Revisting Columbus Circle
Christmas, king Kong, -There is allot going on this season. I caught Howard Stern's last show on a yahoo webcast and dispite the dire predictions for bad weather -- it turned out to be 50 degrees and sunny. Everyone was there except Kong. Maybe Stern is Kong -- towering above the empire state. Looked like a fun time indeed.I met david for coffee at Columbus circle and it was great speaking to him and hearing about his research. It will be great to get to work with him again. Speaking of which -- I have a more than a few of papers to read through - 8 for that matter.
I am really looking forward to the time off in January and just spending time away from here to clear my head of all the things that clutter what is important. It will be good to think about everything that is going on and think about what next .
I read up on Byzantine Behavior (after a lengthy discussion on Thursday) and have a fairly good grasp of the concept. It can be described as any behavior in an ad hoc or wireless network where one or more sensors work in collusion to disrupt the network. This might include denial of service behavior, dropping or altering packets, topology distortion, and a host of other security challenges. If you know nothing about the network topology, it is entirely ad hoc, and trust noone except the sender and receiver then how dow you secure communications ? I need some coffee. It will come to me. Most of the solutions seem to be focused around routing and the network layer and another involved adding a security primitive to the packet header itself in conjunction with some predefined symetric keys.

Comments
So how is the Christmas tree decoration coming up?