A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks Anand Patwardhan, Anupam Joshi, Tim Finin, and Yelena Yesha Anand Patwardhan.

Slides:



Advertisements
Similar presentations
Wenmao Liu Harbin Institute of Technology China. Outline ITS & VANETs Security Issues and Solutions An autonomous architecture Conclusion.
Advertisements

Chris Karlof and David Wagner
Distributed Systems Major Design Issues Presented by: Christopher Hector CS8320 – Advanced Operating Systems Spring 2007 – Section 2.6 Presentation Dr.
The Sybil Attack By John R. Douceur Presented by Samuel Petreski March 31, 2009.
1 Programa de Engenharia Elétrica - PEE/COPPE/UFRJ Universidade Federal do Rio de Janeiro A Review of Anomalies Detection Schemes for Smart Grids Andrés.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
BILL WHITE Presents… VEHICULAR NETWORKING: A SURVEY AND TUTORIAL ON REQUIREMENTS, ARCHITECTURES, CHALLENGES, STANDARDS, AND SOLUTIONS GEORGIO KARAGIANNIS.
A Mobile Ad hoc Biosensor Network Muzammil KP S7,ECE Govt. Engg. College, Wayanad.
Wireless Sensor Networks Craig Ulmer. Background: Sensor Networks n Array of Sensor Probes ( ) n Collect In-Situ Data about Environment n Wireless.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
Madhavi W. SubbaraoWCTG - NIST Dynamic Power-Conscious Routing for Mobile Ad-Hoc Networks Madhavi W. Subbarao Wireless Communications Technology Group.
Some contributions to the management of data in grids Lionel Brunie National Institute of Applied Science (INSA) LIRIS Laboratory/DRIM Team – UMR CNRS.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
overview Motivation Ongoing research on VANETs Introduction Objectives Applications Possible attacks Conclusion.
Securing Vehicular Commuinications – Assumptions, Requirements, and Principles P. Papadimitratos, EPFL, Lausanne, Switzerland V. Gligor, University of.
Secure communication in cellular and ad hoc environments Bharat Bhargava Department of Computer Sciences, Purdue University This is supported.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Grupo de Ingeniería de Servicios Telemáticos Telematic Services Engineering Group Role of Multiagent System on Minimalist Infrastructure for Service Provisioning.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
An Architecture for Dynamic Trust Monitoring in Mobile Networks Onolaja Olufunmilola, Rami Bahsoon, Georgios Theodoropoulos School of Computer Science.
InVANET(Intelligent Vehicular Ad Hoc Network
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Wireless Sensor Network Security Anuj Nagar CS 590.
CS Dept, City Univ.1 Research Issues in Wireless Sensor Networks Prof. Xiaohua Jia Dept. of Computer Science City University of Hong Kong.
MOCA : Mobile Certificate Authority for Wireless Ad Hoc Networks The 2nd Annual PKI Research Workshop (PKI 2003) Seung Yi, Robin Kravets September. 25,
CSI5175 Wireless and Mobile Electronic Commerce Networks and their Applications Mao Zhang Wireless Hotspots: Current Challenges and Future Directions.
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 1 Carlos Cordeiro Philips Research North America Briarcliff Manor,
Privacy Issues in Vehicular Ad Hoc Networks.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
KAIS T Decentralized key generation scheme for cellular-based heterogeneous wireless ad hoc networks 임 형 인 Ananya Gupta, Anindo Mukherjee, Bin.
HYBRID ROUTING PROTOCOL FOR VANET
IGERT: Graduate Program in Computational Transportation Science Ouri Wolfson (Project Director) Peter Nelson, Aris Ouksel, Robert Sloan Piyushimita Thakuriah.
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Computer Science and Engineering 1 Information Assurance Research Department of Computer Science and Engineering University of South Carolina, Columbia.
Disseminating Traffic Data over Vehicles on Road  A Preliminary Proposal to the ITA Demo Project Presented by Bo Xu.
Adapted from the original presentation made by the authors Reputation-based Framework for High Integrity Sensor Networks.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
1 An Information Propagation Scheme for VANETs 學生: 簡志閔 彭彥能 黃尚文 Thomas D.C. Little, Senior Member, IEEE, and Ashish Agarwal,
High-integrity Sensor Networks Mani Srivastava UCLA.
SAFENET The OSU SAFENET Project The Ohio State University Center for Automotive Research & Center for Intelligent Transportation Research.
Vehicular Cloud Networking: Architecture and Design Principles
Ad Hoc Network.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Olga Ratsimor Vladimir Korolev Anupam Joshi Timothy Finin Department of Computer Science and Electrical Engineering University of Maryland Baltimore County.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University Australia.
Computer Science and Engineering 1 Mobile Computing and Security.
Mobile Systems Availability Integrity and Confidentiality MoSAIC M.O.Killijian, D.Powell, M.Banâtre, P.Couderc, Y.Roudier LAAS-CNRS - IRISA- Eurécom.
Wireless Ad Hoc Networks
Wireless Mesh Networks Myungchul Kim
The Sybil attack “One can have, some claim, as many electronic persons as one has time and energy to create.” – Judith S. Donath.
1 Vehicular Networks Slides are integrated from researchers at EPFL.
Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Thomas Repantis Vana Kalogeraki Department of Computer Science & Engineering University.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
Presented by Edith Ngai MPhil Term 3 Presentation
Intrusion Tolerant Architectures
Ad hoc Data Dissemination in Vehicular Networks
CSE 4340/5349 Mobile Systems Engineering
Dipanjan Chakraborty Anupam Joshi CSEE University of Maryland Baltimore County Anamika: Distributed Service Discovery and Composition Architecture for.
Doctoral Dissertation Research Proposal
Vehicular Ad-hoc Networks
Wireless Ad Hoc Networks
Developing Vehicular Data Cloud Services in the IoT Environment
Cross-layer Analysis for detecting Wireless Misbehavior
Presentation transcript:

A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks Anand Patwardhan, Anupam Joshi, Tim Finin, and Yelena Yesha Anand Patwardhan Doctoral Candidate Department of Computer Science and Electrical Engineering University of Maryland Baltimore County Anand Patwardhan Doctoral Candidate Department of Computer Science and Electrical Engineering University of Maryland Baltimore County V2VCOM 2006

Outline Data management in VANETs Security perspective Trust-based security Distributed data-intensive reputation management Algorithm for screening data Simulation results

GPS satellite Onboard Computer with various sensors: GPS location Cameras Engine Condition Tire pressure etc. Localized and distributed Wireless Access points Various forms of connectivity GPS Localized Info-Stream Services Situation Awareness allows Adaptation Location & directions GSM, GPRS, EDGE, E-VDO WiMax Hazard warnings, Detours, Inclement weather, Road conditions, Traveler info. VANET connectivity Update propagation

Objectives Situation awareness for smart-vehicles adapt to current conditions optimal utilization of surface transport infrastructure Provisioning context sensitive travel information locally and directly a growing need to provide context-sensitive information to mobile handheld devices and car-computers with travel related information) Distributed control and fault tolerance ensure continued functioning in face of infrastructure failures arising from natural calamities or terrorist attacks Prevalent Enabling Technologies Smart cars with arrays of sensors (GPS, cameras, etc.) Multimodal wireless communication (GSM, WiFi etc.) Distributed sensor networks embedded in the transport infrastructure

Background Highly dynamic conditions Lack of centralized trust authority Data and security guarantees Information processing and decision making Distributed collaborative processes Softer security guarantees Trust based security

Dynamic conditions Network Mobility of devices Arbitrary topologies Limited connectivity Mobility Time frames important (message transmission and surface velocity) Radio ranges, interference, and obstructions Environment Road conditions, congestion, inclement weather, hazards etc.

Trust and Risk Management Conventional PKI, variants, or Web-of-Trust (PGP) infeasible Limited connectivity I&A difficult No guarantees of intent Security properties Confidentiality, integrity – cryptographic methods Availability – multiple sources, epidemic updates Reliability of source? Malicious entities, selfish-interest, non-cooperative nodes?

VANET Security Perspective Data Authenticity, reliability (quality), and timeliness Network Reliable routes Cooperative and trustworthy peers Intrusion and fault resilience Identification and Authentication Unique persistent identifiers (e.g. SUCVs) Decentralized reputation management

Examples of collaborative processes Routing On demand route setup Maintenance Data dissemination Relay data packets for others Caching Intrusion detection Reputation management Service discovery

Stimulating collaboration Cost of collaboration Storage Communication Reputation management Self-interest What is the payoff? (incentives) Higher availability (cooperation) Improved response times Reliability Reciprocity (tit-for-tat) Avenues for recourse

Data dissemination model Anchored sources (trusted) carousel information updates Mobile devices propagate these further via epidemic updates (collaboration) Burden of collecting relevant information and verifying it is placed on the consumer devices Validation of data is achieved either Trusted source (trivial case) Agreement Post-validation by trusted source

Segment validation algorithm

Simulation setup Glomosim v Transmission range 100m Simulated area: Dupont Circle, Washington DC Geographic area of 700m by 900m Mobility speeds 15 to 25 m/s Pause times of 0 to 30 s 38 anchored resources (trusted) 50 to 200 mobile devices (vehicles) Simulation time: 30 mins

Simulated area

Autonomous and Assisted Trusted sources only Trusted sources and assisted

Validated segments

Effect of malicious nodes 0% malicious 30% malicious 60% malicious

Ongoing and Future work Distributed data-intensive reputation management Trust relationships built using persistent identities for further trustworthy collaboration: Basis for Distributed intrusion detection Service discovery Reciprocative/adaptive levels of cooperation Contention management Adaptive radio-ranges to increase throughput

Questions?