© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 3: Trust assumptions and.

Slides:



Advertisements
Similar presentations
Mobile and ubiquitous computing Chapter 16 Distributed systems, concepts and design, 4th edition, 2005, Coulouris et al Ylva-Li Lindh Gabriella Hammarin.
Advertisements

CROWN “Thales” project Optimal ContRol of self-Organized Wireless Networks WP1 Understanding and influencing uncoordinated interactions of autonomic wireless.
Stimulation for Cooperation in Ad Hoc Networks: Beyond Nuglets Levente Buttyán, Jean-Pierre Hubaux, and Naouel Ben Salem Swiss Federal Institute of Technology.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 2 – Upcoming networks Generalities.
SCENARIO Suppose the presenter wants the students to access a file Supply Credenti -als Grant Access Is it efficient? How can we make this negotiation.
Group #1: Protocols for Wireless Mobile Environments.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
On the Economics of P2P Systems Speaker Coby Fernandess.
Appendix B: A tutorial on game theory for wireless networks
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing.
Using Game Theoretic Approach to Analyze Security Issues In Ad Hoc Networks Term Presentation Name: Li Xiaoqi, Gigi Supervisor: Michael R. Lyu Department:
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
1 Security and Cooperation in Wireless Networks Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing Levente Buttyan and Jean-Pierre.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 3: Trust assumptions and.
CS 239: Advanced Security Spring 04 Security in Pervasive and Ubiquitous Environments Sam Irvine
Secure Localization using Dynamic Verifiers Nashad A. Safa Joint Work With S. Sarkar, R. Safavi-Naini and M.Ghaderi.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
1 Security and Privacy in Sensor Networks: Research Challenges Radha Poovendran University of Washington
Future Research Directions Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 6: Securing neighbor discovery.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
CAP6135: Malware and Software Vulnerability Analysis Examples of Term Projects Cliff Zou Spring 2012.
Securing Wireless Mesh Networks By Ben Salem & Jean-Pierre Hubaux Presented by Akilesh Sadassivam (Group Leader) Harish Varadarajan Selvaganesh Dharmeswaran.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
Wireless Network Security By Patrick Yount and CIS 4360 Fall 2009 CIS 4360 Fall 2009.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Privacy Issues in Vehicular Ad Hoc Networks.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
An affinity-driven clustering approach for service discovery and composition for pervasive computing J. Gaber and M.Bakhouya Laboratoire SeT Université.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Research Challenges for Wireless Internet Access (some thoughts) David K. Y. Yau Purdue University Department of Computer Science.
Addressing Deafness and Hidden Terminal Problem in Directional Antenna Based Wireless Multi-hop Networks Anand Prabhu Subramanian and Samir R. Das {anandps,
Presented by: Chaitanya K. Sambhara Paper by: Karl Mayer and Wolfgang Fritsche IABG mbH Germany - Instructor : Dr Yingshu Li.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
Cognitive Radio Networks
HIT Policy Committee NHIN Workgroup Recommendations Phase 2 David Lansky, Chair Pacific Business Group on Health Danny Weitzner, Co-Chair Department of.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Objectives Functionalities and services Architecture and software technologies Potential Applications –Link to research problems.
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
1 Protocols for the Wireless Paranoid Nitin Vaidya University of Illinois Slightly revised version of slides used for.
1 Module J Game theory in Wireless Networks Julien Freudiger, Márk Félegyházi, Jean-Pierre Hubaux.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 4: Naming and addressing.
High-integrity Sensor Networks Mani Srivastava UCLA.
1 Service Sharing with Trust in Pervasive Environment: Now it’s Time to Break the Jinx Sheikh I. Ahamed, Munirul M. Haque and Nilothpal Talukder Ubicomp.
Ad Hoc Network.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
A Guide for Management. Overview Benefits of entity-level controls Nature of entity-level controls Types of entity-level controls, control objectives,
Dynamic Trust Models for Ubiquitous Computing Environments Colin English, Paddy Nixon, Sotirios Terzis, Andrew McGettrick, Helen Lowe Department of Computer.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Mobile Systems Availability Integrity and Confidentiality MoSAIC M.O.Killijian, D.Powell, M.Banâtre, P.Couderc, Y.Roudier LAAS-CNRS - IRISA- Eurécom.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Security of the Internet of Things: perspectives and challenges
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
A Novel Coalitional Game Model for Security Issues in Wireless Networks Xiaoqi LiMichael Lyu Computer Science and Engineering Department The Chinese University.
Presented by Edith Ngai MPhil Term 3 Presentation
VANET.
Environment-Aware Reputation Management for Ad Hoc Networks
Selfish Misbehavior in Wireless Networks
Cross-layer Analysis for detecting Wireless Misbehavior
Presentation transcript:

© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 3: Trust assumptions and adversary models

Security and Cooperation in Wireless Networks Chapter X: Chapter title 2/11 Trust  the trust model of current wireless networks is rather simple –subscriber – service provider model –subscribers trust the service provider for providing the service, charging correctly, and not misusing transactional data –service providers usually do not trust subscribers, and use security measures to prevent or detect fraud  in the upcoming wireless networks the trust model will be much more complex –entities play multiple roles (users can become service providers) –number of service providers will dramatically increase –user – service provider relationships will become transient –how to build up trust in such a volatile and dynamic environment?  yet, trust is absolutely fundamental for the future of wireless networks –pervasiveness of these technologies means that all of us must rely on them in our everyday life!

Security and Cooperation in Wireless Networks Chapter X: Chapter title 3/11 Reasons to trust organizations and individuals  Moral values –Culture + education, fear of bad reputation  Experience about a given party –Based on previous interactions  Rule enforcement organization –Police or spectrum regulator  Usual behavior –Based on statistical observation  Rule enforcement mechanisms –Prevent malicious behavior (by appropriate security mechanisms) and encourage cooperative behavior } Will lose relevance ? Scalability challenge Can be misleading

Security and Cooperation in Wireless Networks Chapter X: Chapter title 4/11 Trust vs. security and cooperation  trust preexists security –all security mechanisms require some level of trust in various components of the system –security mechanisms can help to transfer trust in one component to trust in another component, but they cannot create trust by themselves  cooperation reinforces trust –trust is about the ability to predict the behavior of another party –cooperation (i.e., adherence to certain rules for the benefit of the entire system) makes predictions more reliable

Security and Cooperation in Wireless Networks Chapter X: Chapter title 5/11 Malice and selfishness  malice –willingness to do harm no matter what  selfishness –overuse of common resources (network, radio spectrum, etc.) for one’s own benefit  traditionally, security is concerned only with malice  but in the future, malice and selfishness must be considered jointly if we want to seriously protect wireless networks

Security and Cooperation in Wireless Networks Chapter X: Chapter title 6/11 Malice and selfishness  Definition1: A misbehavior is the action of a party or group of parties consisting in deliberately departing from the standardized or otherwise prescribed behavior in order to reach a specific goal.  Definition 2: A misbehavior is selfish (or greedy, or strategic) if it aims at obtaining an advantage that can be quantitatively expressed in the units (bitrate, joules, or coverage) of wireless networking or in a related incentive system (e.g., micropayments); any other misbehavior is considered to be malicious.

Security and Cooperation in Wireless Networks Chapter X: Chapter title Adversary models  First, we need to identify/include selfish opponents  The notion of physical location of the (wireless) parties becomes very important.  Likewise, the topology and the communication primitives of the network become very relevant. jamming /route establishment protocols.  The risk of capture and cloning must be taken into account, as we have already seen for the case of mesh networks  The huge number of parties (e.g., several thousand sensors per human being; a total of one billion road vehicles) makes key management a challenge per se.  Ad-hoc cryptographic primitives 7/11

Security and Cooperation in Wireless Networks Chapter X: Chapter title 8/11 Who is malicious? Who is selfish? There is no watertight boundary between malice and selfishness  Both security and game theory approaches can be useful There is no watertight boundary between malice and selfishness  Both security and game theory approaches can be useful Harm everyone: viruses,… Selective harm: DoS,… Spammer Cyber-gangster: phishing attacks, trojan horses,… Big brother Greedy operator Selfish mobile station

Security and Cooperation in Wireless Networks Chapter X: Chapter title 9/11 From discrete to continuous Warfare-inspired Manichaeism: The more subtle case of commercial applications: Bad guys (they) Attacker Good guys (we) System (or country) to be defended 0 1 Undesirable behavior Desirable behavior 0 1 Security often needs incentives Incentives usually must be secured

Security and Cooperation in Wireless Networks Chapter X: Chapter title 10/11 Definitions  A misbehavior consists in deliberately departing from the prescribed behavior in order to reach a specific goal  A misbehavior is selfish (or greedy, or strategic) if it aims at obtaining an advantage that can be quantitatively expressed in the units (bitrate, joules, or coverage) or in a related incentive system (e.g., micropayments); any other misbehavior is considered to be malicious.

Security and Cooperation in Wireless Networks Chapter X: Chapter title 11/11 Grand Research Challenge Prevent ubiquitous computing from becoming a pervasive nightmare

Security and Cooperation in Wireless Networks Chapter X: Chapter title 12/11 Book structure (1/2) XXXXXX XXXXX XXXXXXX? XXXXXXXXX XXXXXXXX XXXXX???? XXXXX?X? X?XX? Small operators, community networks Cellular operators in shared spectrum Mesh networks Hybrid ad hoc networks Self-organized ad hoc networks Naming and addressing Discouraging greedy op. Security associations Securing neighbor discovery Secure routing Privacy Enforcing PKT FWing Enforcing fair MAC Vehicular networks Sensor networks RFID networks Upcoming wireless networks Security and cooperation mechanisms Behavior enforc. Part I Part IIIPart II

Security and Cooperation in Wireless Networks Chapter X: Chapter title 13/11 Book structure (2/2) 1. Existing networks 2. Upcoming networks 3. Trust 4. Naming and addressing 5. Security associations 6. Secure neighbor discovery 7. Secure routing 8. Privacy protection 9. Selfishness at MAC layer 10. Selfishness in PKT FWing 11. Operators in shared spectrum 12. Behavior enforcement Appendix A: Security and crypto Appendix B: Game theory SecurityCooperation