Emc2 software company


















For the distributed wireless network, we proposes DAWN, Distributed detection Algorithm against Wormhole in wireless Network coding systems, by exploring the change of the flow directions of the innovative packets caused by wormholes. We rigorously prove that DAWN guarantees a good lower bound of successful detection rate. We perform analysis on the resistance of DAWN against collusion attacks. We find that the robustness depends on the node density in the network, and prove a necessary condition to achieve collusion-resistance.

It is only based on the local information that can be obtained from regular network coding protocols, and thus the overhead of our algorithms is tolerable. Extensive experimental results have verified the effectiveness and the efficiency of DAWN.

In contrast, in wireless network coding systems, the forwarders are allowed to apply encoding schemes on what they receive, and thus they create and transmit new packets. The idea of mixing packets on each node takes good advantages of the opportunity diversity and broadcast nature of wireless communications, and significantly enhances system performance. However, practical wireless network coding systems face new challenges and attacks, whose impact and countermeasures are still not well understood because their underlying characteristics are different from well-studied traditional wireless networks.

The wormhole attack is one of these attacks. The main objective of this paper is to detect and localize wormhole attacks in wireless network coding systems. The major differences in routing and packet forwarding rule out using existing countermeasures in traditional networks. In network coding systems like MORE, the connectivity in the network is described using the link loss probability value between each pair of nodes, while traditional networks use connectivity graphs with a binary relation i.

In this paper, we first propose a centralized algorithm to detect wormholes leveraging a central node in the network. For the distributed scenarios, we propose a distributed algorithm, DAWN, to detect wormhole attacks in wireless intra flow network coding systems.

We investigate the harmful impact of wormholes on system performance and regional nodes resource utilization. In disaster relief, they are key solutions for 1 on-demand ubiquitous network access and 2 efficient exploration of sized areas. Nevertheless, these solutions still face major security challenges as WMNs are prone to routing attacks.

Consequently, the network can be sabotaged, and the attacker might manipulate payload data or even hijack the UAVs. Contemporary security standards, such as the IEEE As far as we know, none of the existing research approaches have gained acceptance in practice due to their high overhead or strong assumptions. Our proposal prevents more attacks than the IEEE While the WMN capability for auto-configuration and self-healing significantly reduces the complexity of the network deployment and maintenance, it makes the WMN backbone prone to routing attacks, including the wormhole and blackhole attacks.

Consequently, an attacker can, with little cost or effort, redirect the traffic and drop the data packets even if the wireless backbone links are encrypted.

In addition, the data exchanged between the UAVs and their ground station will get disrupted. This issue makes the use of WMNs or any wireless multi-hop solution relying on a routing protocol to dynamically set up routes problematic for the command and control of the UAVs in practice as flight regulations impose that it should be always possible to remotely pilot the UAVs.

In case the attacker is able to compromise the network credentials and as long as there is no efficient way to refresh those credentials, the attacker might manipulate payload data or even inject corrupted control information that could lead to the highjacking of an Unmanned Aerial Vehicles UAVs.

In this section, we extend upon our previous works by clearly defining the network and attacker models of PASER, and by extending its security goals, based on discussions with UAVWMN end-users and stakeholders among others.

Here, PASER has been enhanced to provide origin authentication in order to proactively minimize the harm of internal attackers, i. From the routing point of view, the path accumulation has been removed as it was observed that this scheme is ineffective in UAV-WMN.

Apart from that, while we only addressed the route discovery process in our previous works, we have upgraded PASER to include a route maintenance mechanism. This multihop packet transmission can extend the network coverage area using limited power and improve area distance efficiency.

In the proposed multihop wireless network E-STAR integrates the payment and trust systems with the routing protocol with the goal of enhancing route reliability and stability. The payment system describes to charge the nodes that send packets and reward those forwarding packets. To strengthen the trust evaluation, recommendation from each node is included in trust calculation by TP Trusted Party. Performance evaluated from the parameters such as packet delivery ratio, call acceptance ratio and route lifetime.

The multihop wireless network implemented in many useful applications such as data sharing and multimedia data transmission. It can establish a network to communicate, distribute files, and share information. However, the assumption is that the nodes are willing to spend their limited resources, such as battery energy and available network bandwidth.

This assumption is reasonable in disaster recovery because the nodes pursue a common goal and belong to one authority, but it may not hold for civilian applications where the nodes aim to maximize their benefits, since their cooperation consumes their valuable resources such as bandwidth, energy, and computing power without any benefits.

In civilian applications, selfish nodes will not be voluntarily interested in cooperation without sufficient incentive, and make use of the cooperative nodes to relay their packets, which has negative effect on the network fairness and performance. Fairness issue arises when a selfish node takes advantage from the cooperative nodes without contributing to them, and the cooperative nodes are unfairly overloaded.

The selfish behavior degrades the network performance significantly resulting in failure of the multi-hop communication.

We develop two routing protocols to direct traffic through those highly-trusted nodes having sufficient energy to minimize the probability of breaking the route. By this way, E-STAR can stimulate the nodes not only to relay packets, but also to maintain route stability and report correct battery energy capability.

Unlike most of the existing schemes that aim to identify and mitigate the malicious nodes, E-STAR aims to identify the good nodes and select them in routing. These applications often rely on current or preferred locations of individual users or a group of users to provide the desired service, which jeopardizes their privacy; users do not necessarily want to reveal their current or preferred locations to the service provider or to other, possibly un-trusted, users.

In this paper, we propose privacy-preserving algorithms for determining an optimal meeting location for a group of users.

We perform a thorough privacy evaluation by formally quantifying privacy-loss of the proposed approaches. In order to study the performance of our algorithms in a real deployment, we implement and test their execution efficiency on Nokia smart phones. By means of a targeted user-study, we attempt to get an insight into the privacy-awareness of users in location based services and the usability of the proposed solutions.

The rapid proliferation of smart phone technology in urban communities has enabled mobile users to utilize context aware services on their devices. Service providers take advantage of this dynamic and ever-growing technology landscape. Location-based Services LBS , for example, are used by millions of mobile subscribers every day to obtain location-specific information.

Two popular features of location-based services are location check-ins and location sharing. By checking into a location, users can share their current location with family and friends or obtain location-specific services from third-party providers ,The obtained service does not depend on the locations of other users.

The other type of location-based services, which rely on sharing of locations or location preferences by a group of users in order to obtain some service for the whole group, are also becoming popular. One prominent example of such a service is the taxi-sharing application, offered by a global telecom operator , where smart phone users can share a taxi with other users at a suitable location by revealing their departure and destination locations.

Similarly, another popular service enables a group of users to find the most geographically convenient place to meet. In this significantly extended version of our earlier conference paper ,we evaluate the security of our proposal under various passive and active adversarial scenarios, including collusion.

We also provide an accurate and detailed analysis of the privacy properties of our proposal and show that our algorithms do not provide. In addition to the theoretical analysis, we also evaluate the practical efficiency and performance of the proposed algorithms by. We also address the multi-preference case, where each user may have multiple prioritized location preferences. We highlight the main differences, in terms of performance, with the single preference case, and also present initial experimental results for the multi-preference implementation.

Finally, by means of a targeted user study, we provide insight into the usability of our proposed solutions. Wireless sensor nodes have restricted computational resources, and are always deployed in a harsh, unattended or hostile environment. Therefore, network security represents a challenging task.

This work presents a public-key based pre-distribution scheme with time-position nodes for simultaneous exchange of secure keys. In this paper, we proposed a general three-tier security framework for authentication and pair wise key establishment between mobile sinks and sensor nodes.

The proposed defend attack and key management mechanism for sensor network applications can successfully handle sink mobility and can continually deliver data to neighboring nodes and sinks.

Although the above security approach makes the network more resilient to mobile sink replication attacks compared to the single polynomial pool-based key predistribution scheme, it is still vulnerable to stationary access node replication attacks. In these types of attacks, the attacker is able to launch a replication attack similar to the mobile sink replication attack.

To address the above-mentioned problem, we have developed a general framework that permits the use of any pairwise key predistribution scheme as its basic component, to provide authentication and pairwise key establishment between sensor nodes and MSs.

To facilitate the study of a new security technique, we first cultivated a general three-tier security framework for authentication and pairwise key establishment, based on the polynomial pool-based key predistribution scheme. To make the three-tier security scheme more robust against a stationary access node replication attack, we have strengthened the authentication mechanism between the stationary access nodes and sensor nodes using one-way hash chains algorithm in conjunction with the static polynomial pool-based scheme.

Our analytical results indicate that the new security technique makes the network more resilient to both mobile sink replication attacks and stationary access nodes replication attacks compared to the single polynomial pool-based approach. JoSS provides not only job level scheduling, but also map-task level scheduling and reduce-task level scheduling.

JoSS classifies Map Reduce jobs based on job scale and job type and designs an appropriate scheduling policy to schedule each class of jobs.

The results show that the two variations outperform the other tested algorithms in terms of map-data locality, reduce-data locality, and network overhead without incur ring significant overhead.

In addition, the two variations are separately suitable for different Map Reduce-work load scenarios and provide the best job performance among all tested algorithms. Map Reduce enables a programmer to define a Map Reduce job as a map function and a reduce function, and provides a runtime system to divide the job into multiple map tasks and reduce tasks and perform these tasks on a Map Reduce cluster in parallel. Many task scheduling algorithms have been proposed to improve data locality and to shorten job turnaround time, but most of them only focus on scheduling map tasks, rather than scheduling reduce tasks.

Hence, employing them in a virtual MapReduce cluster might cause a low reduce-data locality. Besides, most of current scheduling algorithms are designed to achieve the node locality and rack locality for conventional MapReduce clusters, rather than achieving the VPS-locality and Cenlocality for virtual MapReduce clusters.

Consequently, adopting them in a virtual MapReduce cluster might be unable to provide a high map-data locality. We propose a hybrid job-driven scheduling scheme JoSS for short by providing scheduling in three levels: job, map task, and reduce task.

We introduce JoSS to appropriately schedule Map Reduce jobs in a virtual Map Reduce cluster by addressing both map-data locality and reduce-data locality from the perspective of a tenant. By classifying jobs into map-heavy and reduce heavy jobs and designing the corresponding policies to schedule each class of jobs, JoSS increases data locality and improves job performance. In a cloud that offers infrastructure such as processor, memory, hard disk, etc.

Economical management of cloud resources needs allocation strategies with minimum wastage, while configuring services ahead of actual requests.

We propose a resource allocation mechanism for machines on the cloud, based on the principles of coalition formation and the uncertainty principle of game theory. We compare the results of applying this mechanism with existing resource allocation methods that have been deployed on the cloud.

We also show that this method of resource allocation by coalition-formation of the machines on the cloud leads not only to better resource utilization but also higher request satisfaction. Optimizing resource allocation to ensure the best performance can be done in many ways. Present IaaS service providers, largely unaware of application-level requirements, do not provide any optimization by configuring the required software on the VMs. Relying only on application level optimization is not sensible, as such is restricted to an existing infrastructure allocation.

The placement of VMs is, however, in the hands of the IaaS provider and can be changed based on the topology of the machines in the cloud system. An application-level optimization technique along with topology-based VM placement—offers better chances of performance improvement with lower resource wastage.

In this paper, we model the cloud as a multi-agent system that is composed of agents machines with varied capabilities. Allocation of resources to perform specific tasks requires agents to form coalitions, as the resource requirements may be beyond the capabilities of any single agent machine.

Coalition formation is modeled as a game and uses the uncertainty principle of game theory to arrive at approximately optimal strategies of the game. We implement a resource allocation mechanism for the cloud that is demand-aware, topology-aware and uses a gametheoretic approach based on coalition formation of machines for requests with uncertain task information.

With these ideas in place, we can use our agent-based resource allocation mechanism for the IaaS cloud. The evaluation of the efficacy of our approach is carried out by comparison with common commercial allocation strategies on the cloud. We evaluate it based on randomly generated VM requests that include data-intensive requests.. Authentication of publishers and subscribers is difficult to achieve due to the loose coupling of publishers and subscribers. Likewise, confidentiality of events and subscriptions conflicts with content-based routing.

Furthermore, an algorithm to cluster subscribers according to their subscriptions preserves a weak notion of subscription confidentiality. In addition to our previous work [23], this paper contributes 1 use of searchable encryption to enable efficient routing of encrypted events, 2 multicredential routing a new event dissemination strategy to strengthen the weak subscription confidentiality, and 3 thorough analysis of different attacks on subscription confidentiality.

The overall approach provides fine-grained key management and the cost for encryption, decryption, and routing is in the order of subscribed attributes. Moreover, the evaluations show that providing security is affordable w. Its expressiveness and asynchronous nature is particularly useful for large-scale distributed applications with high-volume data streams.

Similarly, the content of events should not be exposed to the routing infrastructure and a subscriber should receive all relevant events without revealing its subscription to the system. In this case, regardless of the cryptographic primitives used, the maximum level of attainable condentiality is very limited. The limitation arises from the fact that a parent can decrypt every event it forwarded to its children.

Therefore, mechanisms are needed to provide a weaker notion of congeniality. Private keys assigned to the subscribers are labelled with the credentials. We adapted identity based encryption mechanisms.

To ensure that a particular subscriber can decrypt an event only if there is match between the credentials associated with the event and the key. To allow subscribers to verify the authenticity of received events. Furthermore, we address the issue of subscription condentiality in the presence of semantic clustering of subscribers. A weaker notion of subscription. Finally, the evaluations demonstrate the viability of the proposed security mechanisms.

Many of the touted gains in the cloud model come from resource multiplexing through virtualization technology. In this paper, we present a system that uses virtualization technology to allocate data center resources dynamically based on application demands and support green computing by optimizing the number of servers in use.

By minimizing skewness, we can combine different types of workloads nicely and improve the overall utilization of server resources. We develop a set of heuristics that prevent overload in the system effectively while saving energy used.

Trace driven simulation and experiment results demonstrate that our algorithm achieves good performance. This mapping is largely hidden from the cloud users. It is up to the cloud provider to make sure the underlying physical machines PMs have sufficient resources to meet their needs.

Then select a sim configuration to try out. If you like what you see, just click the Install icon on the desktop, answer a few questions your name, timezone, password and the install completes in a few minutes.

Make sure you write down the name you used and the password. Once the install process is complete and you go on line the update manager will pop up and allow you to upgrade to the latest stable version of EMC2. The AXIS interface is one of the interfaces to choose from. It can be configured to add a Virtual Control Panel to customize the interface to suit your needs. AXIS is the default user interface and is actively being developed.

With the normal install the Update Manager will notify you of updates to EMC2 when you go on line and allow you to easily upgrade with no Linux knowledge needed. If you want to upgrade to Warning: Do not upgrade Ubuntu to a new version like 8.

EMC2 has activated SegWit on the network, lightning network second layer protocol and 1 minute block time all of this making transactions fast and reducing blockchain size. Our wallets use up to date encryption and private keys are stored only on your machine.

EMC2 is openly traded and mined across the globe. Foundation does not control assets in any way, your coins belong just to you! Your EMC2 coins anytime, anywhere. Download wallet for desktop, laptop or your mobile phone and store EMC2 coins securely on the device of your choice. Although storing coins on most top exchanges is pretty safe, storing coins on wallet is so far most secure way since only you will have access and control over them. Latest wallet version is 0. Check wallets page for more info.

Make sure you have a backup of your existing wallet before starting the new one. Also check out wallet source code on Github. Everyone is more than welcome to contribute! If you are looking to set up an EMC2 Lighting network node you can find more info on the Lightning page. For any other info, just contact us and we will be more than happy to provide assistance! A University student in Computer Science, Jonathan found interest in cryptocurrencies in late He started mining GPUs in the beginning of He followed the evolution of new coins that were rising while simultaneously learning about them.

In September he was part of the team who took over the Einsteinium Foundation after most of the original team left. Has been working on Einsteinium since then. Malden was an early crypto investor and a serial entrepreneur. Prior to leading EMC2, he ran a software consulting business for 15 years supporting clients in finance, marketing, manufacturing, and the retail sector.

He also worked for IT service and software providers. Ben is a blockchain enthusiast and actor who most notably appeared in the 5 time Academy Award winning film, The Artist. Prior to joining the Foundation, Ben was a managing partner in a financial mediation corporation, had produced two films and has also worked at a non-profit serving the greater Los Angeles community. Vladan is software developer with extensive experience and management skills.

Started working at young age as developer for globally successful companies. He is well-versed in all phases of the software development life cycle, with a strong knowledge of web and mobile technologies, networks, data structures, testing and many more. Currently leading development of all software projects under Einsteinium Foundation and guarantee that they are stable, secure, high quality products delivered on time.

Alex is a biologist and PhD student at Temple University with classroom education and real world practical experience. His track record demonstrates focus, a thirst for knowledge, and a commitment to scientific contribution and collaboration. He has a deep interest in the impact at the crossroads of science and crypto. He brings to the Einsteinium Foundation a scientific voice, perspective and accuracy.

Matija is a Computer Science graduate with a pratical experience in developing real business software products. His interest in blockchain began in when he started with training course powered by Einsteinium foundation which afterwards led him to take control of Einsteinium Core development. He is still in process of learning, and he will always be.



0コメント

  • 1000 / 1000