1 APPLICATION OF DDDAS FOR TRUSTED COMMUNICATION IN MOBILE NETWORKS. Onolaja Olufunmilola Supervisors: Dr Rami Bahsoon, Dr Georgios Theodoropoulos.

Slides:



Advertisements
Similar presentations
Bandwidth Estimation for IEEE Based Ad Hoc Networks.
Advertisements

June 4, 2004 A Robust Reputation System for P2P and Mobile Ad-hoc Networks Sonja Buchegger 1 A Robust Reputation System for P2P and Mobile Ad-hoc Networks.
Security in Mobile Ad Hoc Networks Security Protocols and Applications Seminar Rudi Belotti, Frank Lyner April 29, 2003.
Conceptual Framework for Dynamic Trust Monitoring and Prediction Olufunmilola Onolaja Rami Bahsoon Georgios Theodoropoulos School of Computer Science The.
EPFL, Lausanne, Switzerland Márk Félegyházi Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks – the Static Case Márk Félegyházi.
1 CS 6910: Advanced Computer and Information Security Lecture on 11/2/06 Trust in P2P Systems Ahmet Burak Can and Bharat Bhargava Center for Education.
Stimulation for Cooperation in Ad Hoc Networks: Beyond Nuglets Levente Buttyán, Jean-Pierre Hubaux, and Naouel Ben Salem Swiss Federal Institute of Technology.
GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin (Sherman) Shen, and Xiaodong.
Mobile Code Security Aviel D. Rubin, Daniel E. Geer, Jr. MOBILE CODE SECURITY, IEEE Internet Computing, 1998 Minkyu Lee
Cloud Applications in Cognitive Radio Shameek Bhattacharjee COP 5611 Project Presentation.
Application of Bayesian Network in Computer Networks Raza H. Abedi.
Different methods and Conclusions Liqin Zhang. Different methods Basic models Reputation models in peer-to-peer networks Reputation models in social networks.
COORDINATION and NETWORKING of GROUPS OF MOBILE AUTONOMOUS AGENTS.
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
Interpersonal Trust Model Ing. Arnoštka Netrvalová DSS - seminar,
fine-grained reputation-based routing in wireless ad hoc networks
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments Yitao Duan and John Canny UC Berkeley.
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
1 Sensor Networks and Networked Societies of Artifacts Jose Rolim University of Geneva.
Multicasting in Mobile Ad-Hoc Networks (MANET)
A S URVEY OF TRUST MANAGEMENT AND ITS APPLICATIONS S UPERVISED BY : D R. Y AN W ANG Ravendra Singh Student-id:
Secure communication in cellular and ad hoc environments Bharat Bhargava Department of Computer Sciences, Purdue University This is supported.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Trust and Grid Computing Systems Presented By: Woodas Lai.
A Reputation Based Scheme for Stimulating Cooperation Aruna Balasubramanian, Joy Ghosh and Xin Wang University at Buffalo (SUNY), Buffalo, NY {ab42, joyghosh,
By Onolaja Olufunmilola. Overview Introduction Motivation Trust, reputation and misbehaivour Literature review DDDAS Model description Applications Evaluation.
An Architecture for Dynamic Trust Monitoring in Mobile Networks Onolaja Olufunmilola, Rami Bahsoon, Georgios Theodoropoulos School of Computer Science.
Motivating Corporation in Mobile Ad Hoc Networks: A Step Forward
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Distributed System Concepts and Architectures Summary By Srujana Gorge.
Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks Ing-Ray Chen, Jia Guo, Fenye Bao, Jin-Hee Cho Communications.
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
Seminar on Internetworking: Routing - from baseline to state-of-the-art Topic proposals Zheng Yan Nokia Research Center
Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks Sonja Buchegger Jean-Yves Le Boudec.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
Fuzzy Trust Recommendation Based on Collaborative Filtering for Mobile Ad-hoc Networks Junhai Luo 1,2, Xue Liu 1, Yi Zhang 3,Danxia Ye 2,Zhong Xu 1 1 McGill.
Easwari Engineering College Department of Computer Science and Engineering IDENTIFICATION AND ISOLATION OF MOBILE REPLICA NODES IN WSN USING ORT METHOD.
Presented by: Nandhitha.M Under the guidance of: Mrs. Suma. R Associate profesor and Hod Dept of Computer Science and Engineering.
ITEC 810 – Project Unit Trustworthy Sensor Networks Daniel Aegerter, Supervisor: Rajan Shankaran.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
MANETS Justin Champion Room C203, Beacon Building Tel 3292,
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
Evaluating Network Security with Two-Layer Attack Graphs Anming Xie Zhuhua Cai Cong Tang Jianbin Hu Zhong Chen ACSAC (Dec., 2009) 2010/6/151.
Veronica Eyo Sharvari Joshi. The nodes are left unattended An Adversary can physically compromise the nodesSolution?  Authentication and cryptographic.
High-integrity Sensor Networks Mani Srivastava UCLA.
National Research Council - Pisa - Italy Marco Conti Italian National Research Council (CNR) IIT Institute MobileMAN MobileMAN: II year expected results.
Dynamic Trust Models for Ubiquitous Computing Environments Colin English, Paddy Nixon, Sotirios Terzis, Andrew McGettrick, Helen Lowe Department of Computer.
Chapter 20: Social Service Selection Service-Oriented Computing: Semantics, Processes, Agents – Munindar P. Singh and Michael N. Huhns, Wiley, 2005.
Security and Cooperation in Ad Hoc Networks Gaia Maselli IIT - CNR
Measuring reputation in Testbeds Chrysa Papagianni, Symeon Papavassiliou National Technical University of Athens.
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
Computer Science and Engineering 1 Mobile Computing and Security.
A Novel Coalitional Game Model for Security Issues in Wireless Networks Xiaoqi LiMichael Lyu Computer Science and Engineering Department The Chinese University.
Enforce Collaboration in Mobile Ad Hoc Network Ning Jiang School of EECS University of Central Florida
Lan Zhou, Vijay Varadharajan, and Michael Hitchens
Sensing Support Comments
Recommendation Based Trust Model with an Effective Defense Scheme for ManetS Adeela Huma 02/02/2017.
The Beta Reputation System
Soummya Kar NAS, Data Science Symposium Jun. 14, 2018
Wenjia Li Anupam Joshi Tim Finin May 18th, 2010
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
Sensing Support Comments
Cross-layer Analysis for detecting Wireless Misbehavior
A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks IEEE Infocom
Presentation transcript:

1 APPLICATION OF DDDAS FOR TRUSTED COMMUNICATION IN MOBILE NETWORKS. Onolaja Olufunmilola Supervisors: Dr Rami Bahsoon, Dr Georgios Theodoropoulos

2 Overview of presentation DDDAS Motivation Trust in mobile networks Reputation Systems Previous work Contribution Conclusion

3 What is DDDAS? DDDAS (Dynamic Data-Driven Application Systems) is a paradigm whereby applications (or simulations) and measurements become a symbiotic feedback control system. This paradigm entails the ability to dynamically incorporate additional data into an executing application, and in reverse, the ability of an application to dynamically steer the measurement process. [4]

4 Motivation The dynamic nature of mobile networks raises the issue of how connected mobile devices can be trusted. Mobile networks have been plagued with many security issues resulting in threats from compromised nodes inside the network. Despite the existing security paradigms, the assurance of security with the exposure of new mobile generation still remains a problem.

5 Objective The objective of this research is to apply the concept of DDDAS to build reputation systems to address the security problems related to trust in mobile networks.

6 Trust and Reputation In the context of networks, when a node is trusted, it implicitly means that the probability that it will perform an action that is beneficial or at least not detrimental in the network is high enough to consider engaging in some form of cooperation with the node. Reputation on the other hand, is the opinion of an entity about another, it is the trustworthiness of a node.

7 Goals of Reputation Systems Provide information that allows nodes to distinguish between trustworthy and non-trustworthy nodes; Encourage nodes to be trustworthy; Discourage participation of nodes that are untrustworthy; Isolating misbehaving nodes and denying them service. [5,6]

8 Previous Work  Reputation in the CORE [2] (A Collaborative Reputation Mechanism to enforce node cooperation in Mobile Ad hoc Networks) approach is formed and updated along time through direct observations and through information provided by other members of the community.  CONFIDANT [3] (Cooperation Of Nodes – Fairness In Dynamic Ad hoc NeTworks) reputation based system is a distributed, symmetric reputation model which uses both first and second hand information from direct neighbours/ other members for updating reputation values.

9 Drawbacks There is heavy reliance on information provided by other nodes within the network making it difficult to detect and problems when there are cooperated misbehaviour between nodes within the network; The consideration of ratings of other nodes gives room for false accusations/praise within the system; Provide a method of updating reputation values which may not meet the requirement of such dynamic environments.

10 Contribution Collaborative attack is a pending problem and this research aims to address it through a combination of centralised and decentralised approaches to information gathering. The paradigm will be applied to dynamically measure trust levels, to determine the reputation of each node.The simulation will continually incorporate new measurements at runtime for the system to accurately determine and update the trust values.

11 Contribution High level Architecture

12 Contribution By comparing the archived reputation score of a mobile device and with its online behaviour, malicious/rouge devices may be detected and exclude. It is assumed that the behaviour of an unauthorized mobile device will be different from the expected. However, nodes may actually behave as expected to gain good reputation before causing undesirable results. This is where the run time dynamic changes in reputation scores becomes useful.

13 Summary This approach will be evaluated in terms of its effectiveness in achieving a better overall security through analysis and simulations. Finally, the aim is to show that DDDAS is a potential paradigm for addressing security problems by providing trusted communication in mobile ad-hoc networks.

Questions? If there are any …. If there are any ….

15 References [1] D. Gambetta. Can We Trust Trust?. In, Trust: Making and Breaking Cooperative Relations, Gambetta, D (ed.). Basil Blackwell. Oxford, 1990, pp [2] P. Michiardi and R. Molva, “ Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks, ” Commun. and Multimedia Security 2002 Conf., Portoroz, Slovenia, Sept. 26 – [3] S. Buchegger and J. Le Boudec. A robust reputation system for P2P and mobile ad-hoc networks. In Proceedings of P2PEcon 2004, Harvard University, Cambridge MA, U.S.A., June 2004 [4] Douglas, C. (2006), “ Dynamic Data Driven Application Systems", [accessed 20 Jan 2009]. [5] P. Resnick and R. Zeckhauser. Trust among strangers in internet transactions: Empirical analysis of ebays reputation system. Working Paper for the NBER workshop on empirical studies of electronic commerce, [6] Sonja Buchegger and Jean-Yves Le Boudec. Self-policing mobile ad hoc networks by reputation systems. IEEE Communications Magazine, 43(7): , [7] Srinivasan A., Teitelbaum J., Liang H., WU J., Cardei M. Reputation and Trust-based systems for Ad Hoc and Sensor Networks.