Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sergio Marti is active.

Publication


Featured researches published by Sergio Marti.


acm/ieee international conference on mobile computing and networking | 2000

Mitigating routing misbehavior in mobile ad hoc networks

Sergio Marti; Thomas J. Giuli; Kevin Lai; Mary Baker

This paper describes two techniques that improve throughput in an ad hoc network in the presence of nodes that agree to forward packets but fail to do so. To mitigate this problem, we propose categorizing nodes based upon their dynamically measured behavior. We use a watchdog that identifies misbehaving nodes and a pathrater that helps routing protocols avoid these nodes. Through simulation we evaluate watchdog and pathrater using packet throughput, percentage of overhead (routing) transmissions, and the accuracy of misbehaving node detection. When used together in a network with moderate mobility, the two techniques increase throughput by 17% in the presence of 40% misbehaving nodes, while increasing the percentage of overhead transmissions from the standard routing protocols 9% to 17%. During extreme mobility, watchdog and pathrater can increase network throughput by 27%, while increasing the overhead transmissions from the standard routing protocols 12% to 24%.


Computer Networks | 2006

Taxonomy of trust: Categorizing P2P reputation systems

Sergio Marti; Hector Garcia-Molina

The field of peer-to-peer reputation systems has exploded in the last few years. Our goal is to organize existing ideas and work to facilitate system design. We present a taxonomy of reputation system components, their properties, and discuss how user behavior and technical constraints can conflict. In our discussion, we describe research that exemplifies compromises made to deliver a useable, implementable system.


electronic commerce | 2004

Limited reputation sharing in P2P systems

Sergio Marti; Hector Garcia-Molina

The increasing popularity of resource exchange through peer-to-peer networks has encouraged the development of ways to support more complex commercial transactions over these networks. Unfortunately, the prospect of higher volume and higher value transactions attracts agents seeking to exploit or weaken the network by propagating bad information and services. This paper presents advantages and disadvantages of resource selection techniques based on peer reputation. We evaluate the effect of limited reputation information sharing on the efficiency and load distribution of a peer-to-peer system. We show that limited reputation sharing can reduce the number of failed transactions by a factor of 20.


international workshop on peer to peer systems | 2004

DHT routing using social links

Sergio Marti; Prasanna Ganesan; Hector Garcia-Molina

The equality and anonymity of peer-to-peer networks makes them vulnerable to routing denial of service attacks from misbehaving nodes. In this paper, we investigate how existing social networks can benefit P2P networks by leveraging the inherent trust associated with social links. We present a trust model that lets us compare routing algorithms for P2P networks overlaying social networks. We propose SPROUT, a DHT routing algorithm that significantly increases the probability of successful routing by using social links. Finally, we discuss further optimization and design choices for both the model and the routing algorithm.


extending database technology | 2004

SPROUT: P2P routing with social networks

Sergio Marti; Prasanna Ganesan; Hector Garcia-Molina

In this paper, we investigate how existing social networks can benefit P2P data networks by leveraging the inherent trust associated with social links We present a trust model that lets us compare routing algorithms for P2P networks overlaying social networks.We propose SPROUT, a DHT routing algorithm that, by using social links, significantly increases the number of query results and reduces query delays.We discuss further optimization and design choices for both the model and the routing algorithm Finally, we evaluate our model versus regular DHT routing and Gnutella-like flooding.


international conference on peer-to-peer computing | 2003

Identity crisis: anonymity vs reputation in P2P systems

Sergio Marti; Hector Garcia-Molina

The effectiveness of reputation systems for peer-to-peer resource-sharing networks is largely dependent on the reliability of the identities used by peers in the network. Much debate has centered around how closely ones pseudo-identity in the network should be tied to their real-world identity, and how that identity is protected from malicious spoofing. We investigate the cost in efficiency of two solutions to the identity problem for peer-to-peer reputation systems. Our results show that, using some simple mechanisms, reputation systems can provide a factor of 4 to 20 improvement in performance over no reputation system, depending on the identity model used.


international conference on management of data | 2003

Peer-to-peer research at Stanford

Mayank Bawa; Brian F. Cooper; Arturo Crespo; Neil Daswani; Prasanna Ganesan; Hector Garcia-Molina; Sepandar D. Kamvar; Sergio Marti; Mario T. Schlosser; Qi Sun; Patrick Vinograd; Beverly Yang

n this paper we present recent and ongoing research projects of the Peers research group at Stanford University.


international conference on peer-to-peer computing | 2005

Quantifying agent strategies under reputation

Sergio Marti; Hector Garcia-Molina

Our research proposes a simple buyer/seller game that captures the incentives dictating the interaction between peers in resource trading peer-to-peer networks. We prove that for simple reputation-based buyer strategies, a sellers decision whether to cheat or not is dependent only on the length of its transaction history, not on the particular actions committed. Given a finite number of transactions, a peer can compute a utility optimal sequence of cooperations and defections. With the limited information provided by many reputation systems, a peer has incentive to defect on a large fraction of its transactions. If temporal information is used, equilibrium is reached when peers predominantly cooperate.


Future Generation Computer Systems | 2005

Authenticity and availability in PIPE networks

Brian F. Cooper; Mayank Bawa; Neil Daswani; Sergio Marti; Hector Garcia-Molina

We describe a system, which we call a peer-to-peer information preservation and exchange (PIPE) network, for protecting, digital data collections from failure. A significant challenge in such networks is ensuring that documents are replicated and accessible despite malicious sites which may delete data, refuse to serve data, or serve an altered version of the data. We enumerate the services of PIPE networks, discuss a threat model for malicious sites, and propose basic solutions for managing these malicious sites. The basic solutions are inefficient, but demonstrate that a secure system can be built. We also sketch ways to improve efficiency.


Archive | 2003

Identity crisis: anonymity vs

Sergio Marti; Hector Garcia-Molina

Collaboration


Dive into the Sergio Marti's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge