Trust and Security in Mission-Critical P2P through Information Flow Approach Vijay Kumar University of Missouri-Kansas City.

Slides:



Advertisements
Similar presentations
CHAPTER 7: LEARNING OUTCOMES
Advertisements

Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection Presented by: Vijay Kumar.
Web Page Design Chapter 1 Introducing Networks and the Internet.
Secure Data Storage in Cloud Computing Submitted by A.Senthil Kumar( ) C.Karthik( ) H.Sheik mohideen( ) S.Lakshmi rajan( )
1 CS 6910: Advanced Computer and Information Security Lecture on 11/2/06 Trust in P2P Systems Ahmet Burak Can and Bharat Bhargava Center for Education.
1 Crosslayer Design for Distributed MAC and Network Coding in Wireless Ad Hoc Networks Yalin E. Sagduyu Anthony Ephremides University of Maryland at College.
1 Sensor Networks and Networked Societies of Artifacts Jose Rolim University of Geneva.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER SEVEN NETWORKS: MOBILE BUSINESS CHAPTER SEVEN NETWORKS:
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
SERVER LOAD BALANCING Presented By : Priya Palanivelu.
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME Presented By: Mohammed Saleh CS 599a Fall06.
1 CompuP2P: An Architecture for Sharing of Computing Resources In Peer-to-Peer Networks With Selfish Nodes Rohit Gupta and Arun K. Somani
Copyright©2008 N.AlJaffan®KSU1 Chapter 8 Communications and Networks.
SocialFilter: Introducing Social Trust to Collaborative Spam Mitigation Michael Sirivianos Telefonica Research Telefonica Research Joint work with Kyungbaek.
Wireless LAN Technology. WIRELESS LAN TECHNOLOGY Overview-Wireless LAN Applications a wireless LAN is one that makes use of a wireless transmission medium.
© ABB - Page 1 Long lifetime guaranteed for IEC Designed for the future... SCL ACSI APP COM.
What is Commerce? “Seller” “Buyer” Transaction Basic Computer Concepts
CHAPTER OVERVIEW SECTION 7.1 – Connectivity: The Business Value of a Networked World Overview of a Connected World Benefits of a Connected World Challenges.
Brian Padalino Sammy Lin Arnold Perez Helen Chen
Wireless LAN Applications
Link Recommendation In P2P Social Networks Yusuf Aytaş, Hakan Ferhatosmanoğlu, Özgür Ulusoy Bilkent University, Ankara, Turkey.
P2PSIP Charter Proposal Many people helped write this charter…
Decentralized key generation scheme for cellular- based heterogeneous wireless ad hoc networks ► Gupta, Ananya; Mukherjee, Anindo; Xie, Bin; Agrawal, Dharma.
Data Communications and Networking CSCS 311 Lecture 2 Amjad Hussain Zahid.
Issues Relevant To Distributed Security CSC 8320 Nidhi Gahlot.
Peer-to-Pee Computing HP Technical Report Chin-Yi Tsai.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
A Security Architecture Concept for Vehicular Network Nodes 蔡嘉翔 許閔傑.
Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009.
Computers Are Your Future Eleventh Edition
Copyright © 2002 Intel Corporation. Intel Labs Towards Balanced Computing Weaving Peer-to-Peer Technologies into the Fabric of Computing over the Net Presented.
Intro to Digital Technology Follow along and fill in your Guided Notes Handout.
What is FLIP and why do I want it so badly? The average adult travels 32 miles in a day 1 Adolescent: 8 (4.6 to school and back) 2 College Student: (1.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
Reputation Systems Thomas Choi COMP 5104 March 5, 2008.
Data Network Designing and Evaluation
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Using ICT systems The computer. Using ICT systems Computers in an ICT System Multiple computers, usually with username and password entry Looking after.
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
Enabling e-Research in Combustion Research Community T.V Pham 1, P.M. Dew 1, L.M.S. Lau 1 and M.J. Pilling 2 1 School of Computing 2 School of Chemistry.
1.Research Motivation 2.Existing Techniques 3.Proposed Technique 4.Limitations 5.Conclusion.
Research of P2P Architecture based on Cloud Computing Speaker : 吳靖緯 MA0G0101.
Presented to: By: Date: Federal Aviation Administration NextGen Network Enabled Weather Capability Evaluations Demonstration and Prototyping Information.
JEHN-RUEY JIANG, GUAN-YI SUNG, JIH-WEI WU NATIONAL CENTRAL UNIVERSITY, TAIWAN PRESENTED BY PROF. JEHN-RUEY JIANG LOM: A LEADER ORIENTED MATCHMAKING ALGORITHM.
Digital Ecosystems Re-tuning the user requirements after 3 years Digital Ecosystems Re-tuning the user requirements after 3 years Towards Business Cases.
WLAN.
The EigenTrust Algorithm for Reputation Management in P2P Networks Sepandar D.Kamvar Mario T.Schlosser Hector Garcia-Molina.
Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection Wenhai Sun & Ruide Zhang.
Chapter 1 : Computer Networks. Lecture 2. Computer Networks Classification: 1- Depend on the geographical area. 2- Depend on functional relationship.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
COMPUTER NETWORKS Quizzes 5% First practical exam 5% Final practical exam 10% LANGUAGE.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
Muppet Reputation Mechanism Juho Heikkilä H ELSINKI I NSTITUTE FOR I NFORMATION T ECHNOLOGY H ELSINKI U NIVERSITY OF T ECHNOLOGY.
Presented by Edith Ngai MPhil Term 3 Presentation
Security Issues With Mobile IP
Presented by: Saurav Kumar Bengani
Trustworthiness Management in the Social Internet of Things
Intrusion Tolerance for NEST
Networks Intro to Digital Technology
Computing in the Modern World Unit 4
Seminar On Computer Networks
Comparison of LAN, MAN, WAN
An Introduction to Computer Networking
Ethernet First network to provide CSMA/CD
Computer communications
Peer-To-Peer Data Management
Design Brief in the design process.
Teacher Monica Herrera
Presentation transcript:

Trust and Security in Mission-Critical P2P through Information Flow Approach Vijay Kumar University of Missouri-Kansas City

It is a set of fully functional peer nodes some of which are highly specialized in their functionality. MC- P2P = {P 1, Pp 2,…, P  ); where P i ’s are fully connected peer nodes some of which could be highly specialized. The information exchange between P i and P j (i = j or i ≠ j) is free from temporal and spatial constraints and can take place through wired and wireless medium without the mediation of any central or distributed servers

We define SP = {L/L, C SP } where L/L represents geographical location in terms of Long and Lat and C SP is the special capability of a SP. We define (a) global and (b) local trust categories where Local trust  Global trust.

Our goal here is to provide a trust infrastructure for MC-P2P systems. Such systems require extending trust past the user reputation that has been the primary focus to date. Our aim is to develop a trust establishment scheme that identifies if a peer wishing to join MC-P2P is trustworthy in performing its task including security.

We propose to define a “Measure of Satisfaction (MoS)” which will help to identify the maximum cardinality of UTS sufficient for evaluating highest level of trust for a peer.