Seminar on Internetworking: Routing - from baseline to state-of-the-art Topic proposals Zheng Yan Nokia Research Center 19.01.2004.

Slides:



Advertisements
Similar presentations
CSC668 Topics in Computing Project Information and Suggestions.
Advertisements

Security Issues in Mobile Ad hoc Networks
GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin (Sherman) Shen, and Xiaodong.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
David B. Johnson Rice University Department of Computer Science DSR Status Update Monarch Project 55th.
Transmission Time-based Mechanism to Detect Wormhole in Ad-hoc Networks Tran Van Phuong U-Security Group RTMM Lab, Kyung Hee Uni, Korea
Routing in WSNs through analogies with electrostatics December 2005 L. Tzevelekas I. Stavrakakis.
Multicasting in Mobile Ad-Hoc Networks (MANET)
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada Multimedia Streaming in Dynamic Peer-to-Peer Systems and Mobile Wireless.
1 A few challenges in security & privacy in the context of ubiquitous computing Gene Tsudik SCONCE: Secure Computing and Networking Center UC Irvine
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks Yih-Chun Hu (Carnegie Mellon University) Adrian Perrig (Carnegie Mellon University)
A Reputation Based Scheme for Stimulating Cooperation Aruna Balasubramanian, Joy Ghosh and Xin Wang University at Buffalo (SUNY), Buffalo, NY {ab42, joyghosh,
An Architecture for Dynamic Trust Monitoring in Mobile Networks Onolaja Olufunmilola, Rami Bahsoon, Georgios Theodoropoulos School of Computer Science.
Challenge: Securing Routing Protocols Adrian Perrig
Motivating Corporation in Mobile Ad Hoc Networks: A Step Forward
Welcome to CS 450 Internet Security: A Measurement-based Approach.
Traffic Engineering and Routing Hansen Bow. Topics Traffic Engineering with MPLS Issues Concerning Voice over IP Features of Netscope QoS Routing for.
THE TITLE OF YOUR PAPER Your Name Communication Networks Laboratory School of Engineering Science Simon Fraser University.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
A Study on Quality of Service Issues in Internet Telephony  IP Telephony – Applications and Services  Advantages and benefits of Voice over IP  Technical.
Ashish Gupta (98130) Ashish Gupta (98131) Under guidance of Prof. B. N. Jain.
1 APPLICATION OF DDDAS FOR TRUSTED COMMUNICATION IN MOBILE NETWORKS. Onolaja Olufunmilola Supervisors: Dr Rami Bahsoon, Dr Georgios Theodoropoulos.
Advanced Computer Networks cs538, Fall 2014 Klara Nahrstedt.
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks DAOJING HE, YI GAO, SAMMY CHAN, CHUN CHEN, JIAJUN BU Ad Hoc & Sensor Wireless.
Lecture 15 Summary Wireless Networks and Mobile Systems.
Toward Prevention of Traffic Analysis Fengfeng Tu 11/26/01.
1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Page 1 Prof. Dr.-Ing. habil. Andreas Mitschele-Thiel Integrated Communication Systems Group Investigation and Comparison of State-of-the-Art.
@Yuan Xue Network Security Review and Beyond Network Security.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
NSIS Authentication, Authorization and Accounting Issues (draft-tschofenig-nsis-aaa-issues-00.txt) Authors: Hannes Tschofenig Henning Schulzrinne Maarten.
1 How to Search, Read, Write, and Present a Paper.
Profiles and Multi-Topology Routing in Highly Heterogeneous Ad Hoc Networks Audun Fosselie Hansen Tarik Cicic Paal Engelstad Audun Fosselie Hansen – Poster,
Advanced Computer Networks by Behzad Akbari Spring 2011 In the Name of the Most High.
1 Cooperative Wireless Networking Elza Erkip Department of Electrical and Computer Engineering Polytechnic Institute of New York University.
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
Course content relevant for exam (S Telecommunication Systems) Topics that are mentioned both in the lecture slides (powerpoint slides) and in the.
A Cluster-Based Backbone infrastructure for broadcasting in MANETs Student: Pei-Yue Kuo
Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks” IEEE Communications.
How to start research V. Jayalakshmi. Why do we research? – To solve a problem – To satisfy an itch – To gain more market share/ Develop and improve –
COST289 14th MCM Towards Cognitive Communications 13 April Towards Cognitive Communications A COST Action Proposal Mehmet Safak.
Advanced Computer Networking Course Overview 1. This is a graduate-level course which covers advanced topics in computer networks including current hot.
Course content relevant for exam (Regarding lectures covering the following topics: SS7/IN/ISDN, ATM, GSM/GPRS, TETRA/DECT, UMTS, and Internet) Topics.
A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks Reporter: Yanlin Peng Wenrui Zhao, Mostafa Ammar, College of Computing,
CS Spring 2010 CS 414 – Multimedia Systems Design Lecture 40 – Final Exam Review Session Klara Nahrstedt Spring 2010.
ICN Baseline Scenarios draft-pentikousis-icn-scenarios-04 K. Pentikousis (Ed.), B. Ohlman, D. Corujo, G. Boggia, G. Tyson, E. Davies, P. Mahadevan, S.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Effects of adding Arbitrary Physical Nodes to a Mobile Ad-Hoc Network Utilizing an Anonymity System By Ian Cavitt.
Nour KADI, Khaldoun Al AGHA 21 st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications 1.
Topics in Internet Research Energy Efficient Routing in Ad-Hoc Wireless Networks Aadil Zia Khan Department of Computer Science Lahore University of Management.
Project Topics ECE 591. Project 1: Localization through Wi-Fi and Wireless Camera WIFI localization: Wireless Camera: Goal: Understand RF based localization.
KAIS T Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks Wei Wang, Vikram Srinivasan, Kee-Chaing Chua MobiCom ‘05 Presentation by.
Computer Science and Engineering 1 Mobile Computing and Security.
IETF-Vienna IEPREP WG, July 2003 Ken Carlberg. Discussion Update –draft-ietf-ieprep-framework-05.txt –draft-ietf-ieprep-ets-general-03.txt –draft-ietf-ieprep-ets-telephony-05.txt.
2/10/2016 Mobile Ad hoc Networks COE 549 Routing Protocols III Tarek Sheltami KFUPM CCSE COE
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco’s Position on All-IP Wireless Networks Presentation_ID.
Intro Wireless vs. wire-based communication –Costs –Mobility Wireless multi hop networks Ad Hoc networking Agenda: –Technology background –Applications.
Effects of Adding Arbitrary Physical Nodes(APNs) to a Mobile Ad-Hoc Network (MANET)Utilizing a Anonymous Routing Protocol.
Jim Parker CMSC691t Spring 2000 “Ad-hoc On-Demand Distance Vector Routing” A dynamic routing algorithm for mobile ad-hoc networks.
Part 1: Mobile Ad hoc Networks (MANETs) Energy Aware Routing in MANETs Part 2: OLSR FEA-OLSR Part 3: Simulation Results Conclusion.
DETECTION OF WORMHOLE ATTACK IN MANET
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME
Presented by: Saurav Kumar Bengani
CCN application-domains: brainstorming from GreenICN project
Routing In Wireless Mesh Networks
Wireless Ad Hoc/Sensor Networks: From IEEE 802
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks
SCONCE: Secure Computing and Networking Center
Presentation transcript:

Seminar on Internetworking: Routing - from baseline to state-of-the-art Topic proposals Zheng Yan Nokia Research Center

Topics Routing Security – Solution and challenges Trust evaluation based routing in ad hoc networks QoS routing for P2P networking

Topic 1: Routing Security – Solution and challenges Objectives Understand the necessity of secure routing Study on famous security routing protocols What are the problems solved already and what are open problems/challenges Provide personal opinion on future work Candidates Either undergraduates or postgraduates

Suggested research plan Motivations: what is routing security? why is it needed? requirements? Brief overview of state-of-art History of the routing security (when did the work start? famous work conducted), current status (why is there so little work? how is it different from other security work?, etc.) Internal and external security routing Focus could be on the internal one. Some famous secure routing protocols (SBGP, SOSPF) will be analyzed: basic theory, characteristics and problems (also considered from efficiency and economy points of view). What will be the future development? Routing attacks and defenses on them. What has been solved? What has not? Provide personal opinion on challenges of secure routing (e.g. in ad hoc networks) and comment existing solutions.

References Paul Syverson, Gene Tsudik, Michael Reed, Carl Landwehr, Towards an Analysis of Onion Routing Security (2000) router.netzSzPublicationszSzWDIAU-2000.pdf/syverson00towards.pdf Many papers here about routing security: Kent, Stephen, et al. "Secure Border Gateway Protocol (S-BGP) -- Real World Performance and Deployment Issues". In Proceedings of the Network and Distributed System Security Symposium (NDSS 2000), San Diego, CA, February "Secure Border Gateway Protocol (Secure BGP),", Stephen Kent, Charles Lynn, Karen Seo, IEEE Journal on Selected Areas in Communication, Vol. 18, No. 4, April This article describes the basic architecture of the most successful approach to securing BGP. Nick Feamster, Security for Wide-Area Internet Routing, Miscellaneous reference: Routing security slides: IETF routing security requirements and threats:

Topic 2: Trust evaluation based routing in ad hoc networks Objectives Study a new concept for secure routing in ad hoc networks that actually deal with trust issues and human involvement in ad hoc networks Understand why it is needed Survey the current literature on this work Point out problems in the existing work Candidates Preferred: familiar with ad hoc and its routing Postgraduate, undergraduate is also fine

Suggested research plan Start at: challenges on secure routing in ad hoc scenario Analysis on why trust evaluation can help Survey on some existing work Comparison and provide your opinion

References Vesa Kärpijoki, Signalling and Routing Security in Mobile and Ad-hoc Networks, 17th May, Sonja Buchegger, Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks. MANET routing security slides: The work of Baker at Stanford: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Mobicom marti.pdf?key1=345955&key2= &coll=GUIDE&dl=GUIDE&CFID= &CFTOKEN= The work of Perrig, Hu, and Johnson on secure routing: Ariadne (Mobicom 2002), SEAD (WMCSA 2002), wormhole attacks (Infocom 2003) demand%20routing%20protocol%20for%20ad%20hoc%20networks.pdf demand%20routing%20protocol%20for%20ad%20hoc%20networks.pdf Secure Routing Protocol: Others The Quest for Security in Mobile Ad Hoc Networks, MobiHOC 2001 Small worlds in security systems, ACM New Security Paradigms Workshop 2002.

Topic 3: QoS routing for P2P networking Objectives Understand basic knowledge of QoS routing Study the famous solutions of QoS routing in the literature resource reservation protocols(e.g. RSVP), differential services(DiffServ) and MPLS (MultiProtocol Label Switching) Understand P2P system and its basic characteristics Study the necessity/demand of QoS routing for P2P systems Candidate: Postgraduate or undergraduate

References Book: Peer-to-Peer: Harnessing the Power of Disruptive Technologies Wen Sun, QoS/Policy/Constraint based routing, state.edu/~jain/cis788-99/ftp/qos_routing/index.html Shigang Chen, Klara Nahrstedt, An Overview of Quality-of-Service Routing for the Next Generation High-Speed Networks: Problems and Solutions, IEEE Network Magazine, Special Issue on Transmission and Distribution of Digital Video, vol. 12, num. 6, pp , November- December. HUT work: RFC: A Framework for QoS-based Routing in the Internet