Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Brian Neil Levine is active.

Publication


Featured researches published by Brian Neil Levine.


ieee international conference computer and communications | 2006

MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks

John Burgess; Brian Gallagher; David D. Jensen; Brian Neil Levine

Disruption-tolerant networks (DTNs) attempt to route network messages via intermittently connected nodes. Routing in such environments is difficult because peers have little information about the state of the partitioned network and transfer opportunities between peers are of limited duration. In this paper, we propose MaxProp, a protocol for effective routing of DTN messages. MaxProp is based on prioritizing both the schedule of packets transmitted to other peers and the schedule of packets to be dropped. These priorities are based on the path likelihoods to peers according to historical data and also on several complementary mechanisms, including acknowledgments, a head-start for new packets, and lists of previous intermediaries. Our evaluations show that MaxProp performs better than protocols that have access to an oracle that knows the schedule of meetings between peers. Our evaluations are based on 60 days of traces from a real DTN network we have deployed on 30 buses. Our network, called UMassDieselNet, serves a large geographic area between five colleges. We also evaluate MaxProp on simulated topologies and show it performs well in a wide variety of DTN environments.


international conference on network protocols | 2002

A secure routing protocol for ad hoc networks

Kimaya Sanzgiri; Bridget Dahill; Brian Neil Levine; Clay Shields; Elizabeth M. Belding-Royer

Most recent ad hoc network research has focused on providing routing services without considering security. We detail security threats against ad hoc routing protocols, specifically examining AODV and DSR. In light of these threats, we identify three different environments with distinct security requirements. We propose a solution to one, the managed-open scenario where no network infrastructure is pre-deployed, but a small amount of prior security coordination is expected. Our protocol, authenticated routing for ad hoc networks (ARAN), is based on certificates and successfully defeats all identified attacks.


acm special interest group on data communication | 2007

DTN routing as a resource allocation problem

Aruna Balasubramanian; Brian Neil Levine; Arun Venkataramani

Many DTN routing protocols use a variety of mechanisms, including discovering the meeting probabilities among nodes, packet replication, and network coding. The primary focus of these mechanisms is to increase the likelihood of finding a path with limited information, so these approaches have only an incidental effect on such routing metrics as maximum or average delivery latency. In this paper, we present RAPID , an intentional DTN routing protocol that can optimize a specific routing metric such as worst-case delivery latency or the fraction of packets that are delivered within a deadline. The key insight is to treat DTN routing as a resource allocation problem that translates the routing metric into per-packet utilities which determine how packets should be replicated in the system. We evaluate RAPID rigorously through a prototype of RAPID deployed over a vehicular DTN testbed of 40 buses and simulations based on real traces. To our knowledge, this is the first paper to report on a routing protocol deployed on a real DTN at this scale. Our results suggest that RAPID significantly outperforms existing routing protocols for several metrics. We also show empirically that for small loads RAPID is within 10% of the optimal performance.


acm/ieee international conference on mobile computing and networking | 2007

Study of a bus-based disruption-tolerant network: mobility modeling and impact on routing

Xiaolan Zhang; James F. Kurose; Brian Neil Levine; Donald F. Towsley; Honggang Zhang

We study traces taken from UMass DieselNet, a Disruption-Tolerant Network consisting of WiFi nodes attached to buses. As buses travel their routes, they encounter other buses and in some cases are able to establish pair-wise connections and transfer data between them. We analyze the bus-to-bus contact traces to characterize the contact process between buses and its impact on DTN routing performance. We find that the all-bus-pairs aggregated inter-contact times show no discernible pattern. However, the inter-contact times aggregated at a route level exhibit periodic behavior.Based on analysis of the deterministic inter-meeting times for bus pairs running on route pairs, and consideration of the variability in bus movement and the random failures to establish connections, we construct generative route-level models that capture the above behavior. Through trace-driven simulations of epidemic routing, we find that the epidemic performance predicted by traces generated with this finer-grained route-level model is much closer to the actual performance that would be realized in the operational system than traces generated using the coarse-grained all-bus-pairs aggregated model. This suggests the importance in choosing the rightlevel of model granularity when modelingmobility-related measures such as inter-contact times in DTNs.


IEEE Journal on Selected Areas in Communications | 2005

Authenticated routing for ad hoc networks

Kimaya Sanzgiri; Daniel LaFlamme; Bridget Dahill; Brian Neil Levine; Clay Shields; Elizabeth M. Belding-Royer

Initial work in ad hoc routing has considered only the problem of providing efficient mechanisms for finding paths in very dynamic networks, without considering security. Because of this, there are a number of attacks that can be used to manipulate the routing in an ad hoc network. In this paper, we describe these threats, specifically showing their effects on ad hoc on-demand distance vector and dynamic source routing. Our protocol, named authenticated routing for ad hoc networks (ARAN), uses public-key cryptographic mechanisms to defeat all identified attacks. We detail how ARAN can secure routing in environments where nodes are authorized to participate but untrusted to cooperate, as well as environments where participants do not need to be authorized to participate. Through both simulation and experimentation with our publicly available implementation, we characterize and evaluate ARAN and show that it is able to effectively and efficiently discover secure routes within an ad hoc network.


international symposium on wearable computers | 2001

Wearable computers as packet transport mechanisms in highly-partitioned ad-hoc networks

James A. Davis; Andrew H. Fagg; Brian Neil Levine

The decreasing size and cost of wearable computers and mobile sensors is presenting new challenges and opportunities for deploying networks. Existing network routing protocols provide reliable communication between nodes and allow for mobility and even ad-hoc deployment. They rely, however on the assumption of a dense scattering of nodes and end-to-end connectivity in the network. In this paper we address routing support for ad-hoc, wireless networks under conditions of sporadic connectivity and ever-present network partitions. This work proposes a general framework of agent movement and communication in which mobile computers physically carry packets across network partitions. We then propose algorithms that exploit the relative position of stationary devices and non-randonmess in the movement of mobile agents in the network. The learned structure of the network is used to inform an adaptive routing strategy With a simulation, we evaluate these algorithms and their ability to route packets efficiently through a highly-partitioned network.


computer and communications security | 2006

Inferring the source of encrypted HTTP connections

Marc Liberatore; Brian Neil Levine

We examine the effectiveness of two traffic analysis techniques for identifying encrypted HTTP streams. The techniques are based upon classification algorithms, identifying encrypted traffic on the basis of similarities to features in a library of known profiles. We show that these profiles need not be collected immediately before the encrypted stream; these methods can be used to identify traffic observed both well before and well after the library is created. We give evidence that these techniques will exhibit the scalability necessary to be effective on the Internet. We examine several methods of actively countering the techniques, and we find that such countermeasures are effective, but at a significant increase in the size of the traffic stream. Our claims are substantiated by experiments and simulation on over 400,000 traffic streams we collected from 2,000 distinct web sites during a two month period.


computer and communications security | 2000

A protocol for anonymous communication over the Internet

Clay Shields; Brian Neil Levine

ABSTRACT With the growth and a eptan e of the Internet, there has been in reased interest in maintaining anonymity in the network. This paper presents a new proto ol for initiator anonymity alled Hordes, whi h uses forwarding me hanisms similar to those used in previous proto ols for sending data, but is the rst proto ol to make use of the anonymity inherent in multi ast routing to re eive data. We show this results in shorter transmission laten ies and requires less work of the proto ol parti ipants, in terms of the messages pro essed. We also present a omparison of the se urity and anonymity of Hordes with previous proto ols, using the rst quantitative de nition of anonymity and unlinkability. Our analysis shows that Hordes provides anonymity in a degree similar to that of Crowds and Onion Routing, but also that Hordes has numerous performan e advantages.


acm special interest group on data communication | 2008

Interactive wifi connectivity for moving vehicles

Aruna Balasubramanian; Ratul Mahajan; Arun Venkataramani; Brian Neil Levine; John Zahorjan

We ask if the ubiquity of WiFi can be leveraged to provide cheap connectivity from moving vehicles for common applications such as Web browsing and VoIP. Driven by this question, we conduct a study of connection quality available to vehicular WiFi clients based on measurements from testbeds in two different cities. We find that current WiFi handoff methods, in which clients communicate with one basestation at a time, lead to frequent disruptions in connectivity. We also find that clients can overcome many disruptions by communicating with multiple basestations simultaneously. These findings lead us to develop ViFi, a protocol that opportunistically exploits basestation diversity to minimize disruptions and support interactive applications for mobile clients. ViFi uses a decentralized and lightweight probabilistic algorithm for coordination between participating basestations. Our evaluation using a two-month long deployment and trace-driven simulations shows that its link-layer performance comes close to an ideal diversity-based protocol. Using two applications, VoIP and short TCP transfers, we show that the link layer performance improvement translates to better application performance. In our deployment, ViFi doubles the number of successful short TCP transfers and doubles the length of disruption-free VoIP sessions compared to an existing WiFi-style handoff protocol.


mobile adhoc and sensor systems | 2006

Capacity Enhancement using Throwboxes in DTNs

Wenrui Zhao; Yang Chen; Mostafa H. Ammar; Mark D. Corner; Brian Neil Levine; Ellen W. Zegura

Disruption tolerant networks (DTNs) are designed to overcome limitations in connectivity due to conditions such as mobility, poor infrastructure, and short range radios. DTNs rely on the inherent mobility in the network to deliver packets around frequent and extended network partitions using a store-carry-and-forward paradigm. However, missed contact opportunities decrease throughput and increase delay in the network. We propose the use of throwboxes in mobile DTNs to create a greater number of contact opportunities, consequently improving the performance of the network. Throwboxes are wireless nodes that act as relays, creating additional contact opportunities in the DTN. We propose algorithms to deploy stationary throwboxes in the network that simultaneously consider routing as well as placement. We also present placement algorithms that use more limited knowledge about the network structure. We perform an extensive evaluation of our algorithms by varying both the underlying routing and mobility models. Our results suggest several findings to guide the design and operation of throwbox-augmented DTNs

Collaboration


Dive into the Brian Neil Levine's collaboration.

Top Co-Authors

Avatar

Marc Liberatore

University of Massachusetts Amherst

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Matthew K. Wright

University of Texas at Arlington

View shared research outputs
Top Co-Authors

Avatar

Mark D. Corner

University of Massachusetts Amherst

View shared research outputs
Top Co-Authors

Avatar

George Dean Bissias

University of Massachusetts Amherst

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hamed Soroush

University of Massachusetts Amherst

View shared research outputs
Top Co-Authors

Avatar

James F. Kurose

University of Massachusetts Amherst

View shared research outputs
Top Co-Authors

Avatar

Robert J. Walls

University of Massachusetts Amherst

View shared research outputs
Researchain Logo
Decentralizing Knowledge