1/19 DIANE Project Philipp Obreiter, Birgitta König-Ries, Michael Klein Stimulating Cooperative Behavior of Autonomous.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
P: 1 / 24 Situated and Autonomic Communications FET Integrated Project CASCADAS ( Mécanismes de sécurité et de coopération entre.
Stimulation for Cooperation in Ad Hoc Networks: Beyond Nuglets Levente Buttyán, Jean-Pierre Hubaux, and Naouel Ben Salem Swiss Federal Institute of Technology.
© 2004 Mobile VCE 3G © 2004 Mobile VCE 3G th October 2004 Regional Blackouts: Protection of Broadcast.
1/17 DIANE Project Betreuer: Birgitta König-Ries, Michael Klein An approach to Support Service Discovery in Mobile.
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
DIANE Project Michael Klein, Birgitta König-Ries Multi-Layer Clusters in Ad-hoc Networks - An Approach to Service.
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
1 Michael Klein Questions for the First AKT Workshop on Semantic Web Services Birgitta König-Ries, Michael Klein DIANE Project ICS, University of Jena,
1/12 Project DIANE: Project KRASH: A Taxonomy of Incentive Patterns - The Design.
1/18 Philipp Obreiter 1, Birgitta König-Ries 2, Georgios Papadopoulos 1 Engineering Incentive Schemes for Ad Hoc.
The Buddy System : A Distributed Reputation System Based on Social Structure Universität Karlsruhe Stefan Fähnrich 1, Philipp Obreiter 1, Birgitta König-Ries.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Mitigating routing misbehavior in ad hoc networks Mary Baker Departments of Computer Science and.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
1/16 DIANE Project Philipp Obreiter, Michael Klein Vertical Integration of Incentives for Cooperation Universität.
An Architecture for Dynamic Trust Monitoring in Mobile Networks Onolaja Olufunmilola, Rami Bahsoon, Georgios Theodoropoulos School of Computer Science.
Motivating Corporation in Mobile Ad Hoc Networks: A Step Forward
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
1/17 DIANE Project Birgitta König-Ries, Michael Klein Information Services to Support E-Learning in Ad-hoc Networks.
1 Michael Klein et al., Universität Karlsruhe, Germany Stepwise Refinable Service Descriptions: Adapting DAML-S to Staged Service Trading 1st International.
1 Secure Zero Configuration in a Ubiquitous Computing Environment Shenglan Hu and Chris J. Mitchell Information Security Group Royal Holloway, University.
1/16 DIANE Project Philipp Obreiter A Case for Evidence-Aware Distributed Reputation Systems Overcoming the Limitations.
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 1 Carlos Cordeiro Philips Research North America Briarcliff Manor,
Patterns for Secure Boot and Secure Storage in Computer Systems By: Hans L¨ohr, Ahmad-Reza Sadeghi, Marcel Winandy Horst G¨ortz Institute for IT Security,
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
Ad Hoc Networks Curtis Bolser Miguel Turner Kiel Murray.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
UbiStore: Ubiquitous and Opportunistic Backup Architecture. Feiselia Tan, Sebastien Ardon, Max Ott Presented by: Zainab Aljazzaf.
ITEC 810 – Project Unit Trustworthy Sensor Networks Daniel Aegerter, Supervisor: Rajan Shankaran.
SWIM-SUIT Information Models & Services
MobileMan IAB Meeting CORE: Design, Test-bed and Dissemination Pietro Michiardi Institut Eurecom.
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Adapted from the original presentation made by the authors Reputation-based Framework for High Integrity Sensor Networks.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
NGMAST 2008 A Proactive and Distributed QoS Negotiation Approach for Heterogeneous environments Anis Zouari, Lucian Suciu, Jean Marie Bonnin, and Karine.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Jini Architectural Overview Li Ping
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Security and Cooperation in Ad Hoc Networks Gaia Maselli IIT - CNR
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University Australia.
Secure middleware patterns E.B.Fernandez. Middleware security Architectures have been studied and several patterns exist Security aspects have not been.
Computer Science and Engineering 1 Mobile Computing and Security.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
1/8 Project DIANE: How Social Structure Improves Distributed Reputation Systems Three Hypotheses Universität Karlsruhe.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Towards a High Performance Extensible Grid Architecture Klaus Krauter Muthucumaru Maheswaran {krauter,
Indian Institute Of Technology, Delhi Page 1 Enhancements in Security, Performance Modeling and Optimization in Vehicular Networks Ashwin Rao 2006SIY7513.
Enforce Collaboration in Mobile Ad Hoc Network Ning Jiang School of EECS University of Central Florida
Giannis F. Marias, Vassileios Tsetsos,
Understanding the OSI Reference Model
Environment-Aware Reputation Management for Ad Hoc Networks
Authors: Chun-Ta Li and Min-Shiang Hwang Reporter: Chun-Ta Li (李俊達)
Protocols.
Cross-layer Analysis for detecting Wireless Misbehavior
Protocols.
Presentation transcript:

1/19 DIANE Project Philipp Obreiter, Birgitta König-Ries, Michael Klein Stimulating Cooperative Behavior of Autonomous Devices An Analysis of Requirements and Existing Approaches Universität Karlsruhe Institute for Program Structures und Data Organization Universität Karlsruhe GERMANY The Second International Workshop on Wireless Information Systems April 2003 – Angers, France

2/19 Absence of Infrastructure

3/19 Autonomy Autonomous devices devices are free to cooperate or not Sound assumption tampered devices re-engineered protocol stacks absence of an enforcing authority Devices tend to be uncooperative scarceness of resources (e.g. battery power)  cooperative behavior must be stimulated

4/19 Overview Cooperation and uncooperative behavior Issues for Incentive Schemes Existing Incentive Schemes

5/19 Conceptual Layering Application Discovery Transport Network Link User Interface Application Discovery Transport Network Link User Interface device Adevice B autonomy border

6/19 Elementary Cooperation PrincipalAgent action remuneration service ConsumerProvider check Application Layer forwarding SenderRouter reputation Network Layer

7/19 Taxonomy of Uncooperative Behavior lavish behaviorselfish behavior by agentby principal malicious behavior unprofitableprofitable profitable misbehavior misbehaviorvenial noncooperation reasonableunreasonable uncooperative behavior

8/19 Exemplification of Uncooperative Behavior Application Discovery Transport Network Link User Interface Application Discovery Transport Network Link User Interface Dropping packets under heavy load  venial noncooperation Application Network Transport Discovery DoS attack  malicious behavior Drop other devices' advertisements  selfish behavior Wastefully consume other devices' services  lavish behavior

9/19 Incentive Schemes Incentive Scheme set of mechanisms that restrict misbehavior exempt venial noncooperation from punishment Current approaches for Ad Hoc Networks TermiNodes Sprite APE RPG Watchdog/Pathrater CONFIDANT CORE

10/19 Issues for Incentive Schemes Trust Transactions Remuneration types

11/19 Incentive Scheme Issues: (1) Trust Trust prerequisite for remuneration mechanisms an incentive for cooperation Static Trust certification of an entity's trustworthiness requires cryptographic infrastructure Dynamic Trust arises from prior experiences need for reputation management considers behavioral change

12/19 Incentive Scheme Issues: (2) Transactions Transaction encompasses elementary cooperation agent executes action iff principal remunerates agent Negotiation phase agreement on the action and remuneration determined by the respective cost/profit ratios Processing phase assertion of atomicity seems daunting approximated atomicity by interleaving action and remuneration efficient low value transactions by aggregating actions and remunerations

13/19 Incentive Scheme Issues: (3) Remuneration Remuneration type different types have been proposed most popular types checks, e.g., TermiNodes reputation, e.g., Marti et al 2000 Transferability passing on checks disseminating reputation Convertibility cashing checks reconciling user and device views of reputation

14/19 Account Based Incentive Schemes: Properties Remuneration mechanism every entity possesses an account accounts stored on virtual banks principal issues a check agent accesses a virtual bank in order to credit its account Implementation requires static trust mechanisms virtual banks managed by dedicated devices banker nodes accessibility? accounts distributed to account holders tamper resistant hardware

15/19 Classification (1) Approach Properties Termi- Nodes SpriteAPE Scope Coop. domainN/T N Selfishnessyes Lavishnessyes Maliciousnessyes- Remuneration typechecks Transferability/ Dissemination yes-- Convertibility-yes Sniffing--- Truststatic Implemen- tation Tamper resistance security modules -- Cryptographic infrastructure public key Trans- action Negotiationyes- Processingaction/remuneration Flex. remunerationyes

16/19 Reputation Based Incentive Schemes: Properties Remuneration mechanism principal adapts agent's reputation according to its action agent might decrease principal's reputation agent only cooperative if principal has good reputation Implementation couple trust and remuneration local views of reputation may be kept local shared, i.e., disseminated increases effectiveness introduces further opportunities for misbehavior requires stable or localized cooperation patterns

17/19 Classification (2) Approach Properties Termi- Nodes SpriteAPERPG Watchdog / Pathrater CON- FIDANT CORE Scope Coop. domainN/T NNNNN Selfishnessyes - Lavishnessyes ---- Maliciousnessyes- - - Remuneration typechecksreputation Transferability/ Dissemination yes--- only positive Convertibility-yes ---- Sniffing----yes Truststaticdynamic Implemen- tation Tamper resistance security modules Cryptographic infrastructure public key ---- Trans- action Negotiationyes Processingaction/remuneration Flex. remunerationyes ----

18/19 Conclusion Summary cooperation beyond autonomy borders requires stimulation cooperation of protocol entities on different layers taxonomy and exemplification of uncooperative behavior discussion of incentive schemes trust transactions remuneration classification of existing approaches for ad hoc networks account vs. reputation based Future work incentive scheme for the discovery and application layer analysis of suitable remuneration types integration of incentive schemes

19/19 Thank you! More information on our project web page: Are there any questions? Thank you for your attention!

20/19 Matching Remuneration Types to Layers