Annual review ROME 2012 WP4 - Network. Work package - objectives – Task 4.1 Smart SPD driven transmission SE; SG; THYIA; TUC; UNIGE – Task 4.2 Distributed.

Slides:



Advertisements
Similar presentations
anywhere and everywhere. omnipresent A sensor network is an infrastructure comprised of sensing (measuring), computing, and communication elements.
Advertisements

Deliverable documents planned status 1/2 Del. no. Deliverable name WP no. Responsibilit y Reviewer Nature/disse mination Level Delivery date from Annex.
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
1 Programa de Engenharia Elétrica - PEE/COPPE/UFRJ Universidade Federal do Rio de Janeiro A Review of Anomalies Detection Schemes for Smart Grids Andrés.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
1 6/11/ :41 Chapter 10Wireless LANs1 Rivier College CS575: Advanced LANs Chapter 10: Wireless LANs.
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
A Survey on Sensor Networks Rick Han CSCI 7143 Secure Sensor Networks Fall 2004.
An Integrated Framework for Dependable Revivable Architectures Using Multi-core Processors Weiding Shi, Hsien-Hsin S. Lee, Laura Falk, and Mrinmoy Ghosh.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
CS541 Advanced Networking 1 Cognitive Radio Networks Neil Tang 1/28/2009.
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME Presented By: Mohammed Saleh CS 599a Fall06.
Applied Cryptography for Network Security
Wireless Sensor Network Security Anuj Nagar CS 590.
Security Solutions for Wireless Sensor Networks 姓名 : 曹倫誠 學號 : Date:2010/06/07.
Kick-off meeting 3 October 2012 Patras. Research Team B Communication Networks Laboratory (CNL), Computer Engineering & Informatics Department (CEID),
 The GSM network is divided into two systems. each of these systems are comprised of a number of functional units which are individual components of the.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
CSCE 548 Secure Software Development Risk-Based Security Testing.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Trust and Reputation Based mechanisms for CIP Uniparthenope, UniRC, Polito (Fai della Paganella, Febbraio 2014)
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
BUSINESS B1 Information Security.
Description of the monitoring system experimentation on the freight car pSHIELD Demonstrator Testbed Architecture pSHIELD Final Review Meeting, Bruxelles.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
CSC8320. Outline Content from the book Recent Work Future Work.
John Trinidad Senior Systems Engineer Harris Corporation Rochester, NY (585) The Challenge in Developing an SCA Compliant.
State Data Center Oregon Consumer Identity Theft Protection Act Information Forum October 31, 2007.
Chapter VII Security Management for an E-Enterprise -Ramyah Rammohan.
2 nd Annual review Florence 15 th November 2013 Railway security demonstrator.
Wireless Hotspots: Current Challenges and Future Directions CNLAB at KAIST Presented by An Dong-hyeok Mobile Networks and Applications 2005.
Adapted from the original presentation made by the authors Reputation-based Framework for High Integrity Sensor Networks.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Cryptography and Network Security (CS435) Part One (Introduction)
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
NSHIELD – TA Amendments TMC Call Conference. 2 TMC Members Gordana Mijic Paolo Azzoni - Antonio AbramoPaolo Azzoni Marco Cesena Andrea Morgagni Elisabetta.
COAG AUSTRALIA The Prime Minister, Premiers and Chief Ministers signed the IGA at the COAG meeting on 13 April The key objectives of the Strategy,
High-integrity Sensor Networks Mani Srivastava UCLA.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
End-to-End Efficiency (E 3 ) Integrating Project of the EC 7 th Framework Programme General View of the E3 Prototyping Environment for Cognitive and Self-x.
Cognitive Radio: Next Generation Communication System
R ECONFIGURABLE SECURITY SUPPORT FOR EMBEDDED SYSTEMS 1 AKSHATA VARDHARAJ.
P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak.
To ensure secure and dependable monitoring of rail cars transporting hazardous materials, providing resiliency against both random and malicious threats.
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University Australia.
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
Computer Science and Engineering 1 Mobile Computing and Security.
Wireless Mesh Networks Myungchul Kim
Status & Challenges Interoperability and global integration of communication infrastructure & service platform Fixed-mobile convergence to achieve a future.
Emerging and Evolving Cyber Threats Require Sophisticated Response and Protection Capabilities  Advanced Algorithms  Cyber Attack Detection and Machine.
CPT 123 Internet Skills Class Notes Internet Security Session B.
Security API discussion Group Name: SEC Source: Shingo Fujimoto, FUJITSU Meeting Date: Agenda Item: Security API.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
A Blackboard-Based Learning Intrusion Detection System: A New Approach
Wireless Sensor Networks
BORDER SECURITY USING WIRELESS INTEGRATED NETWORK SENSORS (WINS) By B.S.Indrani (07841A0406) Aurora’s Technological and Research Institute.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks International Forum on Information Technology and Applications.
Scenario: All in One ECC TG6#2, Lisboa, 3-5 December 2013.
Wireless Network PMIT- By-
CSCE 548 Secure Software Development Risk-Based Security Testing
Information Technology - Information Networks
PLANNING A SECURE BASELINE INSTALLATION
Security in SDR & cognitive radio
Presentation transcript:

Annual review ROME 2012 WP4 - Network

Work package - objectives – Task 4.1 Smart SPD driven transmission SE; SG; THYIA; TUC; UNIGE – Task 4.2 Distributed self-x models ATHENA; THYIA, TUC, UNIGE, UNIUD, SE – Task 4.3 Reputation-based resource management technologies HAI; SE, TECNALIA, INDRA, MGEP, TUC, UNIROMA1 – Task 4.4 Trusted and dependable Connectivity ISL; SE, SCOM, TECNALIA, HAI, MGEP, THYIA, TUC

Smart SPD-driven transmission Goal: providing reliable and efficient communications even in critical (physical) channel conditions – Adaptive and flexible algorithms for dynamically configuring and adapting various transmission-related parameters Based on the Software Defined Radio (SDR) or Cognitive Radio (CR) technology Shall be SCA-compliant Security-aware framework – Deployment of different state-of-the-art technologies for detecting and countering reconfigurability-related and cognitive capability-related security issues and attacks

Smart SPD-driven transmission (2) Software Communications Architecture (source: SCA 4.0 specification)

Smart SPD-driven transmission (3) Security-aware framework (source: nSHIELD deliverable 2.4)

Smart SPD-driven transmission (4) Trusted Network Routing Service (source: nSHIELD deliverable 2.4)

Distributed self-x models Goal: Providing network transmission technologies to support the dependable self-x technologies at the node level by means of Cognitive Radio technologies Self-x refers to: – Self-(re)configuration – Self-management – Self-supervision – Self-recovery Evaluation of risks has been performed so far, with the following types of attacks identified and analyzed: – Side channel attacks – Denial-of-Service (DoS) attacks

Reputation-based resource management technologies Goal: Using information of nodes’ past behaviours in order to estimate the current trustworthiness level Reputation and trust based Intrusion Detection Systems for WSN – New distributed approach (vs. centralized in pSHIELD) Agent based detection minimises the communication needs – Both anomaly and specification-based detection Anomaly detection using a simpler model (to reduce CPU and power consumption) Coupled with specification based detection to enhance efficiency

Reputation-based resource management technologies (2) Distributed detection Node monitors local activities If not sure about nature of an activity, node contacts other nodes in the neighbourhood Reputation and trust of node set according to local and neighbour information When anomalous activities are flagged locally, this information is broadcasted to the rest of nodes

Trusted and dependable connectivity Goal: assuring communications integrity to the maximum possible extent Regarded at two levels: – Trusted Network Routing Service Possibility of choosing between different routing schemes, based on the input of the reputation-based scheme – Secure Data Exchange/Communication Service Encryption schemes to enable protection (and integrity) of data CRC encoding and checksum techniques to verify data integrity Authentication schemes to verify identity of sender/receiver

Applications and scenarios AirBand - group of frequencies in the VHF radio spectrum allocated to radio communication in civil aviation – ESs are used to perform the communications, for example, VOR uses radio beacons – nSHIELD could be used by all the applications using Airband frequencies (VOR, ATIS, ASOS, ILS…) to provide SPD capabilities in their communications GSM-R - network for railway communication based on GSM technology but uses specific frequency spectrum – Already has several SPD features implemented, such as: Availability requirement using full redundancy of radio coverage and all network elements Security and integrity requirements encrypting the information (a Key Management Service distributes encryptation keys) Security measures inherited from GSM techonology

Applications and scenarios (2) Machine Redable Travel Documents (MRTD) – travel documents equipped with a smart card processor to perform biometric identification (face identification) of the holder – The new passport design is intended to serve two purposes: The biometric information can be used to verify the identity in the border control Cryptographic technologies can be used to ascertain the integrity and originality of passports, thus preventing high quality passport forgeries

Contributions Marko Cesena – SELEX ELSAG Krešimir Dabčević, Lucio Marcenaro – UNIVERSITY OF GENOVA Inaki Eguia Elejabarrieta – TECNALIA Barri Vilardell, Ignasi Oriol – INDRA Andreas Papalambrou – ATHENA/ISI Roberto Uribeetxeberria - MONDRAGON UNIVERSITY Alex Papanikolaou – TECHNICAL UNIVERSITY OF CRETE

The END That’s all folks!