Abstract

The Internet is plagued by an increasing number of nuisances ranging from simple inconveniences to threats, such as phishing and identity theft. The scale of these problems has grown to alarming proportions, as well seen in the amount of unsolicited electronic mail (SPAM) in the Internet today. In systems where the control lies in trusted centralized entities threats have been well recognized, and techniques developed to mitigate the effect. However, as mobile and ad-hoc networks are becoming commonplace, we see more systems designed using distributed and peer-to-peer architectures. A similar outbreak of security threats is feared in these domains, unless we integrate security in the design. The mechanisms developed for centralized systems might not be applicable, forcing us to explore new methods and models. Our work focuses on developing and experimenting with security mechanisms for distributed real-time communication systems. We concentrate on issues such as secure architecture, privacy and identity management, as well as prevention of unwanted calls.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call