Giannis F. Marias, Vassileios Tsetsos,

Slides:



Advertisements
Similar presentations
Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection Presented by: Vijay Kumar.
Advertisements

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
Modeling Malware Spreading Dynamics Michele Garetto (Politecnico di Torino – Italy) Weibo Gong (University of Massachusetts – Amherst – MA) Don Towsley.
A Mobile Ad hoc Biosensor Network Muzammil KP S7,ECE Govt. Engg. College, Wayanad.
Application of Bayesian Network in Computer Networks Raza H. Abedi.
Improvement on LEACH Protocol of Wireless Sensor Network
Design and Implementation of the OLSR Protocol in an Ad Hoc Framework Juan Gutiérrez Plaza Supervisor: Raimo Kantola Instructor: José Costa Requena Networking.
Using Game Theoretic Approach to Analyze Security Issues In Ad Hoc Networks Term Presentation Name: Li Xiaoqi, Gigi Supervisor: Michael R. Lyu Department:
1 Prediction-based Strategies for Energy Saving in Object Tracking Sensor Networks Yingqi Xu, Wang-Chien Lee Proceedings of the 2004 IEEE International.
Evaluation of Ad hoc Routing Protocols under a Peer-to-Peer Application Authors: Leonardo Barbosa Isabela Siqueira Antonio A. Loureiro Federal University.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi October 28, 2003.
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Xiaoqi Li, Michael R. Lyu, and Jiangchuan Liu IEEE Aerospace Conference March 2004.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Trust Management in Mobile Ad Hoc Networks Using a Scalable Maturity-Based Model Authors: Pedro B. Velloso, Rafael P. Laufer, Daniel de O. Cunha, Otto.
Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks Ing-Ray Chen, Jia Guo, Fenye Bao, Jin-Hee Cho Communications.
Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks Sonja Buchegger Jean-Yves Le Boudec.
Hierarchical Trust Management for Wireless Sensor Networks and Its Application to Trust-Based Routing Fenye Bao, Ing-Ray Chen, Moonjeong Chang Presented.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 Trust Mechanisms in Ad Hoc Networks Azar Rahimi Dehaghani Lei Hu Trust and Security Case Study 2.
VIRTUAL ROUTER Kien A. Hua Data Systems Lab School of EECS University of Central Florida.
Trust Model Based Self-Organized Routing Protocol For Secure Ad Hoc Networks Li Xiaoqi CSE Department, CUHK 29/04/2003.
ITEC 810 – Project Unit Trustworthy Sensor Networks Daniel Aegerter, Supervisor: Rajan Shankaran.
BitTorrent enabled Ad Hoc Group 1  Garvit Singh( )  Nitin Sharma( )  Aashna Goyal( )  Radhika Medury( )
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Dilshad Haleem CST593 summer 2007 Routing In Wireless Mesh Networks CST593 Final Project by Dilshad Haleem Division of Computing Studies, ASU Polytechnic.
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
Adapted from the original presentation made by the authors Reputation-based Framework for High Integrity Sensor Networks.
Small-Scale and Large-Scale Routing in Vehicular Ad Hoc Networks Wenjing Wang 1, Fei Xie 2 and Mainak Chatterjee 1 1 School of Electrical Engineering and.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
High-integrity Sensor Networks Mani Srivastava UCLA.
Secure In-Network Aggregation for Wireless Sensor Networks
1 Service Sharing with Trust in Pervasive Environment: Now it’s Time to Break the Jinx Sheikh I. Ahamed, Munirul M. Haque and Nilothpal Talukder Ubicomp.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
Computer Science and Engineering 1 Mobile Computing and Security.
Ahmad Salam AlRefai.  Introduction  System Features  General Overview (general process)  Details of each component  Simulation Results  Considerations.
November 4, 2003Applied Research Laboratory, Washington University in St. Louis APOC 2003 Wuhan, China Cost Efficient Routing in Ad Hoc Mobile Wireless.
Energy-Efficient Protocol for Cooperative Networks.
LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks 1 Presented by: Ting Hua Authors: Xiaoyong Li, Feng Zhou, and Junping.
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
SECURE MANET ROUTING WITH TRUST INTRIGUE Prepared By: Aditya Kiran R.S Mangipudi Srikanth Gadde Varun Mannar.
Nov. 29, 2006GLOBECOM /17 A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi.
Advisor: Prof. Han-Chieh Chao Student: Joe Chen Date: 2011/06/07.
The Inherent Security of Routing Protocols in Ad Hoc and Sensor Networks Tanya Roosta (EECS, Berkeley) In Collaboration With: Sameer Pai (ECE, Cornell)
In the name of God.
Presented by Edith Ngai MPhil Term 3 Presentation
A Cluster-based Routing Protocol for Mobile Ad hoc Networks
Author:Zarei.M.;Faez.K. ;Nya.J.M.
TAODV: A Trusted AODV Routing Protocol for MANET
Supporting Mobile Collaboration with Service-Oriented Mobile Units
Recommendation Based Trust Model with an Effective Defense Scheme for ManetS Adeela Huma 02/02/2017.
SENSOR FUSION LAB RESEARCH ACTIVITIES PART II: SIGNAL/IMAGE PROCESSING AND NETWORKING Sensor Fusion Lab, Department of Electrical Engineering and.
User Interference Effect on Routing of Cognitive Radio Ad-Hoc Networks
Introduction to Wireless Sensor Networks
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Environment-Aware Reputation Management for Ad Hoc Networks
Wenjia Li Anupam Joshi Tim Finin May 18th, 2010
ITIS 6010/8010 Wireless Network Security
Authors: Chun-Ta Li and Min-Shiang Hwang Reporter: Chun-Ta Li (李俊達)
Motion-Aware Routing in Vehicular Ad-hoc Networks
Efficient Flooding Techniques for Mobile Ad Hoc Networks
A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks IEEE Infocom
Information Sciences and Systems Lab
Presentation transcript:

A generic framework towards trust building in self-organized, peer, networks Giannis F. Marias, Vassileios Tsetsos, Odysseas Sekkas and Panagiotis Georgiadis Dept. of Informatics and Telecommunications, University of Athens SecPerU 2005 July 14 2005 Santorini, Greece

Presentation Structure Introduction ATF Architecture Simulations, Future Work and Conclusions SecPerU 2005, Santorini, Greece

Self-organized networks MANETs Ad hoc collaborations No infrastructure available Many threats from selfish, malicious or hacker nodes Advanced needs for QoS and security SecPerU 2005, Santorini, Greece

Trust Management A new paradigm for security and QoS solutions in open systems Involves (among others): recommendations exchange reputation building/fading Does not require central authorities Many different trust management schemes have been proposed SecPerU 2005, Santorini, Greece

Motivation Trust management schemes seem suitable for ad hoc collaborations Those proposed for MANETs are too specialized Those proposed for middleware services are too complex to apply to MANETs Belief networks, probabilistic methods A lightweight flexible framework is needed for assessing the trustworthiness of nodes  ATF (Ad hoc Trust Framework) SecPerU 2005, Santorini, Greece

Presentation Structure Introduction ATF Architecture Simulations, Future Work and Conclusions SecPerU 2005, Santorini, Greece

Network and Application Stack Overall Architecture ATF is a trust evaluation and advertisement framework NOT a cooperation enforcement technique NOT a security framework TS1 TS2 Trust Builder Trust Matrix Reputation Manager Trust Policy Network and Application Stack RFTS SecPerU 2005, Santorini, Greece

Trust Sensors Every node provides functions to other nodes Packet forwarding, routing, naming services, … Trust Sensors evaluate the quality of these functions in a node’s neighborhood – i.e., capture the direct evidence Observation of neighbors’ behavior Comparison to reference/ideal behavior Quantification of the difference to Success/Failure SecPerU 2005, Santorini, Greece

Reputation Manager On-demand recommendations exchange The nearest and most trustworthy recommenders are selected based on the TrustSpan Algorithm Recommendations are requested only when there are insufficient direct evidences SecPerU 2005, Santorini, Greece

TrustSpan algorithm Packet forwarding for one- and two-hop neighbors is monitored through AODV headers and MAC overhearing At most N trusted recommenders are selected They are detected with a special TS, called RFTS (Rec. Function Trust Sensor) The algorithm is invoked periodically and only for target nodes with less than M direct interactions SecPerU 2005, Santorini, Greece

Trust Builder Main components: Direct evidence (DE) Recommendations (REC) History of interactions Subjective factor (SUB) The values for all open parameters are defined in the Trust Policy of each node Trust Values are assigned per (node, function) in a Trust Matrix SecPerU 2005, Santorini, Greece

Trust Computation (I) Time is discrete and counts separately for each (node, function) according to the direct evidence w and H are defined in Trust Policy so as to decrease the trust fluctuations without losing sensitivity SecPerU 2005, Santorini, Greece

Trust Computation (II) α, b, SUB: defined in Trust Policy SecPerU 2005, Santorini, Greece

SUB SUB is a time function in the range [0,2] It allows for the introduction of subjective criteria in trust assessment SUB=0  distrust always SUB=1  use the default ATF trust scheme SUB=2  be enthusiastic Ideally used for modeling more complex time-variant behaviors and trust strategies Example strategy: do not trust the function X of any node until there are W successful interactions SecPerU 2005, Santorini, Greece

Presentation Structure Introduction ATF Architecture Simulations, Future Work and Conclusions SecPerU 2005, Santorini, Greece

Simulations (I) We have already performed some simulations using J-Sim and AODV as the routing protocol We deal with the packet forwarding function The first results are quite satisfactory regarding overheads of TrustSpan and identification time for selfish nodes Simulation results will be published soon SecPerU 2005, Santorini, Greece

Simulations (II) f = packet forwarding #nodes = 50 max speed = 1.2 m/s packet rate = 4 pkts/s area = 300x300 m2 Averaged identification times for 10 selfish nodes SecPerU 2005, Santorini, Greece

Future Work Test ATF with more high-level functions/protocols Assess its robustness and accuracy through extensive simulations Investigate the effects of individual trust strategies in the trust establishment process (implemented through the SUB component) SecPerU 2005, Santorini, Greece

Conclusions ATF is a generic framework in a sense that is function-agnostic It is lightweight as it entails only simple mathematical computations It involves a subjective component as dictated by trust-related research in other disciplines e.g., psychology, cognitive science The large number of Trust Policy parameters enable flexibility in trust building SecPerU 2005, Santorini, Greece

Thank you for your attention!!! The end Thank you for your attention!!! Questions??? SecPerU 2005, Santorini, Greece