Design and Simulation of Trust Management Techniques for a Coalition Data Sharing Environment Dr.Bhavani Thuraisingham Srinivasan Iyer The University of.

Slides:



Advertisements
Similar presentations
BY PAYEL BANDYOPADYAY WHAT AM I GOING TO DEAL ABOUT? WHAT IS AN AD-HOC NETWORK? That doesn't depend on any infrastructure (eg. Access points, routers)
Advertisements

TI: An Efficient Indexing Mechanism for Real-Time Search on Tweets Chun Chen 1, Feng Li 2, Beng Chin Ooi 2, and Sai Wu 2 1 Zhejiang University, 2 National.
TDMA Scheduling in Wireless Sensor Networks
Access 2007 Product Review. With its improved interface and interactive design capabilities that do not require deep database knowledge, Microsoft Office.
Brent Dingle Marco A. Morales Texas A&M University, Spring 2002
A Trust Based Assess Control Framework for P2P File-Sharing System Speaker : Jia-Hui Huang Adviser : Kai-Wei Ke Date : 2004 / 3 / 15.
Multiple Sender Distributed Video Streaming Thinh Nguyen, Avideh Zakhor appears on “IEEE Transactions On Multimedia, vol. 6, no. 2, April, 2004”
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Application-Layer Anycasting: A Server Selection Architecture and Use in a Replicated Web Service IEEE/ACM Transactions on Networking Vol.8, No. 4, August.
1 A Scalable Content- Addressable Network S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker Proceedings of ACM SIGCOMM ’01 Sections: 3.5 & 3.7.
1 Distributed Scheduling In Sombrero, A Single Address Space Distributed Operating System Milind Patil.
RETSINA: A Distributed Multi-Agent Infrastructure for Information Gathering and Decision Support The Robotics Institute Carnegie Mellon University PI:
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Delivery, Forwarding, and Routing
Wide-area cooperative storage with CFS
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
Extended Role Based Access Control – Based Design and Implementation for a Secure Data Warehouse Dr. Bhavani Thuraisingham Srinivasan Iyer.
Understanding Android Security Yinshu Wu William Enck, Machigar Ongtang, and PatrickMcDaniel Pennsylvania State University.
New Protocols for Remote File Synchronization Based on Erasure Codes Utku Irmak Svilen Mihaylov Torsten Suel Polytechnic University.
Agent-based Device Management in RFID Middleware Author : Zehao Liu, Fagui Liu, Kai Lin Reporter :郭瓊雯.
Slide 1 Using Models Introduced in ISA-d Standard: Security of Industrial Automation and Control Systems (IACS) Rahul Bhojani ISA SP99 WG4 Meeting.
1 Confidentiality and Trust Management in a Coalition Environment Lecture #11 Dr. Bhavani Thuraisingham February 13, 2008 Data and Applications Security.
Mobile Agent Technology for the Management of Distributed Systems - a Case Study Claudia Raibulet& Claudio Demartini Politecnico di Torino, Dipartimento.
1 MEDICAL ERROR REPORTING AND ANALYSIS Vijaya Gotla UmaDevi Bandaru Lavanya Gundamaraju.
“Intra-Network Routing Scheme using Mobile Agents” by Ajay L. Thakur.
Evaluation and Testbed Development Bhavani Thuraisingham The University of Texas at Dallas Jim Massaro and Ravi Sandhu.
March 6th, 2008Andrew Ofstad ECE 256, Spring 2008 TAG: a Tiny Aggregation Service for Ad-Hoc Sensor Networks Samuel Madden, Michael J. Franklin, Joseph.
Information Operation across Infospheres: Assured Information Sharing Prof. Bhavani Thuraisingham Prof. Latifur Khan Prof. Murat Kantarcioglu Prof. Kevin.
Multimedia Support for Wireless W-CDMA with Dynamic Spreading By Ju Wang Mehmet Ali Elicin And Jonathan C.L. Liu Lecture by Seth Caplan.
Improving Capacity and Flexibility of Wireless Mesh Networks by Interface Switching Yunxia Feng, Minglu Li and Min-You Wu Presented by: Yunxia Feng Dept.
A NAMED DATA NETWORKING FLEXIBLE FRAMEWORK FOR MANAGEMENT COMMUNICATION Authors: Daneil Corjuo and Rui L. Aguiar Ivan Vidal and Jamie Garcia-Reinoso Presented.
1 EnviroStore: A Cooperative Storage System for Disconnected Operation in Sensor Networks Liqian Luo, Chengdu Huang, Tarek Abdelzaher John Stankovic INFOCOM.
Session 2a, 10th June 2008 ICT-MobileSummit 2008 Copyright E3 project, BUPT Autonomic Joint Session Admission Control using Reinforcement Learning.
Switching breaks up large collision domains into smaller ones Collision domain is a network segment with two or more devices sharing the same Introduction.
Assured Information Sharing. Prof. Bhavani Thuraisingham and Prof. Latifur Khan The University of Texas at Dallas Prof. Ravi Sandhu George Mason University.
Content Addressable Network CAN. The CAN is essentially a distributed Internet-scale hash table that maps file names to their location in the network.
A Scalable Content-Addressable Network (CAN) Seminar “Peer-to-peer Information Systems” Speaker Vladimir Eske Advisor Dr. Ralf Schenkel November 2003.
COP 4930 Computer Network Projects Summer C 2004 Prof. Roy B. Levow Lecture 3.
13 Step Approach to Network Design Steps A Systems Approach 8Conduct a feasibility Study 8Prepare a plan 8Understand the current system 8Design.
A Distributed Coordination Framework for Wireless Sensor and Actor Networks Tommaso Melodia, Dario Pompili, Vehbi C.Gungor, Ian F.Akyildiz (MobiHoc 2005)
Final Presentation Avilés-Angélica, Blanco-Alberto, Fuentes-Alba, Pell-Xavier, Schenini-Juan, Talukder-Nurul.
Contents  Teleoperated robotic systems  The effect of the communication delay on teleoperation  Data transfer rate control for teleoperation systems.
Multi-channel Wireless Sensor Network MAC protocol based on dynamic route.
Chapter 21 Multicast Routing
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
A Pseudo Random Coordinated Scheduling Algorithm for Bluetooth Scatternets MobiHoc 2001.
A Mechanism for Communication- Efficient Broadcast Encryption over Wireless Ad Hoc Networks Johns Hopkins University Department of Computer Science Reza.
2/14/2016  A. Orda, A. Segall, 1 Queueing Networks M nodes external arrival rate (Poisson) service rate in each node (exponential) upon service completion.
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Cyber Security Research on Engineering Solutions Dr. Bhavani.
Antidio Viguria Ann Krueger A Nonblocking Quorum Consensus Protocol for Replicated Data Divyakant Agrawal and Arthur J. Bernstein Paper Presentation: Dependable.
Speaker : 童耀民 MA1G /3/21 1 Authors: Phone Lin and Pai-Chun Chung, National Taiwan University Yuguang Fang, University of Florida.
Distributed, Self-stabilizing Placement of Replicated Resources in Emerging Networks Bong-Jun Ko, Dan Rubenstein Presented by Jason Waddle.
CSMA/CA Simulation  Course Name: Networking Level(UG/PG): UG  Author(s) : Amitendu Panja, Veedhi Desai  Mentor: Aruna Adil *The contents in this ppt.
1 Chapter 11 Global Properties (Distributed Termination)
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Intelligent Agents: Technology and Applications Unit Five: Collaboration and Task Allocation IST 597B Spring 2003 John Yen.
Understanding Android Security
Trustworthiness Management in the Social Internet of Things
OSPF (Open Shortest Path First)
Wireless Sensor Network Architectures
Lec3: Network Management
ECE 544 Protocol Design Project 2016
Assoc. Prof. Dr. Syed Abdul-Rahman Al-Haddad
Switching Techniques.
Delivery, Forwarding, and Routing of IP Packets
Understanding Android Security
Dynamic Routing Protocols part3 B
Lec1: Introduction to Network Management
Presentation transcript:

Design and Simulation of Trust Management Techniques for a Coalition Data Sharing Environment Dr.Bhavani Thuraisingham Srinivasan Iyer The University of Texas at Dallas

Objectives Our objectives are to simulate a Multi agent system for information sharing with confidentiality and trust Management. Calculate the amount of data lost and gained by each of the agent.

Outline of the presentation Vision Introduction Definition of an agent Functions of an agent System Architecture Algorithm for Information sharing within confidentiality and trust management Issues in Information sharing Simulation Conclusion

Vision: Assured Information Sharing Publish Data/Policy Component Data/Policy for Agency A Data/Policy for Coalition Publish Data/Policy Component Data/Policy for Agency C Component Data/Policy for Agency B Publish Data/Policy 1.Friendly partners 2.Semi-honest partners 3.Untrustworthy partners Research funded by two grants from AFOSR

Introduction Exciting emerging applications require hundreds or thousands of agents and robots to coordinate to achieve their joint goals. In domains such as military operations, space or disaster response, coordination among large numbers of agents promises to revolutionize the effectiveness of our ability to achieve complex goals.

Introduction (Contd..) Issues in such domains are Limited communication channels No agent can know the entire View of the environment When agent has some information, Should decide who to send it. Broadcasting is not desirable

Introduction (Contd..) Example scenario A Field agent in a military assignment on his route to an operation, observes many battlefield features. It needs to decide which combat group would need the info.

Introduction This project deals with the following How to find which agent needs what information? Is the source agent trustworthy? Is the confidentiality of the information disclosed? Is the receiving agent authorized to get that corresponding information?

Definition of an agent “A software agent is a software with some inbuilt functionalities that interacts with other software agents and perform the allocated task based on the rules that govern them.”

Functions of an agent Insight of changing environment Action required for the change Reason to the action taken Solution for the problem Draw Inferences and perform decision tree for future use.

System Architecture Multi Agent Network is similar to peer to peer communication. Each autonomous system in the network is an agent. Each agent knows its direct acquaintance alone. (Acquaintance – neighbor) All agents have their own set of information that they are going to share with the other agents

System Architecture

In the following slides we will discuss about Confidentiality Trust Management

Confidentiality All the information have a confidentiality level linked to them. Agents can gain access to the information based on their level of trust. Four levels of Domains Denoted by D1, D2, D3 and D4 D1< D2 < D3 < D4. Domains to maintain confidentiality. Confidentiality is linked with the information. Based on the trust level domain access changes.

Trust Management Trust in Agents are mainly based on the quality of the information they provide. There is also a trust table linked with each agent for all acquaintances. Trust levels have additive increase and Multiplicative decrease. There are minimal and maximum trust threshold. If the trust is below minimum threshold notifies other agents about corresponding bad agent and stops communication link.

Trust Management If the trust level is above threshold then more priority is given to that acquaintance. All requests from such acquaintance is serviced immediately. For any piece of information received the agents checks if it is available in its database. If it is available and there is some discrepancy with the content then trust is reduced. If same trust is increased. For all new information trust is increased.

Trust Management If same information arrives from two agents and content is different then content from agent which has higher trust level is accepted. The other agent’s trust is reduced. Trust levels are maintained for future use. If new acquaintance minimum threshold trust is assigned.

Algorithm for Information sharing within confidentiality and trust management Specifications of Algorithm. –Form Communication link with other agents where the neighbors are the acquaintances. –If new neighbor set minimal trust level else load the existing trust level from the database. –If an agent request for some information. Check the trust level of the agent and the access or security level linked with the information –If the access is granted allow service the request based on priority. Else reject request. –Start sending and receiving messages (the tokens and the Information are linked).

Algorithm for Information sharing within confidentiality and trust management –If there is mismatch in messages multiplicative decrease of trust and if the trust goes below minimal trust after decreasing block agent and notify the network –If there is message (new or old with match) additive increase trust and also if the trust is above max threshold send the entire request one by one. –If any one agent has all information or end of session occurs end link store trust level, Message (Token and Information). –Calculate the amount of data lost or gained from each acquaintance

Algorithm for Information sharing within confidentiality and trust management

Issues Entire update of the network model is not available any time. Agents do not know which agent requires the information. Scalability- (Size versus Performance Ratio is a very big issue). Network reliability. Relation between the information is very complex to find out.

Simulation Platform – Windows Programming Language – Java Programming Tool – Java Net Beans Peer- Peer Network Simulation. Each agent here in this simulation is a node. agents have security policy (Confidentiality of Info) linked with each information.

Simulation Agents maintain a trust level for the neighbors. There is also a token linked with all message. All agents start sending requests at different intervals mentioned in the configuration file. They collect the message based on the tokens. If an agent has token 5, It requests for 4 and 6 to gather some meaning from messages. The Simulation runs for 30 seconds or until some agent gathers all information required.

Net Gained/Lost Information Let T  Net Gain/Loss of Information for any agent. R  The message received from Agents by some agent ai. S  The message sent to other Agents (a0, a1…… an) by agent ai. O  The own message of each agent in the beginning of the session. T = (R-(S+O))

Net gain of information in four continuous sessions of Simulation

Experimental Results The Chart has four set of simulations that was done within 8 agents. The simulation revealed that as the session proceeds the gain also increases. The reason for increase is that the agents begin to know their neighbors well. The trust level does not fluctuate that much and so the requests are serviced in an efficient way.

Future Directions Try and find out relationship between the different pieces of information. Negative message relation.

Conclusion We thank Dr. Robert Herklotz for funding our research on Information Operations Across Infospheres. We thank Profs. Latifur Khan,Murat Kantarcioglu, Elisa Bertino, Ravi Sandhu and Tim Finin as well as Dr. Mamoun Awad and Dr. Ebru Celikel We also thank the students Sai Chaitanya, Abinandhan Chandrasekaran, Ryan Layfield, Nathalie Tsybulnik, Li Liu, Alam Ashraful, Ganesh Subbiah, Gal Lavee, Kim Jungin and Pavan Chitumalla