A Multicast-Avoiding Privacy Extension for the Avahi Zeroconf Daemon

نویسندگان

  • Daniel Kaiser
  • Andreas Rain
  • Marcel Waldvogel
  • Holger Strittmatter
چکیده

In today's local networks, a significant amount of traffic is caused by Multicast packets, such as Multicast DNS Service Discovery (mDNS-SD), a widespread technique used for conligurationless service distribution and discovery. It suffers from two major problems inherent in multicast: privacy and network load. We present a privacy extension for the Avahi Zeroconf Daemon that tackles both problems while being very efficient.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Zero Configuration Networking: Implementation, performance, and security

The ubiquitous access to wired and wireless networks is making information access possible from anywhere, anytime, and any device. Today, end-users are also highly mobile, often equipped with a range of portable devices, and they expect service availability when they require it. In addition, they do not want to be burdened by complex configurations before they can discover and use services. The...

متن کامل

First Steps in the Implementation of a Fault - Tolerant

Transis ADKM92,AAD93,ADM + 93] is a tool for group communication that provides reliable ordered multicast along with membership services and strong group semantics. Transis can currently be used by processes residing on nodes within a BCD (Broadcast Domain). Building distributed applications on top of these services enables the programmer to assume ordering constraints on message delivery even ...

متن کامل

LocationSafe: Granular Location Privacy for IoT Devices

Today, mobile data owners lack consent and control over the release and utilization of their location data. Third party applications continuously process and access location data without data owners granular control and without knowledge of how location data is being used. The proliferation of IoT devices will lead to larger scale abuses of trust. In this paper we present the first design and i...

متن کامل

The Biometric Daemon: A Public Perspective

Information privacy is maintained through authentication—the act of proving to a system that you are who you say you are. Unfortunately, current authentication methods are affected by a range of usability problems that impact significantly on the security of people’s data and access to secure systems. Recently, an experience-oriented security device, the Biometric Daemon, has been proposed whic...

متن کامل

Time Petri Net Models for a New Queuless and Uncentralized Resource Discovery System

In this report, we detail the model using Petri Nets of a new fully distributed resource reservation system. The basic idea of the considered distributed system is to let a user reserve a set of resources on a local network and to use them, without any specific, central administration component such as a frontend node. Resources can be, for instance, computing resources (cores, nodes, GPUs...) ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014