Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Building and Managing Policy-Based Secure Overlay Networks
PDP '08 Proceedings of the 16th Euromicro Conference on Parallel, Distributed and Network-Based Processing (PDP 2008)
Self-organising Management Overlays for Future Internet Services
MACE '08 Proceedings of the 3rd IEEE international workshop on Modelling Autonomic Communications Environments
Identity-based routing
Identities in the Future Internet of Things
Wireless Personal Communications: An International Journal
LISP-DHT: towards a DHT to map identifiers onto locators
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
Comparative Study of Peer-to-Peer Architectures for Scalable Resource Discovery
AP2PS '09 Proceedings of the 2009 First International Conference on Advances in P2P Systems
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Internet 3.0: ten problems with current internet architecture and solutions for the next generation
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
A vision of the next generation internet: a policy oriented perspective
VoCS'08 Proceedings of the 2008 international conference on Visions of Computer Science: BCS International Academic Conference
Using identities to achieve enhanced privacy in future content delivery networks
Computers and Electrical Engineering
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
We propose to enhance the Next Generation Internet by creating a secure and scalable communication infrastructure that mirrors the structure of the real world: people talk to people, objects, objects between themselves and, in general, entities denoted by digital identities communicating with each other. We start from the digital identity and create a view in the communication sphere which is singular, unique, and optimized for that particular digital identity, building an identity plane that allows entities to address each other in an "identity to identity" approach. We use stackable overlay networks to deliver messages among communication parties and we look at the performance issues related with such kind of networks, being able to come halfway to the optimum.