Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Look up keyword
Like this
0 of .
Results for:
No results containing your search query
P. 1
Extending Darknets

Extending Darknets

Ratings: (0)|Views: 149|Likes:
Published by Aaron Helton
Research paper on how mobile ad-hoc networks can enhance and extend traditional darknets.
Research paper on how mobile ad-hoc networks can enhance and extend traditional darknets.

More info:

Published by: Aaron Helton on Mar 19, 2008
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF or read online from Scribd
See more
See less



Extending Darknets via Mobile NetworksExtending Darknets via Mobile NetworksAaron B. HeltonSt. Edward’s UniversityAugust 1, 20061
Extending Darknets via Mobile NetworksAbstractThe future of darknets, for good or ill, depends on their ability to adapt to newtechnologies designed both to defeat them and to facilitate them. One of the best ways tostrengthen and extend darknets is through mobile ad-hoc networks, which can providerobustness, and anonymizing software that can provide a fair amount of anonymity to users of darknets.2
Extending Darknets via Mobile NetworksExtending Darknets via Mobile NetworksI. An Overview of DarknetsThe term “darknet” was coined in 2002 by four Microsoft employees. It is typicallyused to describe one of the many peer-to-peer file sharing networks in wide use today. AsBiddle, England, Peinado and Willman state (2002), a “darknet is not a separate physicalnetwork but an application and protocol layer riding on existing networks.” Ideologically,however, such networks are thought to exist on the fringes of the regular, “legitimate” Internet.Despite this, evidence suggests that usage is on the rise. For example, according to Slyck.com(2006), users of some of the most popular peer-to-peer networks have reached almost tenmillion, and the trend up to this point has only been upward. Furthermore, this is only a small percentage of darknet traffic, since some other ad-hoc darknets, such as those created byBittorrent, are nearly impossible to measure in terms of number of users.At the time of this writing, digital piracy remains the most prevalent use of darknettechnologies. So far, the largest deterrents to such uses have been legal and technological. Themedia industries, largely comprised of Motion Picture Association of America (MPAA) andRecording Industry Association of America (RIAA) member organizations, have waged a nearlycontinuous war against file sharing networks since the days of Napster. Armed with existingcopyright law, which was strengthened considerably by the Digital Millennium Copyright Act(DMCA) in 1998, the RIAA alone “has sued just over 18,000 individuals for sharing songsonline, with 4,500 settling for about $4,000 per case” (Graham, 2006). These cases so far seemto have had little impact, given the overall rise in popularity of darknets.Technological deterrents for digital piracy focus mainly on preventing or delaying “theinjection of new objects into the darknet” (Biddle, et al. 2002). Any litigation targeting3

Activity (4)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
Kostas Zgf liked this
renezze liked this

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->