dr hab. inż. Jerzy Konorski | Gdańsk University of Technology

Page content

dr hab. inż. Jerzy Konorski

Contact:

email:
jerkonor@pg.edu.pl
website:
https://mostwiedzy.pl/jerzy-konorski,2701-1

Positions:

Associate professor

workplace:
Katedra Teleinformatyki
Budynek A Wydziału Elektroniki, Telekomunikacji i Informatyki, EA 139
phone:
(58) 347 21 23
dr hab. inż. Jerzy Konorski

Publications:

  1. Publication

    - Year 2023

    To promote honest service provision in multi-agent systems, a Computational Trustworthiness and Rating scheme collects service ratings and computes agents' trustworthiness levels (TLs). Studies of existing schemes fail to reflect closed-loop dynamics of TLs arising from the mutual influence of agents' behavior and TLs, and to capture relevant properties. Recent simulative and analytical models produce results tied to a particular...

    Full text to download in external service

  2. Publication

    In client-server information systems with quality of service (QoS) differentiation, Client may deplete Server’s resources by demanding unduly high QoS level. Such QoS abuse has eluded systematic treatment; known defenses using Client authorization, payments, or service request inspection prior to QoS assignment, are heuristic and environment-specific. We offer a game-theoretic approach on the premise that a service request is occasionally...

    Full text available to download

  3. Publication

    Multihop wireless networks with autonomous nodes are susceptible to selfish traffic remapping attacks (TRAs). Nodes launching TRAs leverage the underlying channel access function to receive an unduly high Quality of Service (QoS) for packet flows traversing source-to-destination routes. TRAs are easy to execute, impossible to prevent, difficult to detect, and harmful to the QoS of honest nodes. Recognizing the need for providing...

    Full text available to download

  4. A novel algorithm is presented to deduce individual nodal forwarding behavior from standard end-to-end acknowledgments. The algorithm is based on a well-established mathematical method and is robust to network related errors and nodal behavior changes. The proposed solution was verified in a network simulation, during which it achieved sound results in a challenging multihop ad-hoc network environment.

    Full text available to download

  5. Publication

    Abstract—Information-centric networks struggle with content poisoning attacks (CPAs), especially their stronger form called Fake Data CPA, in which an intruder publisher uploads content signed with stolen credentials. Following an existing graphinfection based approach leveraging the constrained time when stolen credentials are useful, we design a blockchain-based mitigation scheme for Named Data Networking architectures. We postulate...

    Full text to download in external service

data from Bridge of Knowledge open in new tab Bridge of Knowledge

Projects: