1 Service Sharing with Trust in Pervasive Environment: Now it’s Time to Break the Jinx Sheikh I. Ahamed, Munirul M. Haque and Nilothpal Talukder Ubicomp.

Slides:



Advertisements
Similar presentations
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Advertisements

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Cobalt: Separating content distribution from authorization in distributed file systems Kaushik Veeraraghavan Andrew Myrick Jason Flinn University of Michigan.
1 Intrusion Monitoring of Malicious Routing Behavior Poornima Balasubramanyam Karl Levitt Computer Security Laboratory Department of Computer Science UCDavis.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Cognitive Engine Development for IEEE Lizdabel Morales April 16 th, 2007
DSR The Dynamic Source Routing Protocol Students: Mirko Gilioli Mohammed El Allali.
MPAC 2004Rae Harbird 1 RUBI Adaptive Resource Discovery for Ubiquitous Computing Rae Harbird Stephen Hailes
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Madhavi W. SubbaraoWCTG - NIST Dynamic Power-Conscious Routing for Mobile Ad-Hoc Networks Madhavi W. Subbarao Wireless Communications Technology Group.
CS 452 – Software Engineering Workshop Acquire-Playing Agent System Group 1: Lisa Anthony Mike Czajkowski Luiza da Silva Winter 2001, Department of Mathematics.
MobiShare: Sharing Context-Dependent Data & Services from Mobile Sources Efstratios Valavanis, Christopher Ververidis, Michalis Vazirgianis, George C.
WAWC’05 Enhancing Mobile Peer-To-Peer Environment with Neighborhood Information Arto Hämäläinen -
Trust Establishment in Pervasive Grid Environments Syed Naqvi, Michel Riguidel TÉLÉCOM PARIS ÉNST É cole N ationale S upérieur des T élécommunications.
Secure communication in cellular and ad hoc environments Bharat Bhargava Department of Computer Sciences, Purdue University This is supported.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
A New Household Security Robot System Based on Wireless Sensor Network Reporter :Wei-Qin Du.
Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Security Models for Trusting Network Appliances From : IEEE ( 2002 ) Author : Colin English, Paddy Nixon Sotirios Terzis, Andrew McGettrick Helen Lowe.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
1 A Novel Mechanism for Flooding Based Route Discovery in Ad hoc Networks Jian Li and Prasant Mohapatra Networks Lab, UC Davis.
THE SECOND LIFE OF A SENSOR: INTEGRATING REAL-WORLD EXPERIENCE IN VIRTUAL WORLDS USING MOBILE PHONES Sherrin George & Reena Rajan.
An Intelligent Broker Architecture for Context-Aware Systems A PhD. Dissertation Proposal in Computer Science at the University of Maryland Baltimore County.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Jakub Szefer, Eric Keller, Ruby B. Lee Jennifer Rexford Princeton University CCS October, 2011 報告人:張逸文.
Social Computing Networks: A New Paradigm for Engineering Pervasive Software Systems Naeem Esfahani Sam Malek 32th International Conference on Software.
MobiQuitous 2004Kimaya Sanzgiri Leveraging Mobility to Improve Quality of Service in Mobile Networks Kimaya Sanzgiri and Elizabeth Belding-Royer Department.
An affinity-driven clustering approach for service discovery and composition for pervasive computing J. Gaber and M.Bakhouya Laboratoire SeT Université.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
UbiStore: Ubiquitous and Opportunistic Backup Architecture. Feiselia Tan, Sebastien Ardon, Max Ott Presented by: Zainab Aljazzaf.
PERVASIVE COMPUTING MIDDLEWARE BY SCHIELE, HANDTE, AND BECKER A Presentation by Nancy Shah.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
A security framework combining access control and trust management for mobile e-commerce applications Gregor v.Bochmann, Zhen Zhang, Carlisle Adams School.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
Mobile Communication Middleware By:Lekometsa Mokhesi Anisa Ragalo Supervisor: Ken Macgregor.
1 BRUSSELS - 14 July 2003 Full Security Support in a heterogeneous mobile GRID testbed for wireless extensions to the.
Semantic Gadgets Pervasive Computing Meets the Semantic Web Reza Zakeri Sharif University of Technology.
August 2015 MODULE 2: COMMUNICATION Public Health Incident Leadership.
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
Computer Science and Engineering 1 Mobile Computing and Security.
November 4, 2003Applied Research Laboratory, Washington University in St. Louis APOC 2003 Wuhan, China Cost Efficient Routing in Ad Hoc Mobile Wireless.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
1 VLM 2 : A Very Lightweight Mobile Multicast System For Wireless Sensor Networks Anmol Sheth, Brian Shucker and Richard Han University of Colorado, Department.
An Intelligent Expert System for Proactive Services Deploying Ubiquitous Computing Technologies IEEE 2005 Proceedings of the 38th Hawaii International.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Semantic Web in Context Broker Architecture Presented by Harry Chen, Tim Finin, Anupan Joshi At PerCom ‘04 Summarized by Sungchan Park
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
STRUDEL: Supporting Trust in the Dynamic Establishment of peering coaLitions April 2006 Daniele Quercia, Manish Lad, Stephen Hailes, Licia Capra, and Saleem.
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
A Low Interference Channel Assignment Algorithm for Wireless Mesh Networks Can Que 1,2, Xinming Zhang 1, and Shifang Dai 1 1.Department of Computer Science.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
National Taiwan University Department of Computer Science and Information Engineering Vinod Namboodiri and Lixin Gao University of Massachusetts Amherst.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
Enforce Collaboration in Mobile Ad Hoc Network Ning Jiang School of EECS University of Central Florida
Presented by Edith Ngai MPhil Term 3 Presentation
Introduction Wireless devices offering IP connectivity
Security Issues.
Giannis F. Marias, Vassileios Tsetsos,
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Mobile Computing.
Mobile ad hoc networking: imperatives and challenges
Presentation transcript:

1 Service Sharing with Trust in Pervasive Environment: Now it’s Time to Break the Jinx Sheikh I. Ahamed, Munirul M. Haque and Nilothpal Talukder Ubicomp Research Lab Ubicomp Research Lab( Department of Mathematics, Statistics and Computer Science Marquette University, Milwaukee, Wisconsin

2 Outline Introduction and background Motivation Trust model Evaluation Conclusion Future work

3 –The number of handheld users will reach 2.6 billion this year and 4 billion by 2010 portable low-cost lightweight devices and emergent short range, and low power wireless communication networks –In USA, seniors over age 65 whose numbers are expected to hit 70 million by 2030, almost doubling from 35 million in 2000 Introduction and background

4 Pervasive Computing What it means – Pervasive computing is the computation that’s freely available everywhere Goals of it – Integrate computing and communications with the surrounding physical environment – Make computing and communication transparent to the users

5 Pervasive Computing Environment (a)Ad hoc network in pervasive environment with powerful device support (b) Ad hoc network in pervasive environment without powerful device support

6 Motivation for trust model Depend on each other for resources –Poor battery power –Small memory storage –Poor computational capability Susceptible and vulnerable to malicious snoopers –Inter-device dependency –Common shared medium –Transitory connectivity –Absence of a fixed trust infrastructure

7 Motivation for trust model : cont. With which node(s) should I interact and with which I do not? –Trust models Responsible for establishing and managing trust relationships Decision-making role in resource sharing Request from unknown device –Decision based on recommendation –Identify malicious recommendation

8 Features of a Trust Model F1. Only valid nodes should be able to take part in any interaction F2. Only authorized nodes should get a requested service F3. A valid node may not be remained valid forever

Why Trust in Access Control Framework Consider a scenario in which node A wants to share or to get access to node B’s resources. The first thing B will do is to reason about the trustworthiness of A. B will accomplish this by analyzing accumulated data from the previous interactions or requesting some recommendations from his trusted parties in the case that A has not had any interactions with B before. There may also be a situation where there might not be enough information to trust, then B has to make his decision based on other variables [1]. 9

Why Trust in Access Control Framework (cont.) Because B cannot also allow access to his resources for an indefinite amount of time, his access policies will be dynamically updated on the information based on trust over time. The service delivery agent running on B will consult the access control to decide on access. If trust values are satisfactory A is immediately provided access. The interaction will also be used to modify the existing trust status of A. 10

11 Trust Framework Two units –Direct Trust Unit Formed through direct interaction experience Behavior model –Evaluate the satisfaction level –Recommended Trust Unit Recommended trust Protocol –Evaluate the recommendations

12 Recommended Trust Active Recommendation –Active recommendation is possible only from neighboring nodes, Passive –the node might consider all path that has hop length >=2. Discrete –When a node can’t reach any path to consider it for recommendation, it needs some way to resolve the issue. That’s what we term discrete recommendation.

13 Hop Based Recommendation Protocol (HBRP) a hop based recommendation protocol to determine trust values to consider a node eligible for access. this protocol actually includes mechanisms for active and passive recommendations. the maximum path length enables a node to avoid a long chain of recommendations. This value is reduced in each hop by 1 and the path is ignored when the field becomes 0.

14 Risk in trust: handling malicious recommendation Sometimes a node is in a scenario where the recommendation value contrasts the current recommendation value. It is a malicious recommendation. There can be two such situations. –a) When a malicious node gives a high recommendation value for a node when the overall value is poor. – b) When a malicious node recommends a very low value contrasting high recommendations from others. We have adopted a statistical method (t-Estimate) to address this issue of malicious recommendation. Our assumption is that the number of benevolent nodes is much larger compared to the number of malicious nodes.

15 Evaluation Implementation of the prototype –Operating system: WINCE –PDA: Axim X50vProcessor –Programming language: VC#.Net Compact Framework –Mobile ad-hoc mode: IEEE b FTM

Screenshots of the Service sharing application based on trust based access control 16

Usability Survey 17

18 Conclusion We presented a trust model to fit the dynamic access control framework intended for pervasive environment. We used this information to optimize the accuracy of the recommendation process and the discarding of malicious devices from the network. The prototype of the secured service sharing application presented in the evaluation section uses this hop-based recommendation protocol. We have incorporated the risks involved in the different sharing scenarios

19 Future work As a continuous addendum to the features, this access control module will be placed in the MARKS (Middleware Adaptability for resource Discovery, Knowledge Usability, and Self Healing) middleware. Apart from security issues in service sharing, our future research lies with privacy issues that may arise due to context-awareness of applications in the pervasive environment

20 Questions Send questions to