STRUDEL: Supporting Trust in the Dynamic Establishment of peering coaLitions April 2006 Daniele Quercia, Manish Lad, Stephen Hailes, Licia Capra, and Saleem.

Slides:



Advertisements
Similar presentations
June 4, 2004 A Robust Reputation System for P2P and Mobile Ad-hoc Networks Sonja Buchegger 1 A Robust Reputation System for P2P and Mobile Ad-hoc Networks.
Advertisements

Conceptual Framework for Dynamic Trust Monitoring and Prediction Olufunmilola Onolaja Rami Bahsoon Georgios Theodoropoulos School of Computer Science The.
1 TCP Vegas: New Techniques for Congestion Detection and Avoidance Lawrence S. Brakmo Sean W. O’Malley Larry L. Peterson Department of Computer Science.
TCP Vegas: New Techniques for Congestion Detection and Control.
Risk Aware Decision Framework for Trusted Mobile Interactions September 2005 Daniele Quercia and Stephen Hailes CS department University College London.
TATA: Towards Anonymous Trusted Authentication May 2006 Daniele Quercia, Stephen Hailes, Licia Capra. CS department University College London
DSR The Dynamic Source Routing Protocol Students: Mirko Gilioli Mohammed El Allali.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University.
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
Trust Establishment in Pervasive Grid Environments Syed Naqvi, Michel Riguidel TÉLÉCOM PARIS ÉNST É cole N ationale S upérieur des T élécommunications.
6/3/ Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross-Layer Information Awareness CS495 – Spring 2005 Northwestern University.
UCL Overview of VPN Work. 10/11 July 2003VPN Workshop2 Current Work Projects Projects  Past  ANDROID  RADIOACTIVE  Present  6NET  ICB VPN Technologies.
Secure communication in cellular and ad hoc environments Bharat Bhargava Department of Computer Sciences, Purdue University This is supported.
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
TCP over ad hoc networks Ad Hoc Networks will have to be interfaced with the Internet. As such backward compatibility is a big issue. One might expect.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Kyushu University Graduate School of Information Science and Electrical Engineering Department of Advanced Information Technology Supervisor: Professor.
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks Yi Lu, Weichao Wang, Bharat Bhargava CERIAS and Department of Computer Sciences Purdue.
CS335 Networking & Network Administration Tuesday, April 20, 2010.
DCP: The Datagram Control Protocol Eiman Zolfaghari E190 – Technical Communications Professor Hatton April 2002.
The Delta Routing Project Low-loss Routing for Hybrid Private Networks George Porter (UCB) Minwen Ji, Ph.D. (SRC - HP Labs)
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
UNIVERSITY OF JYVÄSKYLÄ Topology Management in Unstructured P2P Networks Distributed Systems Research Seminar on Annemari Auvinen, Research Student.
An adaptive framework of multiple schemes for event and query distribution in wireless sensor networks Vincent Tam, Keng-Teck Ma, and King-Shan Lui IEEE.
Brian Padalino Sammy Lin Arnold Perez Helen Chen
Introduction to Routing and Routing Protocols By Ashar Anwar.
The Coalition Peering Domain A New Entity in the Routing Landscape Manish Lad, Saleem Bhatti, Peter Kirstein, Steve Hailes Dept. Computer Science, UCL.
Inter-Context Trust Bootstrapping for Mobile Content Sharing (daniele quercia) (stephen hailes & licia capra) U C LU C L.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Using Trust in Distributed Consensus with Adversaries in Sensor and Other Networks Xiangyang Liu, and John S. Baras Institute for Systems Research and.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU.
2012 4th International Conference on Cyber Conflict C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) 2012 © NATO CCD COE Publications, Tallinn 朱祐呈.
A Game Approach for Multi-Channel Allocation in Multi-Hop Wireless Networks Lin Gao, Xinbing Wang Dept. of Electronic Engineering Shanghai Jiao Tong University.
A NAMED DATA NETWORKING FLEXIBLE FRAMEWORK FOR MANAGEMENT COMMUNICATION Authors: Daneil Corjuo and Rui L. Aguiar Ivan Vidal and Jamie Garcia-Reinoso Presented.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Wireless Software R&D Group, IITP RAS Kirill Andreev, Aleksey Kovalenko, Dmitriy Lakontsev Realization of IEEE802.11s draft standard in NS-3.3 Institute.
Fault-Tolerant Papers Broadband Network & Mobile Communication Lab Course: Computer Fault-Tolerant Speaker: 邱朝螢 Date: 2004/4/20.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
DDR-based Multicast routing Protocol with Dynamic Core (DMPDC) Shiyi WU, Navid Nikaein, Christian BONNET Mobile Communications Department EURECOM Institute,
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
1 Service Sharing with Trust in Pervasive Environment: Now it’s Time to Break the Jinx Sheikh I. Ahamed, Munirul M. Haque and Nilothpal Talukder Ubicomp.
SOCIAL HOUSEKEEPING THROUGH INTERCOMMUNICATING APPLIANCES AND SHARED RECIPES MERGING IN A PERVASIVE WEB-SERVICES INFRASTRUCTURE WP8 – Tests Ghent CREW.
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
Cooperative Mobile Live Streaming Considering Neighbor Reception SPEAKER: BO-YU HUANG ADVISOR: DR. HO-TING WU 2015/10/15 1.
TCP OVER ADHOC NETWORK. TCP Basics TCP (Transmission Control Protocol) was designed to provide reliable end-to-end delivery of data over unreliable networks.
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Fast and Slow Hopping MAC Protocol for Single-hop Ad Hoc Wireless Networks Khaled Hatem Almotairi, Xuemin (Sherman) Shen Department of Electrical and Computer.
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
2005/12/14 1 Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross-Layer Information Awareness Xin Yu Department of Computer Science.
Dealing with Liars: Misbehavior Identification via Rényi-Ulam Games William Kozma Jr., and Loukas Lazos Dept. of Electrical and Computer Engineering University.
MOTET: Mobile Transactions using Electronic Tickets September 2005 Daniele Quercia and Stephen Hailes CS department University College London
Shou-Chih Lo and Chia-Wei Tseng National Dong Hwa University A Novel Multi-channel MAC Protocol for Wireless Ad Hoc Networks VTC 2007-spring.
By Jannatul Ferdousi M.TECH(MCNT) Roll no GNIT With guidance of Mr.Dipankar.
Fall, 2001CS 6401 Switching and Routing Outline Routing overview Store-and-Forward switches Virtual circuits vs. Datagram switching.
Presented by Edith Ngai MPhil Term 3 Presentation
By, Nirnimesh Ghose, Master of Science,
Internet Networking recitation #9
TCP and MAC interplay in Wireless Ad Hoc Networks
Internet Networking recitation #10
Wireless LAN Simulation IEEE MAC Protocol
The War Between Mice & Elephants by, Matt Hartling & Sumit Kumbhar
A Survey of Trust Management Systems
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

STRUDEL: Supporting Trust in the Dynamic Establishment of peering coaLitions April 2006 Daniele Quercia, Manish Lad, Stephen Hailes, Licia Capra, and Saleem Bhatti CS department University College London SAC

Daniele Quercia SAC STRUDEL: Supporting Trust in the Dynamic Establishment of peering coaLitions 2 Outline Novel and existing mechanisms to support those features To avoid tragedy, STRUDEL supports 4 features Mesh Net and its tragedy How STRUDEL supports them? State machine One experiment & Conclusion

Daniele Quercia3 Mesh net and its tragedy Mesh nodes form a peering coalition  Result: SAC STRUDEL: Supporting Trust in the Dynamic Establishment of peering coaLitions Free-riders join the coalition  Result: Bandwidth sharing Tragedy (of the commons)

Daniele Quercia4 To avoid tragedy, STRUDEL supports 4 Features SAC STRUDEL: Supporting Trust in the Dynamic Establishment of peering coaLitions STRUDEL needs distributed mechanisms to: form peering coalitions; detect free-riders; manage (trust) info; decide such that free-riders excluded.

Daniele Quercia5 Novel and existing work to support... SAC STRUDEL: Supporting Trust in the Dynamic Establishment of peering coaLitions formdetect managedecide

Daniele Quercia6 SAC STRUDEL: Supporting Trust in the Dynamic Establishment of peering coaLitions STRUDEL needs to form peering coalitions. How? Common (Connection sharing in MANETs) : Each device in turn acts as a gateway formdetect managedecide pxpx pypy pzpz

Daniele Quercia7 SAC STRUDEL: Supporting Trust in the Dynamic Establishment of peering coaLitions Novel (Connection sharing in Mesh Nets) : Devices share multiple connections simultaneously formdetect managedecide pxpx pypy pzpz CPD M. Lad, S. Bhatti, S. Hailes, and P. Kirstein. Enabling Coalition-Based Community Networking. In Proc. of the London Communications Symposium

Daniele Quercia8 SAC STRUDEL: Supporting Trust in the Dynamic Establishment of peering coaLitions STRUDEL needs to detect free-riders. How? 2-ACK scheme: formdetect managedecide pxpx pypy pzpz One-hop ACKTwo-hop ACK packet If p x does not receive: one-hop ACK  retransmits two-hop ACK  is suspicious about p y

Daniele Quercia9 SAC STRUDEL: Supporting Trust in the Dynamic Establishment of peering coaLitions STRUDEL needs to manage trust info. How? formdetect managedecide Existing distributed trust management Fine- grained trust metric 2+ Trust Sources TimeFormalization Abdul-Rahmal [2]  XX Confidant [4] X  ? 

Daniele Quercia10 SAC STRUDEL: Supporting Trust in the Dynamic Establishment of peering coaLitions formdetect managedecide How ?Fine- grained trust metric 2+ Trust SourcesTimeFormalization B-trust  n-level  Direct experiences & Recommendations  Aging  Bayesian Quercia; Hailes; Capra B-trust: Bayesian Trust Framework for Pervasive Computing Proceedings of the 4 th International Conference on Trust Management. LNCS

Daniele Quercia11 SAC STRUDEL: Supporting Trust in the Dynamic Establishment of peering coaLitions Upon trust info, STRUDEL (p x ) needs to decide whether to exclude (cooperate). How? For each next-hop p y, p x has a table: formdetect managedecide Quercia ; Hailes Risk Aware Decision Framework for Trusted Mobile Interactions Proceedings of the 1 st IEEE SECOVAL Workshop (in conjunction with SECURECOMM). (b) py’s actions Send now Send Don’t send Send Just- in-time Send Out- of-time Sent Sent just- in-time Sent out- of-time Not sent (a) px’s actions (c) Expected Outcomes

Daniele Quercia12 SAC STRUDEL: Supporting Trust in the Dynamic Establishment of peering coaLitions CPD2-ACK B-trustUtility Support of the 4 Features How ?

Daniele Quercia13 SAC STRUDEL: Supporting Trust in the Dynamic Establishment of peering coaLitions How? State Machine! Wait  Ready Next Hop: p x selects whether to send packets and, if so, chooses its next-hop Update: p x updates its direct trust and recommended trust in its next-hops

Daniele Quercia14 SAC STRUDEL: Supporting Trust in the Dynamic Establishment of peering coaLitions How? State Machine Send: p x sends packets without 2- ACK scheme; Slow Start: p x sends q packets (initially, q=1). If it receives 2-hop ACK, p x increases its sending window by q. Maliciousness avoidance: p x increases linearly its sending window

Daniele Quercia15 SAC STRUDEL: Supporting Trust in the Dynamic Establishment of peering coaLitions One experiment When using STRUDEL, p x successfully sent. 67% of the packets on average (if n=2),. 84% (if n=4), in contrast to 42% when using random selection. pxpx fm m b fb 100% 70% 30% 15%

Daniele Quercia16 SAC STRUDEL: Supporting Trust in the Dynamic Establishment of peering coaLitions Conclusion STRUDEL forms peering coalitions detects free-riders manages trust info, upon which it teams up only with trustworthy peers Future work: Fully implement STRUDEL