Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.

Slides:



Advertisements
Similar presentations
Research Issues in Web Services CS 4244 Lecture Zaki Malik Department of Computer Science Virginia Tech
Advertisements

June 4, 2004 A Robust Reputation System for P2P and Mobile Ad-hoc Networks Sonja Buchegger 1 A Robust Reputation System for P2P and Mobile Ad-hoc Networks.
Trust Management of Services in Cloud Environments:
Conceptual Framework for Dynamic Trust Monitoring and Prediction Olufunmilola Onolaja Rami Bahsoon Georgios Theodoropoulos School of Computer Science The.
1 Christophe S. Jelger, Michael Kleis, Burak Simsek, Rolf Stadler, Ralf König, Danny Raz Theories/formal methods in support of autonomic management Dagstuhl.
1 CS 6910: Advanced Computer and Information Security Lecture on 11/2/06 Trust in P2P Systems Ahmet Burak Can and Bharat Bhargava Center for Education.
A Survey of Trust Management for Mobile Ad Hoc Networks
On the Economics of P2P Systems Speaker Coby Fernandess.
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks Maxim Raya, Panos Papadimitratos, Virgil D. Gligor, Jean-Pierre Hubaux INFOCOM 2008.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
A S URVEY OF TRUST MANAGEMENT AND ITS APPLICATIONS S UPERVISED BY : D R. Y AN W ANG Ravendra Singh Student-id:
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Mitigating routing misbehavior in ad hoc networks Mary Baker Departments of Computer Science and.
Trust CS 239 Advanced Topics in Computer Security Bernie Perez Vahab Pournaghshband November 9th, 2010.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 3: Trust assumptions and.
An Architecture for Dynamic Trust Monitoring in Mobile Networks Onolaja Olufunmilola, Rami Bahsoon, Georgios Theodoropoulos School of Computer Science.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale Wireless & Network Security Lecture 10:
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Six –
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Security Models for Trusting Network Appliances From : IEEE ( 2002 ) Author : Colin English, Paddy Nixon Sotirios Terzis, Andrew McGettrick Helen Lowe.
Pervasive Computing and Communication Security (PerSec 2006) March 13th, 2006 Florina Almenárez, Andrés Marín, Daniel Díaz, Juan Sánchez
An Introduction to Decentralized Trust Management Sandro Etalle University of Twente thanks to William H. Winsborough – University of Texas S. Antonio.
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Krishnaprasad Thirunarayan, Pramod Anantharam, Cory A. Henson, and Amit P. Sheth Kno.e.sis Center, Ohio Center of Excellence on Knowledge-enabled Computing,
1 TAPAS Workshop Nicola Mezzetti - TAPAS Workshop Bologna Achieving Security and Privacy on the Grid Nicola Mezzetti.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Computer Science and Engineering 1 Service-Oriented Architecture Security 2.
KAIS T Decentralized key generation scheme for cellular-based heterogeneous wireless ad hoc networks 임 형 인 Ananya Gupta, Anindo Mukherjee, Bin.
A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU.
Rule based Trust management using RT Sandro Etalle thanks to Ninghui Li - Purdue William H. Winsborough – University of Texas S. Antonio. The DTM team.
University of Westminster – Y. Zetuny, G. Terstyanszky, S. Winter, P. Kacsuk Centre for Parallel Computing Cavendish School of Informatics.
Computational Challenges in E-Commerce By Joan Feigenbaum, David C.Parkes, and David M.Pennock Presented by Wu Jingyuan.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
By Swetha Namburi.  Trust  Trust Model ◦ Reputation-based Systems ◦ Architectural Approach to Decentralized Trust Management.
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
Adapted from the original presentation made by the authors Reputation-based Framework for High Integrity Sensor Networks.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
High-integrity Sensor Networks Mani Srivastava UCLA.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Trust Management in P2P systems Presenter: Lintao Liu April 21th, 2003.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE September Integrating Policy with Applications.
Introduction to Access Control and Trust Management Daniel Trivellato.
The EigenTrust Algorithm for Reputation Management in P2P Networks
Time-Space Trust in Networks Shunan Ma, Jingsha He and Yuqiang Zhang 1 College of Computer Science and Technology 2 School of Software Engineering.
Computer Science and Engineering 1 Mobile Computing and Security.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
STRUDEL: Supporting Trust in the Dynamic Establishment of peering coaLitions April 2006 Daniele Quercia, Manish Lad, Stephen Hailes, Licia Capra, and Saleem.
Risk-Aware Mitigation for MANET Routing Attacks Submitted by Sk. Khajavali.
SECURE MANET ROUTING WITH TRUST INTRIGUE Prepared By: Aditya Kiran R.S Mangipudi Srikanth Gadde Varun Mannar.
Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Thomas Repantis Vana Kalogeraki Department of Computer Science & Engineering University.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
Presented by Edith Ngai MPhil Term 3 Presentation
Talal H. Noor, Quan Z. Sheng, Lina Yao,
University of Maryland College Park
Recommendation Based Trust Model with an Effective Defense Scheme for ManetS Adeela Huma 02/02/2017.
Trustworthiness Management in the Social Internet of Things
Giannis F. Marias, Vassileios Tsetsos,
Wenjia Li Anupam Joshi Tim Finin May 18th, 2010
A Survey of Trust Management Systems
Cross-layer Analysis for detecting Wireless Misbehavior
A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks IEEE Infocom
Presentation transcript:

Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture 12: Trust Dr. Kemal Akkaya

Kemal AkkayaWireless & Network Security 2Trust  Definition:  The belief that an entity is capable of acting reliably, dependably, and securely in a particular case  A well studied concept in sociology and psychology.  Need for trust  Traditional schemes focus on preventing attackers from entering the network through security protocols.  Those schemes, however, are not effective when: Malicious nodes have gained access to the network Some nodes in the network have been compromised  Trust function:  Provide an incentive for good behavior.  Provide a prediction of one’s future behavior.  Detect malicious and selfish entities.  Examples:  E-commerce : risk estimation  P2P : reducing free riding  Mobile ad hoc networks : mitigating nodes selfish behavior

Kemal AkkayaWireless & Network Security 3 Trust Models  Trust models entails collecting the information necessary to establish a trust relationship and dynamically monitoring and adjusting the existing truth relationship.  Two models:  Policy-based Trust Based on access control Restricting access to resources according to application-defined policies PolicyMaker, Keynote, REFEREE  Reputation-based Trust a peer requesting a resource may evaluate its trust in the reliability of the resource and the peer providing the resource Trust value assigned to a trust relationship is a function of the combination of the peer’s global reputation SPORAS, HISTOS, XREP, NICE, DCRC/CORC, Beta, EigenTrust  Others: Social network-based Trust  Utilize social relationships between peers when computing trust and reputation values

Kemal AkkayaWireless & Network Security 4 Policy-based Trust

Kemal AkkayaWireless & Network Security 5 Policy-based Trust: virtual  Problems  They do not provide a complete generic trust management solution for all decentralized applications  Scalability

Kemal AkkayaWireless & Network Security 6 Reputation-based Trust  Community of cooks (200 people)  Need to interact with someone you don’t know,  To extablish trust: you ask your friends –and friends of friends »... some recommendations are better than other you check the record (if any)  After success trust increases  p2p community of hackers (2000 people)  Exchange programs & scripts  Need to interact with someone you don’t know, ...  Difference with concrete community:  Larger, faster Trust establishment has to be to some extent automatic

Kemal AkkayaWireless & Network Security 7 Challenges  Trust metrics  How to model and compute trust  Evaluating initial trust value  Combining evidences, recommendations, reputation  Management of reputation data  Secure & efficient retrieval of reputation data  Automating trust based decision  Closing the circle: using experience as feedback

Kemal AkkayaWireless & Network Security 8 Reputation vs Policy-based Trust  open system (different security domains)  trust is a measure & changes in time  risk-based  recommendation based (NOT identity-based)  peers are not continuously available  Some systems: PGP TBD  open system (different security domains)  trust is boolean & less time-dependent  no risk  rule (credential) based (NOT identity-based)  peers are not continuously available  Some systems: keynote, Trust-X

Kemal AkkayaWireless & Network Security 9 Distributed Trust Models  Distributed Trust:  The representation of inputs to, and the process of making, trust decisions based on resources shared among multiple entities  Without Trust, either parties refuse to interact or require severe restrictions and complex controls – increased costs.  Trust is required for multiple entities to co-operate and share resources, and thus achieve some application value.  Conditional transitivity of trust  if A trusts B & B trusts C then A trusts C if B recommends its trust in C to A explicitly A trusts B as a recommender A can judge B’s recommendation and decide how much it will trust C, irrespective of B’s trust in C  Will look at different models separately  MANETs  P2P Networks

Kemal AkkayaWireless & Network Security 10 Comparison of TM Approaches ApproachTarget Environ.Idea AT&T labs(1996, 1998)PKIA lot like Access Control – Policy-based Abdul-Rahman & Hailes (2000) Virtual comm. Intro to Reputation-based Trust Models & agents autonomy Aberer & Despotovic (2001) P2P Attempts distributed Storage of Trust info. – Reputation-based CONFIDANT (2002)MANET Attempts incorporation of Detection & isolation of misbehavior SECURE (2003) Ubiquitous roaming entities Attempts Incorporation of risk model with Trust hTrust(2004)MANET Trust Management & dispositional trust. Detection & isolation of malicious recommenders. McNamara et al. (2006)MANETMobility introduced as a factor STRUDEL (2006)CPD Combat Tragedy of the commons (Selfishness of Nodes) MATE (2006)MANET Attempts integrated management of trust and risk (an element of dispositional trust).