Dynamic Trust Management for the Internet of Things Applications

Size: px
Start display at page:

Download "Dynamic Trust Management for the Internet of Things Applications"

Transcription

1 Dynamic Trust Management for the Internet of Things Applications Fenye Bao and Ing-Ray Chen Department of Computer Science, Virginia Tech Self-IoT Sept. 17, 2012, San Jose, CA, USA

2 Contents Introduction System Model Dynamic Trust Management Protocol Protocol Description Convergence, Accuracy, and Resiliency Simulation Validation Trust Evaluation Trust-Based Service Composition Conclusion 2

3 Introduction Goals 1. Provide an accurate and resilient trust assessment on trust level of IoT entities. 2. Apply the proposed trust management to IoT applications in order to maximize the application performance. 3

4 Background The Internet of Things (IoT) integrates a large amount of everyday life devices from heterogeneous network environments, bringing a great challenge into security and reliability management. Smarts objects with heterogeneous characteristics need to cooperatively work together. Most smart objects are human-carried or human-related devices. Devices in IoT very often expose to public areas and communicate through wireless, hence vulnerable to malicious attacks. 4

5 Introduction The challenge Traditional approaches to protocol and network security, data and privacy management, identity management, trust and governance, and fault tolerance will not accommodate the requirements of IoT due to the scalability and the high variety of identity and relationship types. Little work on the trust management for IoT Chen, et al. [2011] proposed a trust management model based on fuzzy reputation for IoT. Considering a specific IoT with wireless sensors only Using QoS trust metrics only like packet forwarding/delivery ratio and energy consumption 5

6 Introduction Our Solution Propose dynamic trust management for a community-based social IoT environment by considering multiple social relationships among device owners. 6

7 Introduction Contributions We define a community-based social IoT environment. We propose and analyze a trust management protocol (1) considering social trust, and (2) using both direct observations and indirect recommendations to update trust. We provide a formal treatment of the convergence, accuracy, and resiliency properties. We validate these desirable properties through simulations and demonstrate the effectiveness in trust-based service composition. 7

8 System Model We consider a Social IoT [Atzori et al. 2011] environment with no centralized trusted authority. Social relationships: ownership, friendship, community Fig 1. Social Structures of the IoT. Malicious nodes aim to break the basic functionality of the IoT and perform trust related attacks: selfpromoting, bad-mouthing, and good-mouthing. Uncooperative nodes act for their own interests. 8

9 System Model Social relationships Owners m m 1 m ownership Devices m friendship... m community Communities 9

10 Trust Management Protocol Our trust management protocol for IoT is distributed. For scalability, a node may just keep its trust evaluation towards a limited set of nodes of its interest. The trust management protocol is encounter-based as well as activity-based. Two nodes encountering each other or involved in an interaction activity can directly observe each other and exchange trust evaluation toward others. 10

11 Trust Management Protocol The trust value is a real number in the range [0, 1]. When node i encounters or directly interacts with another node k at time t, node i will update its trust assessment as follows: is the elapsed time since the last trust update (not fixed). = 1 +,, == ; (1 ) +,,! = ; X = honesty, cooperativeness, or community-interest 11

12 Trust Management Protocol Node i updates trust toward node j. 12

13 Trust Management Protocol Direct trust observations 13, : This refers to the belief of node i that node j is honest based on node i s direct observations toward node j. Using a set of imperfect anomaly detection rules: false positives/negatives, : This provides the degree of cooperativeness of node j as evaluated by node i based on direct observations over 0,. Using social friendship to characterize: ( ) ( ) ( ) ( ) friendship centrality, : This provides the degree of the common interest or similar capability of node j as evaluated by node i based on direct observations over 0,. Considering community/group relationship: ( ) ( ) ( ) ( ) community centrality

14 Trust Management Protocol Indirect recommendations = Assign weight 1 to current trust; 2. Assign weight to the new recommendation; 3. Normalization. The contribution of recommended trust increases proportionally as either or increases. is the trust value of node i toward the recommender node k. Design parameters [0, 1], higher weight of new direct info. vs. past info. [0, + ], higher weight of new recommendation vs. past info. 14

15 Trust Management Protocol Trust convergence Lemma 1: The trust evaluation in our dynamic trust management protocol converges as long as 0 < 1 or > 0. As long as we consider direction observations ( > 0) or recommendations ( > 0 > 0) in each iteration, the effect of initial trust value will eventually be eliminated. = 1 +,, == ; (1 ) +,,! = ; 15

16 Trust Management Protocol Trust convergence speed Lemma 2: The trust convergence speed of our dynamic trust management protocol increases as or increases (0 < 1, > 0). The higher or is, the faster effect of initial trust value approaches 0. = 1 +,, == ; (1 ) +,,! = ; 16

17 Trust Management Protocol Trust fluctuation Lemma 3: The variance of the trust value after convergence in our dynamic trust management protocol increases as or increases (0 < 1, > 0). However, when or is higher, the protocol only takes into account few recent observations / recommendations. It has the similar effect with reducing the sample size, thus the variance and trust fluctuation will be high. Lemmas 2 & 3 indicate that there is trade-off between trust convergence speed and trust fluctuation. 17

18 Trust Management Protocol Trust accuracy and resiliency Lemma 4: The mean absolute error (MAE) of the trust evaluation in our dynamic trust management protocol is less than after trust convergence. The MAE decreases as increases or decreases. ( percentage of malicious nodes, / false negative/positive probability for malicious detection) Higher value means using more self-information. Lower value means using less recommendations. Boundary conditions for. The chance of being attacked by false recommendation is lower. 18

19 Simulation Results IoT environment setting Param Value Param Value Param Value N T 50 N H 20 N G 10 N M 5 α [0, 1] β [0, 8] P M [0, 90%] P fp,p fn 5% 1/λ 100 hrs 50 smart objects, 20 owners, 10 communities 5 service providers needed in a request The average encountering frequency is about 0.25 per pair per hour. Anomaly detection with 5% false positives/negatives 19

20 Simulation Results Effect of on trust evaluation (static) 1 Ground truth α=0.1 α=0.3 α=0.9 Trust value high fluctuation 0.6 fast convergence Time (hours) Lemma 1: Trust converges. Lemma 2: Trust converges faster when is higher. Lemma 3: Trust fluctuation is higher when is higher. 20

21 Simulation Results Effect of on trust evaluation (dynamic) 1 Ground truth α=0.1 α=0.3 α=0.9 Trust value Time (hours) 21

22 Simulation Results Effect of on trust evaluation (static) Trust value Ground truth β=0 β=0.1 β=1 fast convergence high fluctuation Time (hours) Lemma 1: Trust converges. Lemma 2: Trust converges faster when is higher. Lemma 3: Trust fluctuation is higher when is higher. 22

23 Simulation Results Effect of on trust evaluation (dynamic) 1 Ground truth β=0 β=0.1 β=1 Trust value Time (hours) 23

24 Simulation Results Resiliency to trust attacks Ground truth λ=10% λ=30% λ=50% λ=70% λ=90% 0.5 Honesty Time (hours) MAE <10% when the percentage of malicious nodes ( ) is < 50%. 2. MAE ~= 12% when = 70% and MAE ~= 40% when = 90%. 3. Theses validate Lemma 4.

25 Simulation Results Service composition A node requests services (or information) from N M = 5 service providers. The objective is to select the most trustworthy service providers such that the utility score representing the goodness of the service composition is maximized. The returning utility score of the service provider is: 0, if the selected service provider is malicious; min (cooperativeness trust, community-interest trust), otherwise. 25

26 Simulation Results Performance comparison Trust-based service composition Selecting service providers based on the service requester s trust evaluation Ideal service composition (upper bound) Assuming the service requester knowing the ground truth Random service composition (lower bound) 26

27 Utility score Simulation Results Performance comparison crossover point: t = 12 hours Trust Based Service Composition (α=0.5, β=0.2) Trust Based Service Composition (α=0.5, β=0.0) Ideal Service Composition Random Service Composition Time (hours) Utility score crossover point: t = 26 hours Time (hours) (a) =10% (b) = 50% 1. Trust-based service composition approaches the ideal performance. 2. When the percentage of malicious nodes is higher, the maximum achievable utility score is lower. 3. Crossover point: faster trust convergence vs. lower accuracy. 4. Crossover point shifts: dynamic trust management by selecting best parameters in response to IoT environment changing.

28 Conclusion We designed and analyzed a scalable and distributed trust management protocol for IoT. The proposed protocol takes social relationships into account and advocates the use of three trust properties, honesty, cooperativeness, and community-interest to evaluate trust. We provided a formal treatment of the convergence, accuracy, and resiliency properties. We analyzed the effect of trust parameters ( and ) on trust evaluation and validated the protocol through simulations. We demonstrated the effectiveness of our trust management protocol by a service composition application in IoT environments. 28

29 Thank You! Q & A 29

30 Dynamic Trust Managment 30

Scalable, Adaptive and Survivable Trust Management for Community of Interest Based Internet of Things Systems

Scalable, Adaptive and Survivable Trust Management for Community of Interest Based Internet of Things Systems Scalable, Adaptive and Survivable Trust Management for Community of Interest Based Internet of Things Systems Fenye Bao, Ing-Ray Chen, and Jia Guo Department of Computer Science Virginia Tech {baofenye,

More information

Trust-based Service Management for Social Internet of Things Systems

Trust-based Service Management for Social Internet of Things Systems Trust-based Service Management for Social Internet of Things Systems Ing-Ray Chen, Fenye Bao, and Jia Guo Abstract A social Internet of Things (IoT) system can be viewed as a mix of traditional peer-to-peer

More information

Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection

Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 9, NO. 2, JUNE 22 69 Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection

More information

Super-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems

Super-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems Super-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems Yao Wang, Jie Zhang, and Julita Vassileva Department of Computer Science, University of Saskatchewan,

More information

TRUST MANAGEMENT SCHEMES FOR INTRUSION DETECTION SYSTEMS -A SURVEY

TRUST MANAGEMENT SCHEMES FOR INTRUSION DETECTION SYSTEMS -A SURVEY TRUST MANAGEMENT SCHEMES FOR INTRUSION DETECTION SYSTEMS -A SURVEY 1 DEEPA S, 2 SUPRIYA M 1,2 Department of Computer Science and Engineering, Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Bangalore,

More information

Trust and Reputation Management in Distributed Systems

Trust and Reputation Management in Distributed Systems Trust and Reputation Management in Distributed Systems Máster en Investigación en Informática Facultad de Informática Universidad Complutense de Madrid Félix Gómez Mármol, Alemania ([email protected])

More information

Intrusion Detection for Mobile Ad Hoc Networks

Intrusion Detection for Mobile Ad Hoc Networks Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering [email protected] http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1 Outline Security problems

More information

Reproduction of Load Balancing optimal Solution Using Multi Hop Wireless Sensor Networks

Reproduction of Load Balancing optimal Solution Using Multi Hop Wireless Sensor Networks Reproduction of Load Balancing optimal Solution Using Multi Hop Wireless Sensor Networks P. Manoranjan Kumar*1, Mrs. S. Lakshmi Soujanya*2 M.Tech (CSE) Student Department of CSE, Priyadarshini Institute

More information

Alessia Garofalo. Critical Infrastructure Protection Cyber Security for Wireless Sensor Networks. Fai della Paganella, 10-12/02/2014

Alessia Garofalo. Critical Infrastructure Protection Cyber Security for Wireless Sensor Networks. Fai della Paganella, 10-12/02/2014 Alessia Garofalo Ph.D. Student in Information Engineering University of Naples «Parthenope» Critical Infrastructure Protection Cyber Security for Wireless Sensor Networks Fai della Paganella, 10-12/02/2014

More information

Wireless Sensor Network Performance Monitoring

Wireless Sensor Network Performance Monitoring Wireless Sensor Network Performance Monitoring Yaqoob J. Al-raisi & David J. Parish High Speed Networks Group Loughborough University MSN Coseners 12-13th 13th July 2007 Overview The problem we are trying

More information

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks

More information

I. TODAY S UTILITY INFRASTRUCTURE vs. FUTURE USE CASES...1 II. MARKET & PLATFORM REQUIREMENTS...2

I. TODAY S UTILITY INFRASTRUCTURE vs. FUTURE USE CASES...1 II. MARKET & PLATFORM REQUIREMENTS...2 www.vitria.com TABLE OF CONTENTS I. TODAY S UTILITY INFRASTRUCTURE vs. FUTURE USE CASES...1 II. MARKET & PLATFORM REQUIREMENTS...2 III. COMPLEMENTING UTILITY IT ARCHITECTURES WITH THE VITRIA PLATFORM FOR

More information

Load Balancing in Distributed Data Base and Distributed Computing System

Load Balancing in Distributed Data Base and Distributed Computing System Load Balancing in Distributed Data Base and Distributed Computing System Lovely Arya Research Scholar Dravidian University KUPPAM, ANDHRA PRADESH Abstract With a distributed system, data can be located

More information

Optimization Problems in Infrastructure Security

Optimization Problems in Infrastructure Security Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1 Optimization Problems in Infrastructure Security Evangelos Kranakis Carleton University School of Computer Science Ottawa,

More information

Intrusion Detection: Game Theory, Stochastic Processes and Data Mining

Intrusion Detection: Game Theory, Stochastic Processes and Data Mining Intrusion Detection: Game Theory, Stochastic Processes and Data Mining Joseph Spring 7COM1028 Secure Systems Programming 1 Discussion Points Introduction Firewalls Intrusion Detection Schemes Models Stochastic

More information

A Secure Online Reputation Defense System from Unfair Ratings using Anomaly Detections

A Secure Online Reputation Defense System from Unfair Ratings using Anomaly Detections A Secure Online Reputation Defense System from Unfair Ratings using Anomaly Detections Asha baby PG Scholar,Department of CSE A. Kumaresan Professor, Department of CSE K. Vijayakumar Professor, Department

More information

Prediction of DDoS Attack Scheme

Prediction of DDoS Attack Scheme Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and

More information

Costs and Benefits of Reputation Management Systems

Costs and Benefits of Reputation Management Systems Costs and Benefits of Reputation Management Systems Roberto G. Cascella University of Trento Dipartimento di Ingegneria e Scienza dell Informazione Via Sommarive 14, I-381 Povo (TN), Italy [email protected]

More information

APPENDIX - A. Tools Used. 1. Qualnet Simulator. 2. TRMSim-WSN Simulator. 3. SnetSim Simulator. 4. EDX SignalPro. 5.

APPENDIX - A. Tools Used. 1. Qualnet Simulator. 2. TRMSim-WSN Simulator. 3. SnetSim Simulator. 4. EDX SignalPro. 5. 160 APPENDIX - A Tools Used 1. Qualnet Simulator 2. TRMSim-WSN Simulator 3. SnetSim Simulator 4. EDX SignalPro 5. MATLAB Software 161 Qualnet Simulator The QualNet communications simulation platform (QualNet)

More information

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India [email protected] Abstract Energy efficient load balancing in a Wireless Sensor

More information

Vampire Attack Detecting and Preventing in Wireless Sensor Network

Vampire Attack Detecting and Preventing in Wireless Sensor Network International Journal of Emerging Engineering Research and Technology Volume 2, Issue 4, July 2014, PP 306-310 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Vampire Attack Detecting and Preventing in

More information

Metrics, methods and tools to measure trustworthiness

Metrics, methods and tools to measure trustworthiness Metrics, methods and tools to measure trustworthiness Henrique Madeira AMBER Coordination Action University of Coimbra March 9 th, 2009 1 Measuring trustworthiness Trustworthy ICT should be: Secure Dependable

More information

Improving Data Processing Speed in Big Data Analytics Using. HDFS Method

Improving Data Processing Speed in Big Data Analytics Using. HDFS Method Improving Data Processing Speed in Big Data Analytics Using HDFS Method M.R.Sundarakumar Assistant Professor, Department Of Computer Science and Engineering, R.V College of Engineering, Bangalore, India

More information

Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints

Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints Michael Bauer, Srinivasan Ravichandran University of Wisconsin-Madison Department of Computer Sciences {bauer, srini}@cs.wisc.edu

More information

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,

More information

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks 2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh

More information

Quality of Service Routing Network and Performance Evaluation*

Quality of Service Routing Network and Performance Evaluation* Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,

More information

Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1

Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1 Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1 Maitreya Natu Dept. of Computer and Information Sciences University of Delaware, Newark, DE, USA, 19716 Email: [email protected]

More information

Data in the Urban Environment. Adrian Slatcher, Digital Development Officer, City Policy, Manchester City Council

Data in the Urban Environment. Adrian Slatcher, Digital Development Officer, City Policy, Manchester City Council Data in the Urban Environment Adrian Slatcher, Digital Development Officer, City Policy, Manchester City Council Cities are collectors and users of data, but are only just coming to terms with the exponential

More information

Key Challenges in Cloud Computing to Enable Future Internet of Things

Key Challenges in Cloud Computing to Enable Future Internet of Things The 4th EU-Japan Symposium on New Generation Networks and Future Internet Future Internet of Things over "Clouds Tokyo, Japan, January 19th, 2012 Key Challenges in Cloud Computing to Enable Future Internet

More information

SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS

SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS Kokilavani.V Mother Teresa College Of Engineering And Technology,Pudhukottai Abstract Network security involves the authorization of access

More information

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM S. Sofia 1, M.Varghese 2 1 Student, Department of CSE, IJCET 2 Professor, Department of CSE, IJCET Abstract This paper proposes fault node recovery

More information

An Efficient Fault Tolerance Model for Path Recovery in MPLS Networks

An Efficient Fault Tolerance Model for Path Recovery in MPLS Networks An Efficient Fault Tolerance Model for Path Recovery in MPLS Networks Arunkumar C K M.Tech student, Dept. of ECE, Dayananda Sagar College of Engineering, VTU, Banglore, India ABSTRACT: Increasing demand

More information

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather

More information

Improving our Evaluation of Transport Protocols. Sally Floyd Hamilton Institute July 29, 2005

Improving our Evaluation of Transport Protocols. Sally Floyd Hamilton Institute July 29, 2005 Improving our Evaluation of Transport Protocols Sally Floyd Hamilton Institute July 29, 2005 Computer System Performance Modeling and Durable Nonsense A disconcertingly large portion of the literature

More information

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,

More information

DAG based In-Network Aggregation for Sensor Network Monitoring

DAG based In-Network Aggregation for Sensor Network Monitoring DAG based In-Network Aggregation for Sensor Network Monitoring Shinji Motegi, Kiyohito Yoshihara and Hiroki Horiuchi KDDI R&D Laboratories Inc. {motegi, yosshy, hr-horiuchi}@kddilabs.jp Abstract Wireless

More information

An Approach to Load Balancing In Cloud Computing

An Approach to Load Balancing In Cloud Computing An Approach to Load Balancing In Cloud Computing Radha Ramani Malladi Visiting Faculty, Martins Academy, Bangalore, India ABSTRACT: Cloud computing is a structured model that defines computing services,

More information

Current and Future Research into Network Security Prof. Madjid Merabti

Current and Future Research into Network Security Prof. Madjid Merabti Current and Future Research into Network Security Prof. Madjid Merabti School of Computing & Mathematical Sciences Liverpool John Moores University UK Overview Introduction Secure component composition

More information

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram. Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech

More information

Large-Scale IP Traceback in High-Speed Internet

Large-Scale IP Traceback in High-Speed Internet 2004 IEEE Symposium on Security and Privacy Large-Scale IP Traceback in High-Speed Internet Jun (Jim) Xu Networking & Telecommunications Group College of Computing Georgia Institute of Technology (Joint

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

Bank Customers (Credit) Rating System Based On Expert System and ANN

Bank Customers (Credit) Rating System Based On Expert System and ANN Bank Customers (Credit) Rating System Based On Expert System and ANN Project Review Yingzhen Li Abstract The precise rating of customers has a decisive impact on loan business. We constructed the BP network,

More information

A survey on Spectrum Management in Cognitive Radio Networks

A survey on Spectrum Management in Cognitive Radio Networks A survey on Spectrum Management in Cognitive Radio Networks Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran, Shantidev Mohanty Georgia Institute of Technology Communications Magazine, vol 46, April 2008,

More information

Network Algorithms for Homeland Security

Network Algorithms for Homeland Security Network Algorithms for Homeland Security Mark Goldberg and Malik Magdon-Ismail Rensselaer Polytechnic Institute September 27, 2004. Collaborators J. Baumes, M. Krishmamoorthy, N. Preston, W. Wallace. Partially

More information

A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL NORTH CAROLINA STATE UNIVERSITY

A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL NORTH CAROLINA STATE UNIVERSITY A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL Using OPNET 14.5 Modeler NORTH CAROLINA STATE UNIVERSITY SUBMITTED BY: SHOBHANK SHARMA [email protected] Page 1 ANALYSIS OF OSPF ROUTING PROTOCOL A. Introduction

More information

Simulating a File-Sharing P2P Network

Simulating a File-Sharing P2P Network Simulating a File-Sharing P2P Network Mario T. Schlosser, Tyson E. Condie, and Sepandar D. Kamvar Department of Computer Science Stanford University, Stanford, CA 94305, USA Abstract. Assessing the performance

More information

Distributed Dynamic Load Balancing for Iterative-Stencil Applications

Distributed Dynamic Load Balancing for Iterative-Stencil Applications Distributed Dynamic Load Balancing for Iterative-Stencil Applications G. Dethier 1, P. Marchot 2 and P.A. de Marneffe 1 1 EECS Department, University of Liege, Belgium 2 Chemical Engineering Department,

More information

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by

More information

Time Domain and Frequency Domain Techniques For Multi Shaker Time Waveform Replication

Time Domain and Frequency Domain Techniques For Multi Shaker Time Waveform Replication Time Domain and Frequency Domain Techniques For Multi Shaker Time Waveform Replication Thomas Reilly Data Physics Corporation 1741 Technology Drive, Suite 260 San Jose, CA 95110 (408) 216-8440 This paper

More information

A Brief Analysis on Architecture and Reliability of Cloud Based Data Storage

A Brief Analysis on Architecture and Reliability of Cloud Based Data Storage Volume 2, No.4, July August 2013 International Journal of Information Systems and Computer Sciences ISSN 2319 7595 Tejaswini S L Jayanthy et al., Available International Online Journal at http://warse.org/pdfs/ijiscs03242013.pdf

More information

Cross Validation. Dr. Thomas Jensen Expedia.com

Cross Validation. Dr. Thomas Jensen Expedia.com Cross Validation Dr. Thomas Jensen Expedia.com About Me PhD from ETH Used to be a statistician at Link, now Senior Business Analyst at Expedia Manage a database with 720,000 Hotels that are not on contract

More information

Mobile Cloud Computing Security Considerations

Mobile Cloud Computing Security Considerations 보안공학연구논문지 (Journal of Security Engineering), 제 9권 제 2호 2012년 4월 Mobile Cloud Computing Security Considerations Soeung-Kon(Victor) Ko 1), Jung-Hoon Lee 2), Sung Woo Kim 3) Abstract Building applications

More information

Decentralized Utility-based Sensor Network Design

Decentralized Utility-based Sensor Network Design Decentralized Utility-based Sensor Network Design Narayanan Sadagopan and Bhaskar Krishnamachari University of Southern California, Los Angeles, CA 90089-0781, USA [email protected], [email protected]

More information

Network Security A Decision and Game-Theoretic Approach

Network Security A Decision and Game-Theoretic Approach Network Security A Decision and Game-Theoretic Approach Tansu Alpcan Deutsche Telekom Laboratories, Technical University of Berlin, Germany and Tamer Ba ar University of Illinois at Urbana-Champaign, USA

More information

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks Comparison of Various Passive Distributed Denial of Service in Mobile Adhoc Networks YOGESH CHABA #, YUDHVIR SINGH, PRABHA RANI Department of Computer Science & Engineering GJ University of Science & Technology,

More information

Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover

Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover 1 Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover Jie Xu, Member, IEEE, Yuming Jiang, Member, IEEE, and Andrew Perkis, Member, IEEE Abstract In this paper we investigate

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

Optimal Gateway Selection in Multi-domain Wireless Networks: A Potential Game Perspective

Optimal Gateway Selection in Multi-domain Wireless Networks: A Potential Game Perspective Optimal Gateway Selection in Multi-domain Wireless Networks: A Potential Game Perspective Yang Song, Starsky H.Y. Wong, and Kang-Won Lee Wireless Networking Research Group IBM T. J. Watson Research Center

More information

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more

More information

How To Balance Network Load In A Wireless Sensor Network

How To Balance Network Load In A Wireless Sensor Network Balancing Network Traffic Load in Geographic Hash Table (GHT) R. Asha, V.Manju, Meka Sindhu & T. Subha Department of Information Technology, Sri Sai Ram Engineering College, Chennai. E-mail : [email protected],

More information

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS Mestrado em Engenharia de Redes de Comunicações TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 2009-2010 Projecto de Rede / Sistema - Network / System Design 1 Hierarchical Network Design 2 Hierarchical

More information

IMPROVEMENT OF RESPONSE TIME OF LOAD BALANCING ALGORITHM IN CLOUD ENVIROMENT

IMPROVEMENT OF RESPONSE TIME OF LOAD BALANCING ALGORITHM IN CLOUD ENVIROMENT IMPROVEMENT OF RESPONSE TIME OF LOAD BALANCING ALGORITHM IN CLOUD ENVIROMENT Muhammad Muhammad Bala 1, Miss Preety Kaushik 2, Mr Vivec Demri 3 1, 2, 3 Department of Engineering and Computer Science, Sharda

More information

Enterprise Application Enablement for the Internet of Things

Enterprise Application Enablement for the Internet of Things Enterprise Application Enablement for the Internet of Things Prof. Dr. Uwe Kubach VP Internet of Things Platform, P&I Technology, SAP SE Public Internet of Things (IoT) Trends 12 50 bn 40 50 % Devices

More information

On Correlating Performance Metrics

On Correlating Performance Metrics On Correlating Performance Metrics Yiping Ding and Chris Thornley BMC Software, Inc. Kenneth Newman BMC Software, Inc. University of Massachusetts, Boston Performance metrics and their measurements are

More information

Energy Efficient MapReduce

Energy Efficient MapReduce Energy Efficient MapReduce Motivation: Energy consumption is an important aspect of datacenters efficiency, the total power consumption in the united states has doubled from 2000 to 2005, representing

More information

Big Data - Infrastructure Considerations

Big Data - Infrastructure Considerations April 2014, HAPPIEST MINDS TECHNOLOGIES Big Data - Infrastructure Considerations Author Anand Veeramani / Deepak Shivamurthy SHARING. MINDFUL. INTEGRITY. LEARNING. EXCELLENCE. SOCIAL RESPONSIBILITY. Copyright

More information

Security & Trust in Wireless Sensor Networks

Security & Trust in Wireless Sensor Networks Security & Trust in Wireless Sensor Networks Theodore Zahariadis Ultra-wide-band Sensor Node Ultra small sensor node The smallest UW sensor node in the world: 10mm 10mm 10mm On board temperature sensor

More information

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks 1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity

More information

Uptime Infrastructure Monitor Whitepaper THE TRUTH ABOUT AGENT VS. AGENTLESS MONITORING. A Short Guide to Choosing the Right Monitoring Solution.

Uptime Infrastructure Monitor Whitepaper THE TRUTH ABOUT AGENT VS. AGENTLESS MONITORING. A Short Guide to Choosing the Right Monitoring Solution. Uptime Infrastructure Monitor Whitepaper THE TRUTH ABOUT AGENT VS. AGENTLESS MONITORING A Short Guide to Choosing the Right Monitoring Solution. When selecting an enterprise-level IT monitoring solution,

More information

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,

More information

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing

More information

Web Email DNS Peer-to-peer systems (file sharing, CDNs, cycle sharing)

Web Email DNS Peer-to-peer systems (file sharing, CDNs, cycle sharing) 1 1 Distributed Systems What are distributed systems? How would you characterize them? Components of the system are located at networked computers Cooperate to provide some service No shared memory Communication

More information

D A T A M I N I N G C L A S S I F I C A T I O N

D A T A M I N I N G C L A S S I F I C A T I O N D A T A M I N I N G C L A S S I F I C A T I O N FABRICIO VOZNIKA LEO NARDO VIA NA INTRODUCTION Nowadays there is huge amount of data being collected and stored in databases everywhere across the globe.

More information

Internet of Things (IoT): A vision, architectural elements, and future directions

Internet of Things (IoT): A vision, architectural elements, and future directions SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: [email protected] Table of contents Open challenges

More information

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Krishnamoorthy.D 1, Dr.S.Thirunirai Senthil, Ph.D 2 1 PG student of M.Tech Computer Science and Engineering, PRIST University,

More information

Characterizing Task Usage Shapes in Google s Compute Clusters

Characterizing Task Usage Shapes in Google s Compute Clusters Characterizing Task Usage Shapes in Google s Compute Clusters Qi Zhang 1, Joseph L. Hellerstein 2, Raouf Boutaba 1 1 University of Waterloo, 2 Google Inc. Introduction Cloud computing is becoming a key

More information

The Importance of Software License Server Monitoring

The Importance of Software License Server Monitoring The Importance of Software License Server Monitoring NetworkComputer Meeting The Job Scheduling Challenges of Organizations of All Sizes White Paper Introduction Every semiconductor design group uses a

More information

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...

More information

An On-Line Algorithm for Checkpoint Placement

An On-Line Algorithm for Checkpoint Placement An On-Line Algorithm for Checkpoint Placement Avi Ziv IBM Israel, Science and Technology Center MATAM - Advanced Technology Center Haifa 3905, Israel [email protected] Jehoshua Bruck California Institute

More information

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

A NOVEL RESOURCE EFFICIENT DMMS APPROACH A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer

More information

Triathlon of Lightweight Block Ciphers for the Internet of Things

Triathlon of Lightweight Block Ciphers for the Internet of Things NIST Lightweight Cryptography Workshop 2015 Triathlon of Lightweight Block Ciphers for the Internet of Things Daniel Dinu, Yann Le Corre, Dmitry Khovratovich, Leo Perrin, Johann Großschädl, Alex Biryukov

More information

Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis

Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis Felipe Augusto Nunes de Oliveira - GRR20112021 João Victor Tozatti Risso - GRR20120726 Abstract. The increasing

More information

Cloud Operations Excellence & Reliability

Cloud Operations Excellence & Reliability Cloud Operations Excellence & Reliability Cloud Operations Excellence & Reliability Page 1 Cloud Operations Excellence & Reliability Microsoft has invested over $15 billion in building a highly scalable,

More information

Behavioral Segmentation

Behavioral Segmentation Behavioral Segmentation TM Contents 1. The Importance of Segmentation in Contemporary Marketing... 2 2. Traditional Methods of Segmentation and their Limitations... 2 2.1 Lack of Homogeneity... 3 2.2 Determining

More information

Assessing trade-offs between energy consumption and security in sensor networks: simulations or testbeds?

Assessing trade-offs between energy consumption and security in sensor networks: simulations or testbeds? Assessing trade-offs between energy consumption and security in sensor networks: simulations or testbeds? F. Maraninchi 1, Grenoble INP/Ensimag, VERIMAG mainly summarizing discussions with: Laurent Mounier,

More information

A QoS-Aware Web Service Selection Based on Clustering

A QoS-Aware Web Service Selection Based on Clustering International Journal of Scientific and Research Publications, Volume 4, Issue 2, February 2014 1 A QoS-Aware Web Service Selection Based on Clustering R.Karthiban PG scholar, Computer Science and Engineering,

More information

About the Author. The Role of Artificial Intelligence in Software Engineering. Brief History of AI. Introduction 2/27/2013

About the Author. The Role of Artificial Intelligence in Software Engineering. Brief History of AI. Introduction 2/27/2013 About the Author The Role of Artificial Intelligence in Software Engineering By: Mark Harman Presented by: Jacob Lear Mark Harman is a Professor of Software Engineering at University College London Director

More information

CHAPTER 1 ANALYZING BUSINESS GOAL & CONSTRAINTS

CHAPTER 1 ANALYZING BUSINESS GOAL & CONSTRAINTS CHAPTER 1 ANALYZING BUSINESS GOAL & CONSTRAINTS Expected Outcomes Able to analyse a computer network requirements Able to analyse business goals and constraint Able to understand and apply the Top-Down

More information

Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis

Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis Abdun Mahmood, Christopher Leckie, Parampalli Udaya Department of Computer Science and Software Engineering University of

More information

5G Network Infrastructure for the Future Internet

5G Network Infrastructure for the Future Internet 5G Network Infrastructure for the Future Internet NCP/Florence Infoday Rémy Bayou, European Commission DG CONNECT, Unit "Network technologies" Mobile Communications: 1G to 4G The road to 5G 5G Challenges

More information

EQ-BGP: an efficient inter-domain QoS routing protocol

EQ-BGP: an efficient inter-domain QoS routing protocol EQ-BGP: an efficient inter-domain QoS routing protocol Andrzej Beben Institute of Telecommunications Warsaw University of Technology Nowowiejska 15/19, 00-665 Warsaw, Poland [email protected] Abstract

More information