Persistent personal names for globally connected mobile devices

The Unmanaged Internet Architecture (UIA) provides zero-configuration connectivity among mobile devices through personal names. Users assign personal names through an ad hoc device introduction process requiring no central allocation. Once assigned, names bind securely to the global identities of their target devices independent of network location. Each user manages one namespace, shared among all the user's devices and always available on each device. Users can also name other users to share resources with trusted acquaintances. Devices with naming relationships automatically arrange connectivity when possible, both in ad hoc networks and using global infrastructure when available. A UIA prototype demonstrates these capabilities using optimistic replication for name resolution and group management and a routing algorithm exploiting the user's social network for connectivity.

[1]  John S. Heidemann,et al.  Implementation of the Ficus Replicated File System , 1990, USENIX Summer.

[2]  Mary Baker,et al.  The Roma personal metadata service , 2000, Proceedings Third IEEE Workshop on Mobile Computing Systems and Applications.

[3]  Andrew W. Appel,et al.  Proof-carrying authentication , 1999, CCS '99.

[4]  Yakov Rekhter,et al.  Address Allocation for Private Internets , 1994, RFC.

[5]  David Saff,et al.  Footloose: a case for physical eventual consistency and selective conflict resolution , 2003, 2003 Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications.

[6]  Ronald L. Rivest,et al.  SDSI - A Simple Distributed Security Infrastructure , 1996 .

[7]  Stephen Dohrmann,et al.  Public-key Support for Collaborative Groups , 2002 .

[8]  Peter L. Reiher,et al.  Rumor: Mobile Data Access Through Optimistic Peer-to-Peer Replication , 1998, ER Workshops.

[9]  Bryan Ford,et al.  Scalable Internet Routing on Topology-Independent Node Identities , 2003 .

[10]  George Danezis,et al.  Sybil-Resistant DHT Routing , 2005, ESORICS.

[11]  Doug Terry,et al.  Epidemic algorithms for replicated database maintenance , 1988, OPSR.

[12]  Cyril Gavoille,et al.  Space-Efficiency for Routing Schemes of Stretch Factor Three , 2001, J. Parallel Distributed Comput..

[13]  Butler W. Lampson,et al.  SPKI Certificate Theory , 1999, RFC.

[14]  Bryan Ford,et al.  State of Peer-to-Peer (P2P) Communication across Network Address Translators (NATs) , 2008, RFC.

[15]  Scott Shenker,et al.  Making gnutella-like P2P systems scalable , 2003, SIGCOMM '03.

[16]  Bryan Ford,et al.  Unmanaged Internet Protocol , 2004, Comput. Commun. Rev..

[17]  Scott Shenker,et al.  Internet indirection infrastructure , 2004, IEEE/ACM Transactions on Networking.

[18]  Mahadev Satyanarayanan,et al.  Disconnected Operation in the Coda File System , 1999, Mobidata.

[19]  Emin Gün Sirer,et al.  The design and implementation of a next generation name service for the internet , 2004, SIGCOMM '04.

[20]  Antony I. T. Rowstron,et al.  Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.

[21]  Karl Aberer,et al.  Updates in highly unreliable, replicated peer-to-peer systems , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..

[22]  Matt Holdrege,et al.  Protocol Complications with the IP Network Address Translator , 2001, RFC.

[23]  Paul V. Mockapetris,et al.  Domain names: Concepts and facilities , 1983, RFC.

[24]  Yakov Rekhter,et al.  Dynamic Updates in the Domain Name System (DNS UPDATE) , 1997, RFC.

[25]  Jun Wang,et al.  TRIBLER: a social‐based peer‐to‐peer system , 2008, IPTPS.

[26]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[27]  Mary Baker,et al.  A historic name-trail service , 2002, 2003 Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications.

[28]  environmet.,et al.  JXTA : A Network Programming Environment , 2022 .

[29]  Ion Stoica,et al.  Non-Transitive Connectivity and DHTs , 2005, WORLDS.

[30]  Bryan Ford,et al.  Peer-to-Peer Communication Across Network Address Translators , 2005, USENIX Annual Technical Conference, General Track.

[31]  Andrew S. Tanenbaum,et al.  Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System , 2004, Security Protocols Workshop.

[32]  Charles E. Perkins,et al.  IP Mobility Support for IPv4 , 2002, RFC.

[33]  Andrew G. Malis,et al.  A Framework for IP Based Virtual Private Networks , 2000, RFC.

[34]  David R. Karger,et al.  Looking up data in P2P systems , 2003, CACM.

[35]  Bogdan C. Popescu,et al.  Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System (Transcript of Discussion) , 2004, Security Protocols Workshop.

[36]  Forum UPnP,et al.  Internet Gateway Device (IGD) Standardized Device Control Protocol V1.0 , 2001 .

[37]  Jinyang Li,et al.  F2F: Reliable Storage in Open Networks , 2006, IPTPS.

[38]  Hector Garcia-Molina,et al.  SPROUT: P2P Routing with Social Networks , 2004, EDBT Workshops.

[39]  Scott Shenker,et al.  Epidemic algorithms for replicated database maintenance , 1988, OPSR.

[40]  Scott Rose,et al.  DNS Security Introduction and Requirements , 2005, RFC.

[41]  Peter Druschel,et al.  Pastry: Scalable, distributed object location and routing for large-scale peer-to- , 2001 .

[42]  Marvin Theimer,et al.  Managing update conflicts in Bayou, a weakly connected replicated storage system , 1995, SOSP.

[43]  Robert Tappan Morris,et al.  User-Relative Names for Globally Connected Personal Devices , 2006, IPTPS.

[44]  Gerald J. Popek,et al.  Consistency algorithms for optimistic replication , 1993, 1993 International Conference on Network Protocols.

[45]  David Mazières,et al.  Separating key management from file system security , 1999, SOSP.

[46]  Robert Tappan Morris,et al.  Ivy: a read/write peer-to-peer file system , 2002, OSDI '02.

[47]  David R. Cheriton,et al.  Leases: an efficient fault-tolerant mechanism for distributed file cache consistency , 1989, SOSP '89.