MoB: A Mobile Bazaar for Wide area Wireless Services

Similar documents
Security Design.

MoB: A Mobile Bazaar for Wide-area Wireless Services

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

Cellular and Networks Application and Data Usage

Enterprise Buyer Guide

Intrusion Detection for Mobile Ad Hoc Networks

How To Write A Transport Layer Protocol For Wireless Networks

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido

Introduction to Wireless Sensor Network Security

Cisco Application Networking for IBM WebSphere

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks

Packet Level Authentication Overview

Design and Evaluation of Scalable Ubiquitous Discovery System

Structure and Performance of Open Access Networks Case Lappeenranta Model

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

Acceptable Use Policy Revision date: 26/08/2013

Wireless Security for Hotspots & Home PCCW Feb, 2009

Comparing Mobile VPN Technologies WHITE PAPER

Online music distribution Core-Edge Working Group Meeting, September 28-29, 2004 Natalie Klym Research Associate, MIT CFP

Active ISP Involvement in Content-Centric Future Internet Eugene Kim

Best Practices for Outdoor Wireless Security

Network Evolution, Cloud & Future Services. Opportunities & Challenges for Next-Decade Services

F-Secure Internet Security 2014 Data Transfer Declaration

Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach

Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks

HTTPS HTTP. ProxySG Web Server. Client. ProxySG TechBrief Reverse Proxy with SSL. 1 Technical Brief

TERMINAL BRIDGE EXTENSION OVER DISTRIBUTED ARCHITECTURE

LIST OF FIGURES. Figure No. Caption Page No.

Zscaler Internet Security Frequently Asked Questions

Implementation of e-intelligence Solutions for Internet Service Providers

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

Lecture 7: Privacy and Security in Mobile Computing. Cristian Borcea Department of Computer Science NJIT

DNP Serial SCADA to SCADA Over IP: Standards, Regulations Security and Best Practices

G-Lab: A Future Generation Internet Research Platform

TS-3GB-S.R0103-0v1.0 Network Firewall Configuration and Control (NFCC) - Stage 1 Requirements

Testing & Assuring Mobile End User Experience Before Production. Neotys

emontage: An Architecture for Rapid Integration of Situational Awareness Data at the Edge

Why MCL-Bridge for SAP

Evolution of Peer-to-Peer Systems

%WILEY TELEVISION, MOBILE AND CONVERGED NETWORKS DIGITAL VIDEO DISTRIBUTION IN BROADBAND, TRENDS, CHALLENGES AND SOLUTIONS. Sanjoy Paul, Ph.

Cisco IOS Flexible NetFlow Technology

Advanced Networking (MSCSP) + Wireless Internet (II, IN)

The Challenges of Stopping Illegal Peer-to-Peer File Sharing

Wireless Sensor Networks

TOPOLOGIES NETWORK SECURITY SERVICES

MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card

Mobile Cloud Computing. Chamitha de Alwis, PhD Senior Lecturer University of Sri Jayewardenepura

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

PROPOSAL ON THE REGULATORY FRAMEWORK FOR THE PROVISION OF INTERNET SERVICES IN LESOTHO HEARING NO.3/2004

Cisco Outdoor Wireless Network Serves Up Automatic Meter Reading

Supporting Municipal Business Models with Cisco Outdoor Wireless Solutions

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Skype network has three types of machines, all running the same software and treated equally:

Course Curriculum for Master Degree in Electrical Engineering/Wireless Communications

Tomás P. de Miguel DIT-UPM. dit UPM

How To Integrate Hosted Security With Office 365 And Microsoft Mail Flow Security With Microsoft Security (Hes)

Internet Architecture for Robust Mobility. Sangheon Pack (백상헌) Korea University

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

Intellectual Property Rights: Potential of Digital Rights Management for Digital Content

Clavister SSP Security Service Platform firewall VPN termination intrusion prevention anti-virus content filtering traffic shaping authentication

V-ISA Reputation Mechanism, Enabling Precise Defense against New DDoS Attacks

Should and Can a Communication System. Adapt Pervasively An Unofficial View

Check Point submitted the SWG Secure Web Gateway for

MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM?

NetFlow Tracker Overview. Mike McGrath x ccie CTO mike@crannog-software.com

Privacy & Security of Mobile Cloud Computing (MCC)

COMSATS Institute of Information Technology, Abbottabad Department of Computer Science

Enterprise VoIP Services over Mobile Ad-Hoc Technologies

REVIEW PAPER ON PERFORMANCE OF RESTFUL WEB SERVICES

3G/Wi-Fi Seamless Offload

Whitepaper. Controlling the Network Edge to Accommodate Increasing Demand

Enterprise Network Solution

Cisco Unified Workforce Optimization for Cisco Unified Contact Center Express

Frequently Asked Questions

DNS, CDNs Weds March Lecture 13. What is the relationship between a domain name (e.g., youtube.com) and an IP address?

Administrivia. CSMA/CA: Recap. Mobility Management. Mobility Management. Channel Partitioning, Random Access and Scheduling

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

Securing MANET Using Diffie Hellman Digital Signature Scheme

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0

Impact of architecture on governance: IPv6 and Internet post-ip

The Cisco Mobility Express Solution

Deploy and Manage a Highly Scalable, Worry-Free WLAN

The allocation algorithm for data centers in cloud computing architecture from security perspective

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

Agile Information Security Management in Software R&D

Network Virtualization

Cisco Wireless Control System (WCS)

Architectural Model for Wireless Peer-to-Peer (WP2P) File Sharing for Ubiquitous Mobile Devices

Deploying a Secure Wireless VoIP Solution in Healthcare

Using SIP Protocol for Bi-directional Push-to-Talk Mechanism over Ad-Hoc Network

Introduction to Information Technology

Computer System Management: Hosting Servers, Miscellaneous

DOS ATTACKS IN INTRUSION DETECTION AND INHIBITION TECHNOLOGY FOR WIRELESS COMPUTER NETWORK

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing

An Architecture Concept for Mobile P2P File Sharing Services

Transcription:

MoB: A Mobile Bazaar for Wide area Wireless Services R. Chakravorty, S. Agarwal, S. Banerjee, I. Pratt T 110.7190 Research Seminar on Telecom Software 28.09.2005 Yrjö Raivio 28916V T 110.7190 Research Seminar on telecom software/28.09.2005/yr 1

Motivation Mobiles lack internet connectivity WLAN: no coverage everywhere Cellular: expensive, high latency, low BW, occasional interruptions Cellular and service providers are coupled, not possible to select speech and data services from different operators Long term agreements T 110.7190 Research Seminar on telecom software/28.09.2005/yr 2

Mobile Bazaar (MoB) Design Targets Open Market Collaborative Architecture Improve Wide area wireless data service performance by 1) Decoupling infrastructure from service providers 2) Allows service interactions on arbitrary timescales 3) Flexible compositions of service interactions Multiple providers simultaneously Anybody can sell services, reselling Prof. Raymond Steele: Anybody should be able to make services on any access, 3G 2001 Competition T 110.7190 Research Seminar on telecom software/28.09.2005/yr 3

Device roles: Roles in the Service Business Web sites and Applications roles: Web Service Consumers Web Service Providers Mobile operator roles: Web Service Provider Web Service Consumer Service protocols Authentication Discovery Profile Location Charging Messaging Presence Web Service Consumers Web Service Providers T 110.7190 Research Seminar on telecom software/28.09.2005/yr 4

Service Value Chain Terminal Radio network Core network Network Application ISP Portals Content providers 1... 2 N 1 2... N 1 2... N 1 2... N 1 2... N 1 2... N 1 2... N T 110.7190 Research Seminar on telecom software/28.09.2005/yr 5

Introduction Service examples: Bandwidth, Location, Time, Web Proxy caching, Search, Filtering Hop by hop, no routing protocols needed Mainly applicable to proximity range utilizing WLAN or BT On Application layer Free market, no control Incentive, everybody can set their own prices Reputation management Billing and Accounting T 110.7190 Research Seminar on telecom software/28.09.2005/yr 6

Architecture Vito Components: 1) Internet connectivity 2) Device to device connectivity 3) 3rd party accounting, billing and reputation management Service trading decisions based on user preferences and policies, e.g. battery low Trust or no trust, Billing or no billing Based on ebay trust management system, accounting added T 110.7190 Research Seminar on telecom software/28.09.2005/yr 7

Operation (1/2) Each user registers with Vito to get a timestamped Reputation Certificate (RC); includes history information During the trade RCs are checked and new rating values are updated off line from and to RCs via Vito Feedback can be given by both the Trader and Customer Malicious Customer = Gives low scores independently of the service Malicious Trader = No service after payment Service first, pay next strategy Reputation risks Sybil attacks: malicious user acquires a new identity Collusions: group of users rate each other high Decentralized systems T 110.7190 Research Seminar on telecom software/28.09.2005/yr 8

Operation (2/2) T 110.7190 Research Seminar on telecom software/28.09.2005/yr 9

Experiment File Transfer T 110.7190 Research Seminar on telecom software/28.09.2005/yr 10

Simulation Location Accuracy T 110.7190 Research Seminar on telecom software/28.09.2005/yr 11

Good vs. Malicious Users T 110.7190 Research Seminar on telecom software/28.09.2005/yr 12

Basic idea is good but Concluding remarks Idealistic P2P model copied to mobile world as such A lot of similar academic research has been carried over with minor practical success Vito looks pretty nice solution but in a large system scalability can be questioned Malicious traders are not a problem due to reputation management Experiment and Simulation models look suspicious In general paper could be more compact and scientific T 110.7190 Research Seminar on telecom software/28.09.2005/yr 13

Challenges Mobile Operators do not like this; where is the incentive? Reselling can violate copyright How to prevent that users start to distribute free of charge? DRM? Hop by hop, what about the End to End security? Might work in Proximity but current data rates prevent the usage of cellular networks System does not react online if Customer exceeds his/her credit Would be interesting to see simulation on selection policy where Traders with different accesses (= prices and performance) were compared Discussion! T 110.7190 Research Seminar on telecom software/28.09.2005/yr 14