Mobile Systems Availability Integrity and Confidentiality MoSAIC M.O.Killijian, D.Powell, M.Banâtre, P.Couderc, Y.Roudier LAAS-CNRS - IRISA- Eurécom.

Slides:



Advertisements
Similar presentations
Perspective on Overlay Networks Panel: Challenges of Computing on a Massive Scale Ben Y. Zhao FuDiCo 2002.
Advertisements

Trust Management of Services in Cloud Environments:
Microsoft A Vision for Health. Consumerism/ Choice A Challenging World Public Health Healthcare spend increasing as % of GDP spend Increasing social cost.
Josh Alcorn Larry Brachfeld An in depth review of ad hoc mobile network & cloud security concerns.
SCENARIO Suppose the presenter wants the students to access a file Supply Credenti -als Grant Access Is it efficient? How can we make this negotiation.
Group #1: Protocols for Wireless Mobile Environments.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
Gefördert durch das Kompetenzzentrenprogramm DI Alfred Wertner 19. September 2014 Ubiquitous Personal Computing © Know-Center Security.
Trust Establishment in Pervasive Grid Environments Syed Naqvi, Michel Riguidel TÉLÉCOM PARIS ÉNST É cole N ationale S upérieur des T élécommunications.
1 Sensor Networks and Networked Societies of Artifacts Jose Rolim University of Geneva.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 3: Trust assumptions and.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Grids and Grid Technologies for Wide-Area Distributed Computing Mark Baker, Rajkumar Buyya and Domenico Laforenza.
A Study on Mobile P2P Systems Hongyu Li. Outline  Introduction  Characteristics of P2P  Architecture  Mobile P2P Applications  Conclusion.
Cloud Usability Framework
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
N. GSU Slide 1 Chapter 04 Cloud Computing Systems N. Xiong Georgia State University.
Mobile Computing: Wireless Mesh and Sensor Networks Thomas Kunz Professor and Director Technology Innovation Management Program Carleton University.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
On P2P Collaboration Infrastructures Manfred Hauswirth, Ivana Podnar, Stefan Decker Infrastructure for Collaborative Enterprise, th IEEE International.
© Hitachi Data Systems Corporation All rights reserved HDS Global Account and Global Systems Integrator Customer Community January 23, 2014.
Network of Excellence in Internet Science Network of Excellence in Internet Science (EINS) Joint Workshop and 4 th Plenary Meeting Bologna June 13, 2014.
1 MSCS 237 Communication issues. 2 Colouris et al. (2001): Is a system in which hardware or software components located at networked computers communicate.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
Linked-data and the Internet of Things Payam Barnaghi Centre for Communication Systems Research University of Surrey March 2012.
PERVASIVE COMPUTING MIDDLEWARE BY SCHIELE, HANDTE, AND BECKER A Presentation by Nancy Shah.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009.
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
ACM 511 Introduction to Computer Networks. Computer Networks.
Fault Tolerance David Powell LAAS-CNRS, Toulouse.
Copyright: NOMAD IST NOMAD Integrated Networks for Seamless and Transparent Service Discovery.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
GRID ARCHITECTURE Chintan O.Patel. CS 551 Fall 2002 Workshop 1 Software Architectures 2 What is Grid ? "...a flexible, secure, coordinated resource- sharing.
Master Course /11/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science (INSA)
A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks Anand Patwardhan, Anupam Joshi, Tim Finin, and Yelena Yesha Anand Patwardhan.
1 Service Sharing with Trust in Pervasive Environment: Now it’s Time to Break the Jinx Sheikh I. Ahamed, Munirul M. Haque and Nilothpal Talukder Ubicomp.
Lecture 24 Wireless Network Security
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Ashley White.  Computing that is made to be found anywhere and everywhere.  A high degree of communication among devices and sensors through a ubiquitous.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
UBICOMP SYSTEMS: TOPICS & CHALLENGES. New computing model  Heterogeneous devices  Interaction:  Many-to-many  Possibly implicit, invisible, through.
Mobile Computing and Wireless Communication Pisa 26 November 2002 Roberto Baldoni University of Roma “La Sapienza”
Sponsored by the U.S. Department of Defense © 2008 by Carnegie Mellon University page 1 Pittsburgh, PA The Implications of a Single Mobile Computing.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
Computer Science and Engineering 1 Mobile Computing and Security.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #25 Dependable Data Management.
E-COMMERCE & MOBILE COMPUTING. On Technicals… Considerations for evaluating platform Ecommerce Applications Development Process Integration Options Middlewares.
Rights Management for Shared Collections Storage Resource Broker Reagan W. Moore
A Study of Context-Awareness: The Context Fusion Network, The Context Fabric Presented by Sangkeun Lee IDS Lab., Seoul National University Solar:
Challenges of Mobile ad-hoc Grids and their Applications in e-Healthcare Zhuoqun Li, Lingfen Sun and Emmanuel C. Ifeachor School of Computing, Communications.
Fuego Core 2005/7 Possible Directions Kimmo Raatikainen Principal Scientist Helsinki Institute for Information Technology
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
Presented by Edith Ngai MPhil Term 3 Presentation
Some Issues in MANET, Wireless & Cellular Security/Privacy
Similarities between Grid-enabled Medical and Engineering Applications
Mobile Agents.
BluSync by ParaBlu Offers Secure Enterprise File Collaboration and Synchronization Solution That Uses Azure Blob Storage to Enable Secure Sharing MICROSOFT.
Presentation transcript:

Mobile Systems Availability Integrity and Confidentiality MoSAIC M.O.Killijian, D.Powell, M.Banâtre, P.Couderc, Y.Roudier LAAS-CNRS - IRISA- Eurécom

Context 3 year project, 3 partners: LAAS, Eurécom, IRISA  Officially started September 2004  Funded by French Ministry of Research Spontaneous Information Systems (SIS)  Wireless enabled PDAs  Mobile AdHoc Networks (MANETs)  Peer-to-peer model of interactions New means to enforce  Availability  Confidentiality  Integrity  Privacy Dependability and Security

Context Many research works targeting the network level  Routing  Medium Access Control We focus on the middleware level  Higher level notions/mechanisms Right place for dependability mechanisms  Access to the application context App. dependent recovery (partition/disconnection)  Collaborative Backup of Critical Data

Scenario Alice is going to a symposium

Scenario Alice meets new people and colleagues

Scenario Alice produces data and breaks her PDA

Scenario But she gets a new PDA and is able to restore her data

Challenges for Dependability Intermittent access to infrastructure No prior organization Ephemeral interactions User transparency Private sensitive data Limited energy, computation and storage

Goals Design and develop  new mechanisms for the tolerance of accidental faults malicious faults  without usual strong assumptions synchronous communication global clocks infrastructure New middleware for dependable mobile systems

Collaborative critical data backup Issues  Resource allocation/discovery  Garbage collection of obsolete backups  Integrity and confidentiality of data  Resilience to DoS (selfishness or maliciousness)  Negotiation between mutually suspicious peer devices (no prior trust relationship) Hints  Fragmentation-Redundancy-Dissemination  Peer-to-peer  Mobility for dissemination

Issues  Resource allocation/discovery  Garbage collection of obsolete backups  Integrity and confidentiality of data  Resilience to DoS (selfishness or maliciousness)  Negotiation between mutually suspicious peer devices (no prior trust relationship) Hints  Fragmentation-Redundancy-Dissemination  Peer-to-peer  Mobility for dissemination Collaborative critical data backup

Trust management for collaborative services Issues  No prior trust relationship  Protect from and identify malicious devices  Accountability, privacy, integrity,confidentiality Hints  Self-carried reputation  Currency-based incentives  Hybrids

Collaborative Backup for Ubiquitous Computing Transparent distributed backup of critical data for mobile systems over wireless communications  Inspired by peer-to-peer techniques  Fragmentation-Redundancy-Dissemination based No-prior trust relationship  Automated resource discovery and negotiation  E-cash and reputation schemes Privacy  Tamper-proof hardware/trust core  Identity management (authentication, multiple IDs, etc.)

Mobile Systems Availability Integrity and Confidentiality MoSAIC