of New York, New York, NY

  • Venue:
  • ICC'09 Proceedings of the 2009 IEEE international conference on Communications
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

The paper offers tree-structured connectivity between the peer entities over an infrastructure network as an abstraction to embody the application-oriented processing functions on peer-to-peer information flows. Tree reconfigurations are triggered when failures or security violations occur in the connectivity path between the peer nodes (e.g., increase in path delays, DOS attack on a node). Reconfigurations are also initiated when the application-level properties of information flows change (e.g., lower data accuracy for non-important contents). For Information Assurance settings, a tree structure elegantly supports the desired properties of separation and non-inference between the low-level network entities and the application entities. A connectivity management algorithm reconfigures a tree satisfying the desired topological properties (e.g., low geographic spread, low peer-to-peer distances). The algorithm provides redundancy in the connectivity paths along the temporal dimension (on top of a rich connectivity in the physical infrastructure -- as in overlay networks). Application case studies of tree-structured connectivity with QoS and security goals are also described.