566 research outputs found

    Report on a Working Session on Security in Wireless Ad Hoc Networks

    Get PDF
    No abstrac

    Toward a Formal Model of Fair Exchange - a Game Theoretic Approach

    Get PDF
    A fair exchange protocol is a protocol, in which two (or more) mutually suspicious parties exchange their digital items in a way that neither party can gain an advantage over the other by misbehaving. Many fair exchange protocols have been proposed in the academic literature, but they provide rather different types of fairness. The formal comparison of these proposals remained difficult, mainly, because of the lack of a common formal framework, in which each can be modelled and formal fairness definitions can be given. In this paper, we propose to use game theory for this purpose. We show how to represent fair exchange protocols with game trees and give three definitions of fairness using standard game theoretic notions. We are not aware of any other work that uses the apparatus of game theory for modelling fair exchange protocols

    Secure positioning in wireless networks

    Get PDF
    So far, the problem of positioning in wireless networks has been studied mainly in a nonadversarial setting. In this paper, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure positioning of wireless devices, that we call verifiable multilateration. We then show how this mechanism can be used to secure positioning in sensor networks. We analyze our system through simulations

    Joint Mobility and Routing for Lifetime Elongation in Wireless Sensor Networks

    Get PDF
    Although many energy efficient/conserving routing protocols have been proposed for wireless sensor networks, the concentration of data traffic towards a small number of base stations remains a major threat to the network lifetime. The main reason is that the sensor nodes located near a base station have to relay data for a large part of the network and thus deplete their batteries very quickly. The solution we propose in this paper suggests that the base station be mobile; in this way, the nodes located close to it change over time. Data collection protocols can then be optimized by taking both base station mobility and multi-hop routing into account. We first study the former, and conclude that the best mobility strategy consists in following the periphery of the network (we assume that the sensors are deployed within a circle). We then consider jointly mobility and routing algorithms in this case, and show that a better routing strategy uses a combination of round routes and short paths. We provide a detailed analytical model for each of our statements, and corroborate it with simulation results. We show that the obtained improvement in terms of network lifetime is in the order of 500%

    Enforcing Service Availability in Mobile Ad-Hoc WANs

    Get PDF
    In this paper, we address the problem of service availability in mobile ad-hoc WANs. We present a secure mechanism to stimulate end users to keep their devices turned on, to refrain from overloading the network, and to thwart tampering aimed at converting the device into a ``selfish`` one. Our solution is based on the application of a tamper resistant security module in each device and cryptographic protection of messages

    Telecommunication Services Engineering- Definitions, Architectures and Tools

    Get PDF
    This paper introduces telecommunication services engineering through a definition of services, of network architectures that run services, and of methods, techniques and tools used to develop services. We emphasize the Intelligent Network (IN), the Telecommunication Management Network (TMN) and TINA architecture

    JAMAP: a Web-Based Management Platform for IP Networks

    Get PDF
    In this paper, we describe JAMAP, a prototype of Web-based management platform for IP networks. It is entirely written in Java. It implements the push model to perform regular management (i.e. permanent network monitoring and data collection) and ad hoc management (i.e. temporary network monitoring and troubleshooting). The communication between agents and managers relies on HTTP transfers between Java applets and servlets over persistent TCP connections. The SNMP MIB data is encapsulated in serialized Java objects that are transmitted as MIME parts via HTTP. The manager consists of two parts: the management server, a static machine that runs the servlets, and the management station, which can be any desktop running a Web browser. The MIB data is transparently compressed with gzip, which saves network bandwidth without increasing latency too significantly
    • …
    corecore