Grupo de Ingeniería de Servicios Telemáticos Telematic Services Engineering Group Role of Multiagent System on Minimalist Infrastructure for Service Provisioning.

Slides:



Advertisements
Similar presentations
Robin Kravets Tarek Abdelzaher Department of Computer Science University of Illinois The Phoenix Project.
Advertisements

Wenmao Liu Harbin Institute of Technology China. Outline ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion.
Chris Karlof and David Wagner
Security in Mobile Ad Hoc Networks
Josh Alcorn Larry Brachfeld An in depth review of ad hoc mobile network & cloud security concerns.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
802.11a/b/g Networks Herbert Rubens Some slides taken from UIUC Wireless Networking Group.
MPAC 2004Rae Harbird 1 RUBI Adaptive Resource Discovery for Ubiquitous Computing Rae Harbird Stephen Hailes
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
© 2005 Mobile VCE Securing the Future: Device & Service Security Stephen Hope, FT R&D UK Ltd on behalf of Nigel Jefferies, Vodafone Chair.
Autonomous Mobile Mesh Networks and their Design Changes.
Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University.
Design of Secure and Energy- Efficient Wireless Ad-Hoc Sensor Networks Mukesh Singhal Laboratory For Advanced Networking Department of Computer Science.
An Assessment of Mobile Ad-Hoc Network (MANET) Issues Jerry Usery CS 526 May 12 th, 2008.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Secure Routing in Ad Hoc Wireless Networks
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
1 Secure Zero Configuration in a Ubiquitous Computing Environment Shenglan Hu and Chris J. Mitchell Information Security Group Royal Holloway, University.
Community Manager A Dynamic Collaboration Solution on Heterogeneous Environment Hyeonsook Kim  2006 CUS. All rights reserved.
Mobility in the Virtual Office: A Document-Centric Workflow Approach Ralf Carbon, Gregor Johann, Thorsten Keuler, Dirk Muthig, Matthias Naab, Stefan Zilch.
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 1 Carlos Cordeiro Philips Research North America Briarcliff Manor,
Architecting Secure Mobile P2P Systems James Walkerdine, Peter Phillips, Simon Lock Lancaster University.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
CodeBlue – Wireless Sensor Networks for Emergency Medical Care Matt Welsh, David Malan, Breanne Duncan, and Thaddeus Fulford-Jones Harvard University Steve.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
How Does Topology Affect Security in Wireless Ad Hoc Networks? Ioannis Broustis CS 260 – Seminar on Network Topology.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Presented by: Nandhitha.M Under the guidance of: Mrs. Suma. R Associate profesor and Hod Dept of Computer Science and Engineering.
1 Secure Ad-Hoc Network Eunjin Jung
Wireless Ad-Hoc Networks
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
Presented by: Chaitanya K. Sambhara Paper by: Karl Mayer and Wolfgang Fritsche IABG mbH Germany - Instructor : Dr Yingshu Li.
Argumentation and Trust: Issues and New Challenges Jamal Bentahar Concordia University (Montreal, Canada) University of Namur, Belgium, June 26, 2007.
Ryan Lackey Dynamic Locations: Secure Mobile Services Discovery and Dynamic Group Membership Ryan Lackey
EAACK—A Secure Intrusion-Detection System for MANETs
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Standard: Comparison and Security Jason Gibson TCM471 Professor Crum.
12th International Conference on Artificial Intelligence: Methodology, Systems, Applications (AIMSA 2006) Multiagent Approach for the Representation of.
A security framework combining access control and trust management for mobile e-commerce applications Gregor v.Bochmann, Zhen Zhang, Carlisle Adams School.
Department of Computer Science Southern Illinois University Edwardsville Fall, 2013 Dr. Hiroshi Fujinoki MANET (Mobile Ad-hoc.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
Multi-agent organizations in software engineering Jorge J. Gómez Sanz Grasia! Research group Universidad Complutense de Madrid,
A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks Anand Patwardhan, Anupam Joshi, Tim Finin, and Yelena Yesha Anand Patwardhan.
Riga Technical University Department of System Theory and Design Usage of Multi-Agent Paradigm in Multi-Robot Systems Integration Assistant professor Egons.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
A Quantitative Trust Model for Negotiating Agents A Quantitative Trust Model for Negotiating Agents Jamal Bentahar, John Jules Ch. Meyer Concordia University.
Ad Hoc Network.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Emergency Services Workshop, 21th-24 th of October, Vienna, Austria Page 1 IP-Based Emergency Applications and Services for Next Generation Networks PEACE.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Mobile Computing and Wireless Communication Pisa 26 November 2002 Roberto Baldoni University of Roma “La Sapienza”
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University Australia.
Challenges of Mobile ad-hoc Grids and their Applications in e-Healthcare Zhuoqun Li, Lingfen Sun and Emmanuel C. Ifeachor School of Computing, Communications.
Risk-Aware Mitigation for MANET Routing Attacks Submitted by Sk. Khajavali.
ONTOREST Ontology based integrated disaster response tool Zeynep Sofuoglu MD PhD MSc AAHD / Emergency Ambulance Physicians Association.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Presented by Edith Ngai MPhil Term 3 Presentation
Supporting Mobile Collaboration with Service-Oriented Mobile Units
CHARACTERISTICS.
CSE 4340/5349 Mobile Systems Engineering
Mobile ad hoc networking: imperatives and challenges
Presentation transcript:

Grupo de Ingeniería de Servicios Telemáticos Telematic Services Engineering Group Role of Multiagent System on Minimalist Infrastructure for Service Provisioning in Ad-Hoc Networks for Emergencies Juan R. Velasco, Miguel A. López-Carmona, Marifeli Sedano, Mercedes Garijo, David Larrabeiti, María Calderón

Spanish I+D+i funding  Technical University of Madrid, University Carlos III of Madrid and University of Alcalá  Minimalist Infrastructure for the provision of services in ad-hoc networks  Provision of services in scenarios lacking a fixed communications infrastructure  Cooperation of humans and electronic devices (computers, sensors/actors, robots, intelligent nodes, etc) is paramount.  Emergency management in catastrophes  Forest fire  Terrorist attack  Earthquake IMPROVISA Project

Ad-hoc networks IMPROVISA Project Volunteer Fire fighters Team Fire fighters Team HOSPITAL Ambulance Hospital Police Civil services Emergency 112 Fire fighters Chief Watch Tower Ad-hoc Network Data lines Police

IMPROVISA main domains  Intelligent routing  Security  Ad-hoc semantic network  Multilayer-multipath video distribution IMPROVISA Project

Intelligent Routing  Sending messages between non-interconnected ad- hoc networks IMPROVISA Agents

Security  Ad-hoc networks are more vulnerable than wired networks  Wireless technology  Open and dynamically changing topology  Lack of centralized control points  Special risks in emergency-support scenarios  Main concerns: key distribution and intrusion detection  Traditional centralized approaches not applicable  Need a highly decentralized, autonomous and adaptive solution  Agent-based security framework (confidentiality, authentication...)  Agent- based cooperative IDS IMPROVISA Agents

An ad-hoc semantic network  Agent-based intelligent level to support an ad-hoc semantic network  Devices that form an ad-hoc network (personal devices, car PCs, etc.) need to discover services  Water level, free beds at hospital, oxygen, etc.  With one or more UDDIs in the network  Distributed service location  With no UDDI  Agent context knowledge IMPROVISA Agents

Multilayer-multipath video distribution  Video images need to be transmitted  We will use a multilayer-multipath approach  Video information is divided in layers  Not all layers are needed  Different layers travel through different paths  Multi-agent systems may be used to support path decision IMPROVISA Agents

Conclusions  We propose the use of ad-hoc networks, formed by personal devices, car PC’s… and some fixed lines to contact external services (hospital, police headquarters, etc.)  Multi-agent systems will be used to provide most of the main needs of the project  Intelligent information routing  Security  Service discovery  Video transmision IMPROVISA Project

Grupo de Ingeniería de Servicios Telemáticos Telematic Services Engineering Group Role of Multiagent System on Minimalist Infrastructure for Service Provisioning in Ad-Hoc Networks for Emergencies Miguel A. López-Carmona