1 / 14

Annual review ROME 2012

Annual review ROME 2012. WP 4 - Network. Work package - objectives. Task 4.1 Smart SPD driven transmission SE; SG; THYIA; TUC; UNIGE Task 4.2 Distributed self-x models ATHENA; THYIA, TUC, UNIGE, UNIUD, SE Task 4.3 Reputation-based resource management technologies

linnea
Download Presentation

Annual review ROME 2012

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Annual review ROME 2012 WP4 - Network

  2. Work package - objectives • Task 4.1 Smart SPD driven transmission • SE; SG; THYIA; TUC; UNIGE • Task 4.2 Distributed self-x models • ATHENA; THYIA, TUC, UNIGE, UNIUD, SE • Task 4.3 Reputation-based resource management technologies • HAI; SE, TECNALIA, INDRA, MGEP, TUC, UNIROMA1 • Task 4.4 Trusted and dependable Connectivity • ISL; SE, SCOM, TECNALIA, HAI, MGEP, THYIA, TUC

  3. Smart SPD-driven transmission • Goal: providingreliable and efficient communications even in critical (physical) channel conditions • Adaptive and flexible algorithms for dynamically configuring and adapting various transmission-related parameters • Based on the Software Defined Radio (SDR) or Cognitive Radio (CR) technology • Shall be SCA-compliant • Security-aware framework • Deployment ofdifferent state-of-the-art technologies for detecting and countering reconfigurability-related and cognitive capability-related security issues and attacks

  4. Smart SPD-driven transmission (2) Software Communications Architecture (source: SCA 4.0 specification)

  5. Smart SPD-driven transmission (3) Security-aware framework (source: nSHIELD deliverable 2.4)

  6. Smart SPD-driven transmission (4) Trusted Network Routing Service (source: nSHIELD deliverable 2.4)

  7. Distributed self-x models • Goal: Providing network transmission technologies to support the dependable self-x technologies at the node level by means of Cognitive Radio technologies • Self-x refers to: • Self-(re)configuration • Self-management • Self-supervision • Self-recovery • Evaluation of risks has been performed so far, with the following types of attacks identified and analyzed: • Side channel attacks • Denial-of-Service (DoS) attacks

  8. Reputation-based resource management technologies • Goal: Using information of nodes’ past behaviours in order to estimate the current trustworthiness level • Reputation and trust based Intrusion Detection Systems for WSN • New distributed approach (vs. centralized in pSHIELD) • Agent based detection minimises the communication needs • Both anomaly and specification-based detection • Anomaly detection using a simpler model (to reduce CPU and power consumption) • Coupled with specification based detection to enhance efficiency

  9. Reputation-based resource management technologies (2) • Distributed detection • Node monitors local activities • If not sure about nature of an activity, node contacts other nodes in the neighbourhood • Reputation and trust of node set according to local and neighbour information • When anomalous activities are flagged locally, this information is broadcasted to the rest of nodes

  10. Trusted and dependable connectivity • Goal: assuring communicationsintegrity to the maximum possible extent • Regarded at two levels: • Trusted Network Routing Service • Possibility of choosing between different routing schemes, based on the input of the reputation-based scheme • Secure Data Exchange/Communication Service • Encryption schemes to enable protection (and integrity) of data • CRC encoding and checksum techniques to verify data integrity • Authentication schemes to verify identity of sender/receiver

  11. Applications and scenarios • AirBand - group of frequencies in the VHF radio spectrum allocated to radio communication in civil aviation • ESs are usedtoperformthecommunications, forexample, VOR uses radio beacons • nSHIELD couldbe usedbyalltheapplicationsusingAirbandfrequencies (VOR, ATIS, ASOS, ILS…) toprovide SPD capabilities in theircommunications • GSM-R - network for railway communication based on GSM technology but uses specific frequency spectrum • Already has several SPD featuresimplemented, such as: • Availabilityrequirement using full redundancy of radio coverage and all network elements • Securityand integrity requirements encrypting the information (a Key Management Service distributes encryptationkeys) • Security measures inheritedfrom GSM techonology

  12. Applications and scenarios (2) • Machine Redable Travel Documents (MRTD) – travel documents equipped with a smart card processor to perform biometric identification (face identification) of the holder • The new passport design is intended to serve two purposes: • The biometric information can be used to verify the identity in the border control • Cryptographic technologies can be used to ascertain the integrity and originality of passports, thus preventing high quality passport forgeries

  13. Contributions • Marko Cesena – SELEX ELSAG • Krešimir Dabčević, Lucio Marcenaro – UNIVERSITY OF GENOVA • InakiEguia Elejabarrieta – TECNALIA • Barri Vilardell, Ignasi Oriol – INDRA • Andreas Papalambrou – ATHENA/ISI • Roberto Uribeetxeberria - MONDRAGON UNIVERSITY • Alex Papanikolaou – TECHNICAL UNIVERSITY OF CRETE

  14. The END That’s all folks!

More Related