香港中文大学:Achieving Secure and Cooperative Wireless Networks with Trust Modeling and Game Theory

Achieving Secure and C。。 perative Wireless networks with Trust Modeling and Game Theory PhD Oral Defense Name: Li Xiaoqi, CSE, CUHK Supervisor: Michael R. Lyu Date: May 29th, 2009 Venue: SHB 1027
Achieving Secure and Cooperative Wireless Networks with Trust Modeling and Game Theory PhD Oral Defense Name: Li Xiaoqi, CSE, CUHK Supervisor: Michael R. Lyu Date: May 29th, 2009 Venue: SHB 1027

Outline o Background of Mobile Ad Hoc Networks ◆ Thesis part I A Trusted Routing Protocol for Security Issues of Mobile ad hoc networks ◆ Thesis part ll aA Coalitional Game Model for Security Issues of Wireless networks ◆ Thesis part lI a Coalitional game model for selfishness issues of Wireless Networks 2 May 29, 2009 CSE CUHK
2 May 29, 2009 CSE CUHK Outline ◆ Background of Mobile Ad Hoc Networks ◆ Thesis part I ◼ A Trusted Routing Protocol for Security Issues of Mobile Ad Hoc Networks ◆ Thesis part II ◼ A Coalitional Game Model for Security Issues of Wireless Networks ◆ Thesis part III ◼ A Coalitional Game Model for Selfishness Issues of Wireless Networks

Mobile ad hoc network ( MANETI e MANET is a collection of mobile nodes which communicates over wireless media ◆ Characteristics ■ Decentralization a Self-organization ■ Cooperation a Openness Uncertainty 3 May 29, 2009 CSE CUHK
3 May 29, 2009 CSE CUHK Mobile Ad Hoc Network (MANET) ◆ MANET is a collection of mobile nodes which communicates over wireless media. ◆ Characteristics ◼ Decentralization ◼ Self-organization ◼ Cooperation ◼ Openness ◼ Uncertainty

Applications of MANET Disaster Relief Battlefield Communication Outdoor Meeting efjohnsontechno g AsAr28D Ubiquitous Peer-to peer Market Multi-person Game Through bluetooth 4 May 29, 2009 CSE CUHK
4 May 29, 2009 CSE CUHK Applications of MANET Ubiquitous Peer-topeer Market Multi-person Game Through Bluetooth Disaster Relief Outdoor Meeting Battlefield Communication

Limitations of manet ◆ Security Issues Self-organization, decentralization and openness introduce insecurity a nodes lack sufficient information about each other a Malicious nodes can join the network freely The routing protocol has no security considerations ◆ Selfishness issues a Being cooperative is the design goal of MANET. Nodes belong to different self-interested entities a The mobile devices have limited resources 5 May 29, 2009 CSE CUHK
5 May 29, 2009 CSE CUHK Limitations of MANET ◆ Security Issues ◼ Self-organization, decentralization and openness introduce insecurity. ◼ Nodes lack sufficient information about each other. ◼ Malicious nodes can join the network freely. ◼ The routing protocol has no security considerations. ◆ Selfishness Issues ◼ Being cooperative is the design goal of MANET. ◼ Nodes belong to different self-interested entities. ◼ The mobile devices have limited resources

Thesis Scope Game Theoretic formulation Cryptographic Routing Protocol Non-cooperative Monetary Incentive Scheme Game Model Key Management Scheme Security Selfishness Part lll Issues Issues Intrusion Detection Reputation System Incentive scheme Cooperative Game Model Part I Trusted Routing Part i Protocol 6 May 29, 2009 CSE CUHK
6 May 29, 2009 CSE CUHK Thesis Scope Selfishness Issues Security Issues Game Theoretic Formulation Cooperative Game Model Monetary Incentive Scheme Non-cooperative Game Model Trusted Routing Protocol Key Management Scheme Intrusion Detection System Cryptographic Routing Protocol Reputation Incentive Scheme Cooperative Game Model Part I Part III Part II

Objectives and Assumptions ◆ Objectives a Aself-organized, cost-effective, trusted routing protocol a Coalitional game models with security and throughput characteristic functions a An incentive routing scheme with a stable coalitional game solution ◆ Assumptions: Watchdog mechanism or an intrusion detection system in each node Pre-distributed cryptographic scheme as an assistance EXisting payment method 7 May 29, 2009 CSE CUHK
7 May 29, 2009 CSE CUHK Objectives and Assumptions ◆ Objectives: ◼ A self-organized, cost-effective, trusted routing protocol ◼ Coalitional game models with security and throughput characteristic functions ◼ An incentive routing scheme with a stable coalitional game solution ◆ Assumptions: ◼ Watchdog mechanism or an intrusion detection system in each node ◼ Pre-distributed cryptographic scheme as an assistance ◼ Existing payment method

Part f Trusted Routing Protocol for Security Issues of MANET
Part I: Trusted Routing Protocol for Security Issues of MANET

Related work and motivations Two categories of security solutions u Secure routing protocols a Key management mechanisms Most of the two categories of solutions require u a trusted authority to issue certificates aA centralized server to monitor the networks A secret association between certain nodes Cryptographic authentication at each routing packet Disadvantages a Destroy the self-organization nature of manet Introduce huge performance overhead Single point of failure Less of efficiency and availability 9 May 29, 2009 CSE CUHK
9 May 29, 2009 CSE CUHK Related Work and Motivations ◆ Two categories of security solutions ◼ Secure routing protocols ◼ Key management mechanisms ◆ Most of the two categories of solutions require: ◼ A trusted authority to issue certificates ◼ A centralized server to monitor the networks ◼ A secret association between certain nodes ◼ Cryptographic authentication at each routing packet ◆ Disadvantages ◼ Destroy the self-organization nature of MANET ◼ Introduce huge performance overhead ◼ Single point of failure ◼ Less of efficiency and availability

Contributions of part We for the first time, introduce the idea of trust and trust model" into the design of secure routing protocols for MANET o We novelly derive our trust model based on subjective logic which can fully represent the properties of the trust relationships in MANET. We design a trusted routing protocol (TAODV) based on our trust model which is both secure and cost effective o We also enhance the subjective logic to obtain a better trust evaluation 10 May 29, 2009 CSE CUHK
10 May 29, 2009 CSE CUHK Contributions of Part I ◆ We, for the first time, introduce the idea of “trust” and “trust model” into the design of secure routing protocols for MANET. ◆ We novelly derive our trust model based on subjective logic which can fully represent the properties of the trust relationships in MANET. ◆ We design a trusted routing protocol (TAODV) based on our trust model, which is both secure and cost effective. ◆ We also enhance the subjective logic to obtain a better trust evaluation
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 北京大学:《项目成本管理》课程教学资源(PPT课件讲稿)项目范围计划(主讲:周立新).ppt
- 《网上开店实务》课程教学资源(PPT讲稿)学习情境3 网店装修.ppt
- 中国科学技术大学:Linux内核源代码导读(PPT讲稿,陈香兰).ppt
- 《The C++ Programming Language》课程教学资源(PPT课件讲稿)Lecture 04 Object-Based Programming.ppt
- 北京航空航天大学:SimplyDroid - Efficient Event Sequence Simplification for Android Application.pptx
- 南京大学:《计算机图形学》课程教学资源(PPT课件讲稿)第7讲 图元填充与裁剪算法.pptx
- 香港浸会大学:Introduction to Linux and PC Cluster.ppt
- 《C语言程序设计》课程教学资源(PPT课件讲稿)第8章 结构体、共用体与枚举类型.ppt
- 《计算机系统安全》课程教学资源(PPT课件讲稿)第二章 黑客常用的系统攻击方法.ppt
- 上海交通大学:《挖掘海量数据集 Mining Massive Datasets》课程教学资源(PPT讲稿)Lecture 06 搜索引擎 Search Engines.ppt
- 《Introduction to Java Programming》课程PPT教学课件(Sixth Edition)Chapter 16 Applets and Multimedia.ppt
- 《计算机组装与维护》课程教学资源(PPT课件讲稿)第9章 BIOS设置(设置BIOS).ppt
- 香港城市大学:基序检测的随机化算法(PPT讲稿)Randomized Algorithm for Motif Detection.ppt
- 《数据结构》课程教学资源(PPT课件讲稿)第七章 图及其应用.ppt
- 3D Reconstruction from Images:Image-based Street-side City Modeling.ppt
- 大连理工大学:《计算机网络》课程教学资源(PPT课件讲稿)Chapter 2 应用层 application layer.ppt
- 四川大学:《操作系统 Operating System》课程教学资源(PPT课件讲稿)Chapter 3 Process Description and Control 3.4 Process Control 3.5 Execution of the Operating System 3.6 Unix SVR4 Process Management 3.7 Linux Process management system calls.ppt
- 《数据结构》课程教学资源(PPT课件讲稿)第七章 图 Graph.ppt
- 《数据结构》课程教学资源:实践教学大纲.doc
- 《网络算法学》课程教学资源(PPT课件讲稿)第三章 实现原则.ppt
- MSCIT 5210/MSCBD 5002:Knowledge Discovery and Data Mining:Chapter 4:Data Warehousing, On-line Analytical Processing and Data Cube.ppt
- 《程序设计基础》课程PPT教学课件(C++)第3讲 C++程序控制结构.ppt
- 四川大学:《数据库技术》课程教学资源(PPT课件讲稿)数据库设计.ppt
- 云计算 Cloud Computing(PPT讲稿)MapReduce进阶.ppt
- 《C语言程序设计》课程电子教案(PPT课件讲稿)第7章 用函数实现模块化程序设计.pptx
- 中国科学技术大学:云计算及安全(PPT讲稿)Cloud Computing & Cloud Security.pptx
- 中国科学技术大学:《信号与图像处理基础 Signal and Image Processing》课程教学资源(PPT课件讲稿)数字图像处理基础 Basics of Digital Image Processing.pptx
- 中国科学技术大学:《信号与图像处理基础 Signal and Image Processing》课程教学资源(PPT课件讲稿)图像压缩编码 Image Compression.pptx
- 《计算机组成原理》课程教学资源(PPT课件讲稿)第3章 计算机的算术运算.pptx
- Analysis of Algorithms(PPT讲稿)Data Structures and Data Management.ppt
- 《C语言程序设计》课程电子教案(PPT课件讲稿)第七章 数组.ppt
- 《计算机网络与因特网 Computer Networks and Internets》课程教学资源(PPT课件讲稿)第二讲 互联网应用软件.ppt
- 《计算机操作系统》课程教学资源(PPT课件讲稿)第四章 存储器管理.ppt
- 《单片机应用技术》课程PPT教学课件(C语言版)第10章 单片机测控接口.ppt
- 中国科技大学计算机系:《黑客反向工程》课程教学资源(PPT课件讲稿)黑客反向工程导论(陈凯明).ppt
- 香港科技大学:Record Linkage for Big Data.pptx
- 沈阳理工大学:《计算机网络》课程教学资源(PPT课件讲稿)第2章 IP技术.ppt
- 《编译技术》课程教学资源(PPT课件讲稿)第六章 运行时存储空间的组织和管理.ppt
- 《面向对象程序设计》课程教学大纲(适用专业:信息与计算科学).pdf
- 《Java Web应用开发技术与案例教程》教学资源(PPT讲稿)第7章 Java Web常用开发模式与案例.ppt