Dynamic Trust Management for the Internet of Things Applications
|
|
|
- Gervase Parsons
- 10 years ago
- Views:
Transcription
1 Dynamic Trust Management for the Internet of Things Applications Fenye Bao and Ing-Ray Chen Department of Computer Science, Virginia Tech Self-IoT Sept. 17, 2012, San Jose, CA, USA
2 Contents Introduction System Model Dynamic Trust Management Protocol Protocol Description Convergence, Accuracy, and Resiliency Simulation Validation Trust Evaluation Trust-Based Service Composition Conclusion 2
3 Introduction Goals 1. Provide an accurate and resilient trust assessment on trust level of IoT entities. 2. Apply the proposed trust management to IoT applications in order to maximize the application performance. 3
4 Background The Internet of Things (IoT) integrates a large amount of everyday life devices from heterogeneous network environments, bringing a great challenge into security and reliability management. Smarts objects with heterogeneous characteristics need to cooperatively work together. Most smart objects are human-carried or human-related devices. Devices in IoT very often expose to public areas and communicate through wireless, hence vulnerable to malicious attacks. 4
5 Introduction The challenge Traditional approaches to protocol and network security, data and privacy management, identity management, trust and governance, and fault tolerance will not accommodate the requirements of IoT due to the scalability and the high variety of identity and relationship types. Little work on the trust management for IoT Chen, et al. [2011] proposed a trust management model based on fuzzy reputation for IoT. Considering a specific IoT with wireless sensors only Using QoS trust metrics only like packet forwarding/delivery ratio and energy consumption 5
6 Introduction Our Solution Propose dynamic trust management for a community-based social IoT environment by considering multiple social relationships among device owners. 6
7 Introduction Contributions We define a community-based social IoT environment. We propose and analyze a trust management protocol (1) considering social trust, and (2) using both direct observations and indirect recommendations to update trust. We provide a formal treatment of the convergence, accuracy, and resiliency properties. We validate these desirable properties through simulations and demonstrate the effectiveness in trust-based service composition. 7
8 System Model We consider a Social IoT [Atzori et al. 2011] environment with no centralized trusted authority. Social relationships: ownership, friendship, community Fig 1. Social Structures of the IoT. Malicious nodes aim to break the basic functionality of the IoT and perform trust related attacks: selfpromoting, bad-mouthing, and good-mouthing. Uncooperative nodes act for their own interests. 8
9 System Model Social relationships Owners m m 1 m ownership Devices m friendship... m community Communities 9
10 Trust Management Protocol Our trust management protocol for IoT is distributed. For scalability, a node may just keep its trust evaluation towards a limited set of nodes of its interest. The trust management protocol is encounter-based as well as activity-based. Two nodes encountering each other or involved in an interaction activity can directly observe each other and exchange trust evaluation toward others. 10
11 Trust Management Protocol The trust value is a real number in the range [0, 1]. When node i encounters or directly interacts with another node k at time t, node i will update its trust assessment as follows: is the elapsed time since the last trust update (not fixed). = 1 +,, == ; (1 ) +,,! = ; X = honesty, cooperativeness, or community-interest 11
12 Trust Management Protocol Node i updates trust toward node j. 12
13 Trust Management Protocol Direct trust observations 13, : This refers to the belief of node i that node j is honest based on node i s direct observations toward node j. Using a set of imperfect anomaly detection rules: false positives/negatives, : This provides the degree of cooperativeness of node j as evaluated by node i based on direct observations over 0,. Using social friendship to characterize: ( ) ( ) ( ) ( ) friendship centrality, : This provides the degree of the common interest or similar capability of node j as evaluated by node i based on direct observations over 0,. Considering community/group relationship: ( ) ( ) ( ) ( ) community centrality
14 Trust Management Protocol Indirect recommendations = Assign weight 1 to current trust; 2. Assign weight to the new recommendation; 3. Normalization. The contribution of recommended trust increases proportionally as either or increases. is the trust value of node i toward the recommender node k. Design parameters [0, 1], higher weight of new direct info. vs. past info. [0, + ], higher weight of new recommendation vs. past info. 14
15 Trust Management Protocol Trust convergence Lemma 1: The trust evaluation in our dynamic trust management protocol converges as long as 0 < 1 or > 0. As long as we consider direction observations ( > 0) or recommendations ( > 0 > 0) in each iteration, the effect of initial trust value will eventually be eliminated. = 1 +,, == ; (1 ) +,,! = ; 15
16 Trust Management Protocol Trust convergence speed Lemma 2: The trust convergence speed of our dynamic trust management protocol increases as or increases (0 < 1, > 0). The higher or is, the faster effect of initial trust value approaches 0. = 1 +,, == ; (1 ) +,,! = ; 16
17 Trust Management Protocol Trust fluctuation Lemma 3: The variance of the trust value after convergence in our dynamic trust management protocol increases as or increases (0 < 1, > 0). However, when or is higher, the protocol only takes into account few recent observations / recommendations. It has the similar effect with reducing the sample size, thus the variance and trust fluctuation will be high. Lemmas 2 & 3 indicate that there is trade-off between trust convergence speed and trust fluctuation. 17
18 Trust Management Protocol Trust accuracy and resiliency Lemma 4: The mean absolute error (MAE) of the trust evaluation in our dynamic trust management protocol is less than after trust convergence. The MAE decreases as increases or decreases. ( percentage of malicious nodes, / false negative/positive probability for malicious detection) Higher value means using more self-information. Lower value means using less recommendations. Boundary conditions for. The chance of being attacked by false recommendation is lower. 18
19 Simulation Results IoT environment setting Param Value Param Value Param Value N T 50 N H 20 N G 10 N M 5 α [0, 1] β [0, 8] P M [0, 90%] P fp,p fn 5% 1/λ 100 hrs 50 smart objects, 20 owners, 10 communities 5 service providers needed in a request The average encountering frequency is about 0.25 per pair per hour. Anomaly detection with 5% false positives/negatives 19
20 Simulation Results Effect of on trust evaluation (static) 1 Ground truth α=0.1 α=0.3 α=0.9 Trust value high fluctuation 0.6 fast convergence Time (hours) Lemma 1: Trust converges. Lemma 2: Trust converges faster when is higher. Lemma 3: Trust fluctuation is higher when is higher. 20
21 Simulation Results Effect of on trust evaluation (dynamic) 1 Ground truth α=0.1 α=0.3 α=0.9 Trust value Time (hours) 21
22 Simulation Results Effect of on trust evaluation (static) Trust value Ground truth β=0 β=0.1 β=1 fast convergence high fluctuation Time (hours) Lemma 1: Trust converges. Lemma 2: Trust converges faster when is higher. Lemma 3: Trust fluctuation is higher when is higher. 22
23 Simulation Results Effect of on trust evaluation (dynamic) 1 Ground truth β=0 β=0.1 β=1 Trust value Time (hours) 23
24 Simulation Results Resiliency to trust attacks Ground truth λ=10% λ=30% λ=50% λ=70% λ=90% 0.5 Honesty Time (hours) MAE <10% when the percentage of malicious nodes ( ) is < 50%. 2. MAE ~= 12% when = 70% and MAE ~= 40% when = 90%. 3. Theses validate Lemma 4.
25 Simulation Results Service composition A node requests services (or information) from N M = 5 service providers. The objective is to select the most trustworthy service providers such that the utility score representing the goodness of the service composition is maximized. The returning utility score of the service provider is: 0, if the selected service provider is malicious; min (cooperativeness trust, community-interest trust), otherwise. 25
26 Simulation Results Performance comparison Trust-based service composition Selecting service providers based on the service requester s trust evaluation Ideal service composition (upper bound) Assuming the service requester knowing the ground truth Random service composition (lower bound) 26
27 Utility score Simulation Results Performance comparison crossover point: t = 12 hours Trust Based Service Composition (α=0.5, β=0.2) Trust Based Service Composition (α=0.5, β=0.0) Ideal Service Composition Random Service Composition Time (hours) Utility score crossover point: t = 26 hours Time (hours) (a) =10% (b) = 50% 1. Trust-based service composition approaches the ideal performance. 2. When the percentage of malicious nodes is higher, the maximum achievable utility score is lower. 3. Crossover point: faster trust convergence vs. lower accuracy. 4. Crossover point shifts: dynamic trust management by selecting best parameters in response to IoT environment changing.
28 Conclusion We designed and analyzed a scalable and distributed trust management protocol for IoT. The proposed protocol takes social relationships into account and advocates the use of three trust properties, honesty, cooperativeness, and community-interest to evaluate trust. We provided a formal treatment of the convergence, accuracy, and resiliency properties. We analyzed the effect of trust parameters ( and ) on trust evaluation and validated the protocol through simulations. We demonstrated the effectiveness of our trust management protocol by a service composition application in IoT environments. 28
29 Thank You! Q & A 29
30 Dynamic Trust Managment 30
Scalable, Adaptive and Survivable Trust Management for Community of Interest Based Internet of Things Systems
Scalable, Adaptive and Survivable Trust Management for Community of Interest Based Internet of Things Systems Fenye Bao, Ing-Ray Chen, and Jia Guo Department of Computer Science Virginia Tech {baofenye,
Trust-based Service Management for Social Internet of Things Systems
Trust-based Service Management for Social Internet of Things Systems Ing-Ray Chen, Fenye Bao, and Jia Guo Abstract A social Internet of Things (IoT) system can be viewed as a mix of traditional peer-to-peer
Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 9, NO. 2, JUNE 22 69 Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection
Super-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems
Super-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems Yao Wang, Jie Zhang, and Julita Vassileva Department of Computer Science, University of Saskatchewan,
TRUST MANAGEMENT SCHEMES FOR INTRUSION DETECTION SYSTEMS -A SURVEY
TRUST MANAGEMENT SCHEMES FOR INTRUSION DETECTION SYSTEMS -A SURVEY 1 DEEPA S, 2 SUPRIYA M 1,2 Department of Computer Science and Engineering, Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Bangalore,
Trust and Reputation Management in Distributed Systems
Trust and Reputation Management in Distributed Systems Máster en Investigación en Informática Facultad de Informática Universidad Complutense de Madrid Félix Gómez Mármol, Alemania ([email protected])
Intrusion Detection for Mobile Ad Hoc Networks
Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering [email protected] http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1 Outline Security problems
Reproduction of Load Balancing optimal Solution Using Multi Hop Wireless Sensor Networks
Reproduction of Load Balancing optimal Solution Using Multi Hop Wireless Sensor Networks P. Manoranjan Kumar*1, Mrs. S. Lakshmi Soujanya*2 M.Tech (CSE) Student Department of CSE, Priyadarshini Institute
Alessia Garofalo. Critical Infrastructure Protection Cyber Security for Wireless Sensor Networks. Fai della Paganella, 10-12/02/2014
Alessia Garofalo Ph.D. Student in Information Engineering University of Naples «Parthenope» Critical Infrastructure Protection Cyber Security for Wireless Sensor Networks Fai della Paganella, 10-12/02/2014
Wireless Sensor Network Performance Monitoring
Wireless Sensor Network Performance Monitoring Yaqoob J. Al-raisi & David J. Parish High Speed Networks Group Loughborough University MSN Coseners 12-13th 13th July 2007 Overview The problem we are trying
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
I. TODAY S UTILITY INFRASTRUCTURE vs. FUTURE USE CASES...1 II. MARKET & PLATFORM REQUIREMENTS...2
www.vitria.com TABLE OF CONTENTS I. TODAY S UTILITY INFRASTRUCTURE vs. FUTURE USE CASES...1 II. MARKET & PLATFORM REQUIREMENTS...2 III. COMPLEMENTING UTILITY IT ARCHITECTURES WITH THE VITRIA PLATFORM FOR
Load Balancing in Distributed Data Base and Distributed Computing System
Load Balancing in Distributed Data Base and Distributed Computing System Lovely Arya Research Scholar Dravidian University KUPPAM, ANDHRA PRADESH Abstract With a distributed system, data can be located
Optimization Problems in Infrastructure Security
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1 Optimization Problems in Infrastructure Security Evangelos Kranakis Carleton University School of Computer Science Ottawa,
Intrusion Detection: Game Theory, Stochastic Processes and Data Mining
Intrusion Detection: Game Theory, Stochastic Processes and Data Mining Joseph Spring 7COM1028 Secure Systems Programming 1 Discussion Points Introduction Firewalls Intrusion Detection Schemes Models Stochastic
A Secure Online Reputation Defense System from Unfair Ratings using Anomaly Detections
A Secure Online Reputation Defense System from Unfair Ratings using Anomaly Detections Asha baby PG Scholar,Department of CSE A. Kumaresan Professor, Department of CSE K. Vijayakumar Professor, Department
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
Costs and Benefits of Reputation Management Systems
Costs and Benefits of Reputation Management Systems Roberto G. Cascella University of Trento Dipartimento di Ingegneria e Scienza dell Informazione Via Sommarive 14, I-381 Povo (TN), Italy [email protected]
APPENDIX - A. Tools Used. 1. Qualnet Simulator. 2. TRMSim-WSN Simulator. 3. SnetSim Simulator. 4. EDX SignalPro. 5.
160 APPENDIX - A Tools Used 1. Qualnet Simulator 2. TRMSim-WSN Simulator 3. SnetSim Simulator 4. EDX SignalPro 5. MATLAB Software 161 Qualnet Simulator The QualNet communications simulation platform (QualNet)
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India [email protected] Abstract Energy efficient load balancing in a Wireless Sensor
Vampire Attack Detecting and Preventing in Wireless Sensor Network
International Journal of Emerging Engineering Research and Technology Volume 2, Issue 4, July 2014, PP 306-310 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Vampire Attack Detecting and Preventing in
Metrics, methods and tools to measure trustworthiness
Metrics, methods and tools to measure trustworthiness Henrique Madeira AMBER Coordination Action University of Coimbra March 9 th, 2009 1 Measuring trustworthiness Trustworthy ICT should be: Secure Dependable
Improving Data Processing Speed in Big Data Analytics Using. HDFS Method
Improving Data Processing Speed in Big Data Analytics Using HDFS Method M.R.Sundarakumar Assistant Professor, Department Of Computer Science and Engineering, R.V College of Engineering, Bangalore, India
Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints
Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints Michael Bauer, Srinivasan Ravichandran University of Wisconsin-Madison Department of Computer Sciences {bauer, srini}@cs.wisc.edu
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
Quality of Service Routing Network and Performance Evaluation*
Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,
Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1
Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1 Maitreya Natu Dept. of Computer and Information Sciences University of Delaware, Newark, DE, USA, 19716 Email: [email protected]
Data in the Urban Environment. Adrian Slatcher, Digital Development Officer, City Policy, Manchester City Council
Data in the Urban Environment Adrian Slatcher, Digital Development Officer, City Policy, Manchester City Council Cities are collectors and users of data, but are only just coming to terms with the exponential
Key Challenges in Cloud Computing to Enable Future Internet of Things
The 4th EU-Japan Symposium on New Generation Networks and Future Internet Future Internet of Things over "Clouds Tokyo, Japan, January 19th, 2012 Key Challenges in Cloud Computing to Enable Future Internet
SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS
SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS Kokilavani.V Mother Teresa College Of Engineering And Technology,Pudhukottai Abstract Network security involves the authorization of access
OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM
OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM S. Sofia 1, M.Varghese 2 1 Student, Department of CSE, IJCET 2 Professor, Department of CSE, IJCET Abstract This paper proposes fault node recovery
An Efficient Fault Tolerance Model for Path Recovery in MPLS Networks
An Efficient Fault Tolerance Model for Path Recovery in MPLS Networks Arunkumar C K M.Tech student, Dept. of ECE, Dayananda Sagar College of Engineering, VTU, Banglore, India ABSTRACT: Increasing demand
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather
Improving our Evaluation of Transport Protocols. Sally Floyd Hamilton Institute July 29, 2005
Improving our Evaluation of Transport Protocols Sally Floyd Hamilton Institute July 29, 2005 Computer System Performance Modeling and Durable Nonsense A disconcertingly large portion of the literature
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,
DAG based In-Network Aggregation for Sensor Network Monitoring
DAG based In-Network Aggregation for Sensor Network Monitoring Shinji Motegi, Kiyohito Yoshihara and Hiroki Horiuchi KDDI R&D Laboratories Inc. {motegi, yosshy, hr-horiuchi}@kddilabs.jp Abstract Wireless
An Approach to Load Balancing In Cloud Computing
An Approach to Load Balancing In Cloud Computing Radha Ramani Malladi Visiting Faculty, Martins Academy, Bangalore, India ABSTRACT: Cloud computing is a structured model that defines computing services,
Current and Future Research into Network Security Prof. Madjid Merabti
Current and Future Research into Network Security Prof. Madjid Merabti School of Computing & Mathematical Sciences Liverpool John Moores University UK Overview Introduction Secure component composition
Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.
Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech
Large-Scale IP Traceback in High-Speed Internet
2004 IEEE Symposium on Security and Privacy Large-Scale IP Traceback in High-Speed Internet Jun (Jim) Xu Networking & Telecommunications Group College of Computing Georgia Institute of Technology (Joint
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Bank Customers (Credit) Rating System Based On Expert System and ANN
Bank Customers (Credit) Rating System Based On Expert System and ANN Project Review Yingzhen Li Abstract The precise rating of customers has a decisive impact on loan business. We constructed the BP network,
A survey on Spectrum Management in Cognitive Radio Networks
A survey on Spectrum Management in Cognitive Radio Networks Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran, Shantidev Mohanty Georgia Institute of Technology Communications Magazine, vol 46, April 2008,
Network Algorithms for Homeland Security
Network Algorithms for Homeland Security Mark Goldberg and Malik Magdon-Ismail Rensselaer Polytechnic Institute September 27, 2004. Collaborators J. Baumes, M. Krishmamoorthy, N. Preston, W. Wallace. Partially
A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL NORTH CAROLINA STATE UNIVERSITY
A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL Using OPNET 14.5 Modeler NORTH CAROLINA STATE UNIVERSITY SUBMITTED BY: SHOBHANK SHARMA [email protected] Page 1 ANALYSIS OF OSPF ROUTING PROTOCOL A. Introduction
Simulating a File-Sharing P2P Network
Simulating a File-Sharing P2P Network Mario T. Schlosser, Tyson E. Condie, and Sepandar D. Kamvar Department of Computer Science Stanford University, Stanford, CA 94305, USA Abstract. Assessing the performance
Distributed Dynamic Load Balancing for Iterative-Stencil Applications
Distributed Dynamic Load Balancing for Iterative-Stencil Applications G. Dethier 1, P. Marchot 2 and P.A. de Marneffe 1 1 EECS Department, University of Liege, Belgium 2 Chemical Engineering Department,
INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
Time Domain and Frequency Domain Techniques For Multi Shaker Time Waveform Replication
Time Domain and Frequency Domain Techniques For Multi Shaker Time Waveform Replication Thomas Reilly Data Physics Corporation 1741 Technology Drive, Suite 260 San Jose, CA 95110 (408) 216-8440 This paper
A Brief Analysis on Architecture and Reliability of Cloud Based Data Storage
Volume 2, No.4, July August 2013 International Journal of Information Systems and Computer Sciences ISSN 2319 7595 Tejaswini S L Jayanthy et al., Available International Online Journal at http://warse.org/pdfs/ijiscs03242013.pdf
Cross Validation. Dr. Thomas Jensen Expedia.com
Cross Validation Dr. Thomas Jensen Expedia.com About Me PhD from ETH Used to be a statistician at Link, now Senior Business Analyst at Expedia Manage a database with 720,000 Hotels that are not on contract
Mobile Cloud Computing Security Considerations
보안공학연구논문지 (Journal of Security Engineering), 제 9권 제 2호 2012년 4월 Mobile Cloud Computing Security Considerations Soeung-Kon(Victor) Ko 1), Jung-Hoon Lee 2), Sung Woo Kim 3) Abstract Building applications
Decentralized Utility-based Sensor Network Design
Decentralized Utility-based Sensor Network Design Narayanan Sadagopan and Bhaskar Krishnamachari University of Southern California, Los Angeles, CA 90089-0781, USA [email protected], [email protected]
Network Security A Decision and Game-Theoretic Approach
Network Security A Decision and Game-Theoretic Approach Tansu Alpcan Deutsche Telekom Laboratories, Technical University of Berlin, Germany and Tamer Ba ar University of Illinois at Urbana-Champaign, USA
Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks
Comparison of Various Passive Distributed Denial of Service in Mobile Adhoc Networks YOGESH CHABA #, YUDHVIR SINGH, PRABHA RANI Department of Computer Science & Engineering GJ University of Science & Technology,
Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover
1 Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover Jie Xu, Member, IEEE, Yuming Jiang, Member, IEEE, and Andrew Perkis, Member, IEEE Abstract In this paper we investigate
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
How To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
Optimal Gateway Selection in Multi-domain Wireless Networks: A Potential Game Perspective
Optimal Gateway Selection in Multi-domain Wireless Networks: A Potential Game Perspective Yang Song, Starsky H.Y. Wong, and Kang-Won Lee Wireless Networking Research Group IBM T. J. Watson Research Center
Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu
Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more
How To Balance Network Load In A Wireless Sensor Network
Balancing Network Traffic Load in Geographic Hash Table (GHT) R. Asha, V.Manju, Meka Sindhu & T. Subha Department of Information Technology, Sri Sai Ram Engineering College, Chennai. E-mail : [email protected],
TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS
Mestrado em Engenharia de Redes de Comunicações TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 2009-2010 Projecto de Rede / Sistema - Network / System Design 1 Hierarchical Network Design 2 Hierarchical
IMPROVEMENT OF RESPONSE TIME OF LOAD BALANCING ALGORITHM IN CLOUD ENVIROMENT
IMPROVEMENT OF RESPONSE TIME OF LOAD BALANCING ALGORITHM IN CLOUD ENVIROMENT Muhammad Muhammad Bala 1, Miss Preety Kaushik 2, Mr Vivec Demri 3 1, 2, 3 Department of Engineering and Computer Science, Sharda
Enterprise Application Enablement for the Internet of Things
Enterprise Application Enablement for the Internet of Things Prof. Dr. Uwe Kubach VP Internet of Things Platform, P&I Technology, SAP SE Public Internet of Things (IoT) Trends 12 50 bn 40 50 % Devices
On Correlating Performance Metrics
On Correlating Performance Metrics Yiping Ding and Chris Thornley BMC Software, Inc. Kenneth Newman BMC Software, Inc. University of Massachusetts, Boston Performance metrics and their measurements are
Energy Efficient MapReduce
Energy Efficient MapReduce Motivation: Energy consumption is an important aspect of datacenters efficiency, the total power consumption in the united states has doubled from 2000 to 2005, representing
Big Data - Infrastructure Considerations
April 2014, HAPPIEST MINDS TECHNOLOGIES Big Data - Infrastructure Considerations Author Anand Veeramani / Deepak Shivamurthy SHARING. MINDFUL. INTEGRITY. LEARNING. EXCELLENCE. SOCIAL RESPONSIBILITY. Copyright
Security & Trust in Wireless Sensor Networks
Security & Trust in Wireless Sensor Networks Theodore Zahariadis Ultra-wide-band Sensor Node Ultra small sensor node The smallest UW sensor node in the world: 10mm 10mm 10mm On board temperature sensor
A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks
1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity
Uptime Infrastructure Monitor Whitepaper THE TRUTH ABOUT AGENT VS. AGENTLESS MONITORING. A Short Guide to Choosing the Right Monitoring Solution.
Uptime Infrastructure Monitor Whitepaper THE TRUTH ABOUT AGENT VS. AGENTLESS MONITORING A Short Guide to Choosing the Right Monitoring Solution. When selecting an enterprise-level IT monitoring solution,
AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK
Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,
3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India
3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing
Web Email DNS Peer-to-peer systems (file sharing, CDNs, cycle sharing)
1 1 Distributed Systems What are distributed systems? How would you characterize them? Components of the system are located at networked computers Cooperate to provide some service No shared memory Communication
D A T A M I N I N G C L A S S I F I C A T I O N
D A T A M I N I N G C L A S S I F I C A T I O N FABRICIO VOZNIKA LEO NARDO VIA NA INTRODUCTION Nowadays there is huge amount of data being collected and stored in databases everywhere across the globe.
Internet of Things (IoT): A vision, architectural elements, and future directions
SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: [email protected] Table of contents Open challenges
Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks
Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Krishnamoorthy.D 1, Dr.S.Thirunirai Senthil, Ph.D 2 1 PG student of M.Tech Computer Science and Engineering, PRIST University,
Characterizing Task Usage Shapes in Google s Compute Clusters
Characterizing Task Usage Shapes in Google s Compute Clusters Qi Zhang 1, Joseph L. Hellerstein 2, Raouf Boutaba 1 1 University of Waterloo, 2 Google Inc. Introduction Cloud computing is becoming a key
The Importance of Software License Server Monitoring
The Importance of Software License Server Monitoring NetworkComputer Meeting The Job Scheduling Challenges of Organizations of All Sizes White Paper Introduction Every semiconductor design group uses a
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...
An On-Line Algorithm for Checkpoint Placement
An On-Line Algorithm for Checkpoint Placement Avi Ziv IBM Israel, Science and Technology Center MATAM - Advanced Technology Center Haifa 3905, Israel [email protected] Jehoshua Bruck California Institute
A NOVEL RESOURCE EFFICIENT DMMS APPROACH
A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer
Triathlon of Lightweight Block Ciphers for the Internet of Things
NIST Lightweight Cryptography Workshop 2015 Triathlon of Lightweight Block Ciphers for the Internet of Things Daniel Dinu, Yann Le Corre, Dmitry Khovratovich, Leo Perrin, Johann Großschädl, Alex Biryukov
Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis
Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis Felipe Augusto Nunes de Oliveira - GRR20112021 João Victor Tozatti Risso - GRR20120726 Abstract. The increasing
Cloud Operations Excellence & Reliability
Cloud Operations Excellence & Reliability Cloud Operations Excellence & Reliability Page 1 Cloud Operations Excellence & Reliability Microsoft has invested over $15 billion in building a highly scalable,
Behavioral Segmentation
Behavioral Segmentation TM Contents 1. The Importance of Segmentation in Contemporary Marketing... 2 2. Traditional Methods of Segmentation and their Limitations... 2 2.1 Lack of Homogeneity... 3 2.2 Determining
Assessing trade-offs between energy consumption and security in sensor networks: simulations or testbeds?
Assessing trade-offs between energy consumption and security in sensor networks: simulations or testbeds? F. Maraninchi 1, Grenoble INP/Ensimag, VERIMAG mainly summarizing discussions with: Laurent Mounier,
A QoS-Aware Web Service Selection Based on Clustering
International Journal of Scientific and Research Publications, Volume 4, Issue 2, February 2014 1 A QoS-Aware Web Service Selection Based on Clustering R.Karthiban PG scholar, Computer Science and Engineering,
About the Author. The Role of Artificial Intelligence in Software Engineering. Brief History of AI. Introduction 2/27/2013
About the Author The Role of Artificial Intelligence in Software Engineering By: Mark Harman Presented by: Jacob Lear Mark Harman is a Professor of Software Engineering at University College London Director
CHAPTER 1 ANALYZING BUSINESS GOAL & CONSTRAINTS
CHAPTER 1 ANALYZING BUSINESS GOAL & CONSTRAINTS Expected Outcomes Able to analyse a computer network requirements Able to analyse business goals and constraint Able to understand and apply the Top-Down
Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis
Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis Abdun Mahmood, Christopher Leckie, Parampalli Udaya Department of Computer Science and Software Engineering University of
5G Network Infrastructure for the Future Internet
5G Network Infrastructure for the Future Internet NCP/Florence Infoday Rémy Bayou, European Commission DG CONNECT, Unit "Network technologies" Mobile Communications: 1G to 4G The road to 5G 5G Challenges
EQ-BGP: an efficient inter-domain QoS routing protocol
EQ-BGP: an efficient inter-domain QoS routing protocol Andrzej Beben Institute of Telecommunications Warsaw University of Technology Nowowiejska 15/19, 00-665 Warsaw, Poland [email protected] Abstract
