Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Science and Engineering 1 Mobile Computing and Security.

Similar presentations


Presentation on theme: "Computer Science and Engineering 1 Mobile Computing and Security."— Presentation transcript:

1 Computer Science and Engineering 1 Mobile Computing and Security

2 Mobile Devices Traditional computing and networking vs. mobile devices (smart phones, internet tables, etc.) Widely accepted consumerization: individuals and organizations Huge amount of sensitive data (personal and corporate) Security and privacy threats Computer Science and Engineering 2

3 Trust Management for Mobile Ad-Hoc Networks Mobile Ad-hoc networks: –Increased connectivity –Improved information sharing –Collaboration, distributed decision making Issues: –Temporary network –Resource constraints: bandwidth, battery life, memory, etc. –Openness, rapid changes, hostile environment –Trust in the components Computer Science and Engineering 3

4 What is Trust? Degree of subjective belief about the behaviors of a particular entity Trust Management: approach for specifying and interpreting security policies, credentials, and relationships MANET trust issues: establish a network with an acceptable level of trust relationships among the nodes –Trust information gathering –Trust evidence gathering Computer Science and Engineering 4

5 Uncertainty Incomplete evidence Computer Science and Engineering 5

6 Types of Trust Trust in sociology Trust in economics Trust in philosophy Trust in psychology Trust in organizational management Trust in autonomic computing Trust in communications and networking Computer Science and Engineering 6

7 Trust Characteristics Trust should be established based on potential risks Trust should be context-dependent Trust should be based on each party’s own interest Trust is learned Trust may represent system reliability Computer Science and Engineering 7

8 Trust, Trustworthiness, and Risk Computer Science and Engineering 8 Trustworthiness Trust 0.5 1 1 Trust = Trustworthiness Misplaced Trust Misplaced mistrust From: Cho et al., A Survey on Trust Management for Mobile Ad Hoc Networks

9 Risk and Trust Computer Science and Engineering 9 Trust Stake 0.5 1 1 Low risk High risk Medium risk From: Cho et al., A Survey on Trust Management for Mobile Ad Hoc Networks Risk value: determined based on stake Opportunity and positive consequences

10 Trust in MANET Dynamic Subjective Not necessarily transitive Context-dependent Computer Science and Engineering 10

11 Trust vs. Reputation Trust: a node’s belief in the trust qualities of a peer –Emphasizes risk and incentives Reputation: the perception that peers form about a node –Past actions that influence perception Recommendation: an attempt at communicating a party’s reputation from one context to another context Computer Science and Engineering 11

12 Trust Management Approaches Policy-based trust management –Based on strong and objective security schemes –Verifiable properties –Binary decision –E.g., Charles C. Zhang, Marianne Winslett: Distributed Authorization by Multiparty Trust Negotiation Reputation-based trust management –Trust is calculated by collecting, aggregating, and disseminating reputation among the entities –E.g., vendor evaluation for online shopping Computer Science and Engineering 12

13 Trust Management Approaches Evidence-based trust management –Considers anything that proves trust relationships among nodes (e.g., keys, identity, address), or –any evidence that any node can generate (e.g., a challenge and response process) Monitoring-based trust management – Rates the trust level of each participating node based on direct information (e.g., observing the behavior) Computer Science and Engineering 13

14 Trust Management Approaches Certificate-based vs. behavior-based framework – pre-deployment knowledge of trust vs. continuous monitoring (reactive) Hierarchical vs. distributed framework –Hierarchy based on capabilities or level of trust (e.g., certificate authorities, trusted third parties) Computer Science and Engineering 14

15 Attacks on Trust Management Routing based: routing loop attacks, wormhole attacks, blackhole attacks, grayhole attacks Availability: DoS attacks Integrity: false information or false recommendation, incomplete information, packet modification/insertion Authenticity: newcomer attacks, Sybil attacks, replay attacks Other: seective misbehaving attacks, on-off attacks, conflicting behavior attack Computer Science and Engineering 15

16 MANET Trust Management Secure routing Authentication Access control Key management Trust evaluation Trust computation General trust level identification Computer Science and Engineering 16

17 Next Class Web Application Security –The software Computer Science and Engineering 17


Download ppt "Computer Science and Engineering 1 Mobile Computing and Security."

Similar presentations


Ads by Google