110608 baras comin labs keynote

Upload: yanmpa

Post on 06-Apr-2018

232 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/3/2019 110608 Baras Comin Labs Keynote

    1/69

    Copyright John S. Baras 2010Copyright John S. Baras 2010 1

    Challenges and Opportunities for

    Future Broadband Networks:

    From Physical to Services to Social

    John S. BarasInstitute for Systems Research

    Electrical and Computer Engineering Department

    Fischell Bioengineering Department

    Applied Mathematics, Statistics and Scientific Computation ProgramUniversity of Maryland, USA

    LABEX COMIN Kick-off MeetingJune 8, 2011

    INRIA Rennes Bretagne Atlantic

    Maryland Hybrid NetworksCenter (HyNet)

  • 8/3/2019 110608 Baras Comin Labs Keynote

    2/69

    Copyright John S. Baras 2010Copyright John S. Baras 2010 2

    Outline

    Broadband Communication Infrastructures andtheir Significance

    Component-Based Wireless Network Protocol

    Design Dynamic Network Trust

    Trusted Routing

    Cross Layer and Compositional Security

    Constrained Coalitional Games

    An Integrated Model and FoundationalProblems

  • 8/3/2019 110608 Baras Comin Labs Keynote

    3/69

    Copyright John S. Baras 2010Copyright John S. Baras 2010 3

    AT&T; Cisco Visual Networking Index:

    Approaching the ZettaByte Era

  • 8/3/2019 110608 Baras Comin Labs Keynote

    4/69

    Copyright John S. Baras 2010

    Shaping Society and Civilization

    Social significance of broadband access impacton civilized societies:

    Digital divide

    Information - knowledge society

    Health care

    Education

    Economic development

    Environment and habitats

    4

  • 8/3/2019 110608 Baras Comin Labs Keynote

    5/69

    Copyright John S. Baras 2010Copyright John S. Baras 2010 5

    Next Generation Data Centers

    1000x gain in performance

    Exascale: Dramatically moreefficient data centers designed

    across components,interconnects, power & cooling,virtualization, management, andsoftware delivery

    Photonics: Replace copperwith light to transmit data

  • 8/3/2019 110608 Baras Comin Labs Keynote

    6/69

    Copyright John S. Baras 2010

    Sustainable Data Center

    Reduce data center costs on the bottom line and the environment

    Reduce total cost of operationof a data center by 50% and

    carbon footprint by 75%, whilemeeting Quality of Service goals

    Real-time management of

    data center environmentReal-time management ofservice application instances

    Data center modeling, synthesisand optimization

    6

  • 8/3/2019 110608 Baras Comin Labs Keynote

    7/69Copyright John S. Baras 2010

    OpenFlow OpenNet

    Programmable networks

    Open, flexible, wired and wirelessnetwork platform to enable rapid

    introduction of new functionality

    End-to-end quality of service,reliability, security, mobilityand management

    Scalable and energy-efficientdata center networks

    7

  • 8/3/2019 110608 Baras Comin Labs Keynote

    8/69Copyright John S. Baras 2010

    Green Communications:

    Some Statistics & Facts

    2 % of global energy consumption To rise to 10 % by 2020

    Energy was never an issue in design & operation

    Green: source & expenditure

    Modes of consumption: transmission, processing,

    on-status Hot spots: data centers, base stations

    Our focus

    Internet Wireless

    8

  • 8/3/2019 110608 Baras Comin Labs Keynote

    9/69Copyright John S. Baras 2010

    Saving Margins

    Elementary computation task: C-bit

    Current technology: ~ 10-8 10-9 Joules/C-bit

    Potential bound: 10-21 10-23 Joules/C-bit(from thermodynamics)

    Quantum-limit: zero!(Reversible computation) (At infinite delay cost)

    Can run networks worldwide 10,000 more energy efficiently--set target at 1,000

    Means: run them for three years with the same energy it takes today for a day!9

  • 8/3/2019 110608 Baras Comin Labs Keynote

    10/69Copyright John S. Baras 2010

    Broadband Wireless :

    A glimpse into the future

    LTE, WiMax technologies and beyond: multiple MBps

    to the mobile user

    Increasing to pervasive appearance of

    infrastructureless networks Self-configurable networks

    Self-monitoring

    Distributed dynamic content depositories

    Distributed security

    New technologies and materials for miniaturization

    10

  • 8/3/2019 110608 Baras Comin Labs Keynote

    11/69Copyright John S. Baras 2010

    Broadband Wireless:

    Shaping Societies and Civilization

    11

  • 8/3/2019 110608 Baras Comin Labs Keynote

    12/69Copyright John S. Baras 2010

    While the last 50 years have been dominated by a march to ever

    more complex computers, the next few decades will see the rise

    of simple sensors -- by the billions. Business Week

    Wireless Sensor Networks (WSN)

    Sensor and Sensor networks are becoming ubiquitous

    Embed numerous distributed devices to monitor andinteract with physical world

    Exploit spatially and temporally dense, in situ, sensingand actuation

    Networkthese devices so that they coordinate toperform higher-level identification and tasks.

    Distributed & large-scale like the Internet - but, physicalinstead of virtual, resource constrained, and with real-time constraints

    12

    http://www.berkeley.edu/news/media/releases/2002/08/images/mote.jpghttp://www-bsac.eecs.berkeley.edu/~pister/29Palms0103/Rene4stack.jpghttp://www.berkeley.edu/news/media/releases/2002/08/images/mote.jpghttp://www-bsac.eecs.berkeley.edu/~pister/29Palms0103/Rene4stack.jpghttp://www-bsac.eecs.berkeley.edu/~pister/29Palms0103/Rene4stack.jpghttp://www-bsac.eecs.berkeley.edu/~pister/29Palms0103/Rene4stack.jpghttp://www.berkeley.edu/news/media/releases/2002/08/images/mote.jpghttp://www-bsac.eecs.berkeley.edu/~pister/29Palms0103/Rene4stack.jpg
  • 8/3/2019 110608 Baras Comin Labs Keynote

    13/69Copyright John S. Baras 2010 13

    Energy Efficient

    and Intelligent Buildings

    DigitalVideo surveillance Access control

    Intrusiondetection

    Fire alarm

    Alarms management

    Energy /Inventory .Management

    http://images.google.com/imgres?imgurl=www.visonic.com/images/Pic/S1011.jpg&imgrefurl=http://www.visonic.com:8080/visintl/VisonicI.nsf/EFAB9F59B82F1E79C2256497004A295E/36DE65B7F60FEB89C225665F0033DB9C?OpenDocument&h=295&w=202&prev=/images?q=intrusion+dhttp://images.google.com/imgres?imgurl=www.visonic.com/images/Pic/S1011.jpg&imgrefurl=http://www.visonic.com:8080/visintl/VisonicI.nsf/EFAB9F59B82F1E79C2256497004A295E/36DE65B7F60FEB89C225665F0033DB9C?OpenDocument&h=295&w=202&prev=/images?q=intrusion+d
  • 8/3/2019 110608 Baras Comin Labs Keynote

    14/69Copyright John S. Baras 2010

    The Global Health Care Crisis The current system is unsustainable

    Many economic, social, medical reports support thisconclusion

    NAE-NIM Report (2005): Engineering andtechnology can help

    IVA workshop (2007): Technology, Economics andHealthcare

    IT can play a role towards the desired goal: High quality healthcare for all at low cost

    Patient participation a must Preventive medicine a must

    14

    Health IT and Wireless Networksand Devices

  • 8/3/2019 110608 Baras Comin Labs Keynote

    15/69Copyright John S. Baras 2010

    HEALTH IT Components

    Broadband Hybrid Communication Networkswith widely available access

    Universal patient records and dissemination Universal logistics support (insurance,databases, accounting, case management)

    Web-based services Mini-clinics and inexpensive tests and consultations Social, behavioral aspects Hospital information and management systems Multimedia systems, robotics, tele-surgery, new operating rooms

    Health care management systems Security, trust, authentication and privacy

    15

    I would like more Systems Engineering principles for Health Care

    Harvey V. Fineberg, President of the Institute of MedicineInnovation in Medical Technology, Whiting-Turner Lecture 04/21/09

  • 8/3/2019 110608 Baras Comin Labs Keynote

    16/69Copyright John S. Baras 2010

    Forthcoming

    16

  • 8/3/2019 110608 Baras Comin Labs Keynote

    17/69Copyright John S. Baras 2010

    Forthcoming

    Cell-phone Microscopy

    17

  • 8/3/2019 110608 Baras Comin Labs Keynote

    18/69Copyright John S. Baras 2010

    Convergence = New Home

    Health Platform

    Digital home entertainment infrastructure can be usedfor health

    Everyday health through everyday devices

    Personalized, proactive health info/reminders/agents

    INTEL 18

  • 8/3/2019 110608 Baras Comin Labs Keynote

    19/69Copyright John S. Baras 2010

    Broadband Wireless

    Benefits to Society

    Health Care

    Much higher quality health care at lower cost and

    much wider availability

    Essential for preventive maintenance basedhealthcare

    Essential for health care in rural and underdeveloped

    areas (almost 95% of the current earths population

    and locations)

    Patient education and awareness

    Physician, nurse and hospital training

    19

  • 8/3/2019 110608 Baras Comin Labs Keynote

    20/69

    Copyright John S. Baras 2010Copyright John S. Baras 2010 20

    Outline

    Broadband Communication Infrastructures andtheir Significance

    Component-Based Wireless Network ProtocolDesign

    Dynamic Network Trust

    Trusted Routing

    Cross Layer and Compositional Security

    Constrained Coalitional Games

    An Integrated Model and FoundationalProblems

  • 8/3/2019 110608 Baras Comin Labs Keynote

    21/69

    Copyright John S. Baras 2010

    Most Promising Technologies

    Cross-layer optimization Key challenge: automated ways to dynamically coordinate layers for best

    QoS

    Dynamic network topologies, exploiting radio capabilities and environmentinformation

    Multiple networks optimized for different loads (stream, data, broadcast,unicast, etc.)

    Adaptive MAC (spectrum, MIMO, beamforming)

    New physical layer concepts and designs interference mitigation

    Each node has multiple networks available

    Key challenge: automated ways to dynamically connect to networks forbest QoS

    Multiple routes (robustness and availability)

    Dynamic spectrum based on probing feedback

    Diversity in frequency

    21

  • 8/3/2019 110608 Baras Comin Labs Keynote

    22/69

    Copyright John S. Baras 2010

    DYNAMIC INTERCONNECTION AND

    INTEROPERABILITY

    Broadband wireless networks capable formultiple dynamic interface points

    Any node can serve as

    interface/gateway

    Fixed orhybridbroadband

    Key challenge:component - basednetworking

    22

  • 8/3/2019 110608 Baras Comin Labs Keynote

    23/69

    Copyright John S. Baras 2010

    COMPONENT- BASED NETWORKING

    How to synthesize resilient, robust, adaptive network protocols?

    Component-Based Networking (CBN)

    Components: modularity, cost reduction, re - usability,

    adaptability to goals, new technology insertion, validation and

    verification

    Interfaces: richer functionality intelligent/cognitive networks

    Theory and Practice of Component-Based Networking

    Heterogeneous components and compositionality

    Performance of components and of their compositions

    Back and forth from performance - optimization domain to correctness

    and timing analysis domain and have composition theory preserving

    component properties as you try to satisfy specs in both domains

    23

  • 8/3/2019 110608 Baras Comin Labs Keynote

    24/69

    Copyright John S. Baras 2010

    COMPONENT-BASED NETWORKING

    ExecutableModels

    PerformanceModels

    FormalModels

    Each Block hasComponents

    24

  • 8/3/2019 110608 Baras Comin Labs Keynote

    25/69

    Copyright John S. Baras 2010

    MODEL-BASED DESIGN TOOL

    Inputs, components, design parameters, sensitivity analysis, optimization.

    25

  • 8/3/2019 110608 Baras Comin Labs Keynote

    26/69

    Copyright John S. Baras 20106/8/2011

    MAC AND ROUTING COMPONENTS

    Routing Components routing protocols like OLSR [Baras08]

    Neighbor Discovery Component (NDC)

    Selector of Topology Information to Disseminate Component (STIDC)

    Topology dissemination Component (TDC)

    Route Selection Component (RSC)

    MAC Components based on CSMA-CA MAC protocols like IEEE802.11 [Baras08], and on schedules based MAC (USAP) [Baras09]

    Scheduler

    MAC

    Objective Design MANET adaptable to missions with predictable performance

    Approach Break traditional layers to components! Develop component-based

    models MANET that considers cross-layer dependency to improve theperformance

    Study the effect of each component on the overall MANET performance

    Copyright John S. Baras 2010 26

  • 8/3/2019 110608 Baras Comin Labs Keynote

    27/69

    Copyright John S. Baras 2010

    STIDC Benefits and Approach

    STIDC selects a subset of links to be broadcasted

    STIDC is a local pruning method for link selection

    STIDC reduces the broadcast storm problem of TDC OLSR uses set cover methods for MPR selection

    There are metrics that capture the stability of the MANET links

    Stable Path Topology Control (SPTC) that accounts for stabilitymetrics in link selection

    27

  • 8/3/2019 110608 Baras Comin Labs Keynote

    28/69

    Copyright John S. Baras 2010

    h

    Traditional Link-State Routing

    Neighbor Discovery

    Component (NDC)

    Topology Dissemination

    Component (TDC)

    h

    28

    C d Li k St t R ti

  • 8/3/2019 110608 Baras Comin Labs Keynote

    29/69

    Copyright John S. Baras 2010

    hh

    Compressed Link-State Routing

    Topology Control

    Neighbor Discovery

    Component (NDC)

    Topology Dissemination

    Component (TDC)

    Selector of Topology

    Information to

    Disseminate (STIDC)

    h

    29

  • 8/3/2019 110608 Baras Comin Labs Keynote

    30/69

    Copyright John S. Baras 2010

    Local View and Global View

    - local view is a subgraph of Ginduced by the k-hop neighbors of k,excluding the arcs of the strict k-hopneighbors.

    Ghlocal

    Ghglobal Gh

    local Gbroadcast

    Every host vertex h broadcastsa selective subset of the out-arcs. This forms a broadcastgraph

    .Gbroadcast j3

    j2

    j6

    j4

    j5

    j10

    j9j12

    j11

    j8

    j7

    j13

    j14

    j15 j16

    j17

    j18

    j19

    j20

    j21

    j23 j24

    j22 j1

    h

    30

    Global view

    T l C t l f Q S

  • 8/3/2019 110608 Baras Comin Labs Keynote

    31/69

    Copyright John S. Baras 2010

    Topology Control for QoS

    Rule-Based Routing

    Does preserve the QoS optimal

    paths for routing from h to every

    destination?

    Ghglobal

    31

    - local view is a subgraph of Ginduced by the k-hop neighbors of k,excluding the arcs of the strict k-hopneighbors.

    Ghlocal

    Ghglobal Gh

    local Gbroadcast

    Every host vertex h broadcastsa selective subset of the out-arcs. This forms a broadcastgraph

    .Gbroadcast j3

    j2

    j6

    j4

    j5

    j10

    j9j12

    j11

    j8

    j7

    j13

    j14

    j15 j16

    j17

    j18

    j19

    j20

    j21

    j23 j24

    j22 j1

    h

    Global view

  • 8/3/2019 110608 Baras Comin Labs Keynote

    32/69

    Copyright John S. Baras 2010

    ETX Link Stability Metric

    df forward delivery ratio

    dr reverse delivery ratio

    32

    u v

    df

    dr

    ETX(u, v) 1

    df dr

  • 8/3/2019 110608 Baras Comin Labs Keynote

    33/69

    Copyright John S. Baras 2010

    OLSR-ETX

    OLSR-ETX uses the ETX metric to select the

    pruned edge set, .

    33

    hpruned

    The best ETX metric for a two hop neighbor jminiNh

    1ETX(h,i) ETX(i, j)

    OLSR-ETX

    o chooses a minimal subset of one-hop neighbors

    o such that all two-hop neighbors are reachable by theirbest ETX metric path

    Note: best ETX path is of the form (h,i,j), i is a one-hop neighbor!

    QoS (Path Stability) Preserving

  • 8/3/2019 110608 Baras Comin Labs Keynote

    34/69

    Copyright John S. Baras 2010

    QoS (Path Stability) Preserving

    Topology Control

    xijG minpPijG wp

    o The optimal path stability is

    o Path stability metric of a path p in G is the additivecomposition of its link stability metrics, :auv ETX(u, v)

    wp

    auv

    (u,v)p

    34

    o Does OLSR-ETX pruning preserve the optimally stablepath?

  • 8/3/2019 110608 Baras Comin Labs Keynote

    35/69

    Copyright John S. Baras 2010

    3 Platoon Mobility Scenario

    35

    OLSR-ETX SPTC-ETX

    Saturation

    CL

    ~ 2 Mbps ~ 2 Mbps

    TC message

    rate

    923 kbps 890 kbps

    Long connection from 20 to 0 (platoonheads)

    Type Connection Offered-load

    Intra-

    platoon

    (1,3),(2,9),(4,6),(7,5),(20,

    29),

    (14,17),(16,11),(17,18),(19,12),

    (21,22),(23,27),(23,28)

    12 kpbs

    Inter-

    platoon

    (1,18)

    (20,11),(20,0)

    (10,1),(21,10)

    2.4 kbps

    6 kbps

    12 kbps

  • 8/3/2019 110608 Baras Comin Labs Keynote

    36/69

    Copyright John S. Baras 2010Copyright John S. Baras 2010 36

    Outline

    Broadband Communication Infrastructures andtheir Significance

    Component-Based Wireless Network ProtocolDesign

    Dynamic Network Trust

    Trusted Routing

    Cross Layer and Compositional Security

    Constrained Coalitional Games An Integrated Model and Foundational

    Problems

    Distributed Trust Management in Wireless

  • 8/3/2019 110608 Baras Comin Labs Keynote

    37/69

    Copyright John S. Baras 2010

    Distributed Trust Management in Wireless

    Autonomic Networks

    Distributed trust in autonomic networks Trust document distribution

    Trust (and Mistrust) spreading and dynamics

    Effects of topology on convergence (small world graphs)

    Trust as incentive for collaboration link with economic,social and biological network analysis

    Trust evaluation: direct and indirect ways; reputations,

    profiles

    Trust, reputation, recommender systems in web-based

    social networks and services

    37

  • 8/3/2019 110608 Baras Comin Labs Keynote

    38/69

    Copyright John S. Baras 2010

    Trust Credential Distribution

    No centralized trusted party Trust credentials are scattered in the network

    Problems: Where and how to find all needed credentials?

    Where and how to store credentials so that the searching is efficient?

    AB

    38

  • 8/3/2019 110608 Baras Comin Labs Keynote

    39/69

    Copyright John S. Baras 2010

    Related Work

    The problem of trust credential distribution shares manycharacteristics with P2P file sharing systems Freenet based credential distribution scheme [Eschenauer,

    Gligor and Baras, 2002]

    Network coding based file sharing has been shown to beefficient and based on local information only [Gkantsidis andRodriguez, 2005]

    A B

    G

    F

    E

    DC

    A sends outrequest for

    certificates of R

    G has certificate

    G --> R

    E has certificate

    H --> R

    1

    7

    2

    4

    3

    5

    6

    Request

    Reply w ith certificate

    Reply f or no certifcate

    Uses hashed keywordrouting, instead of flooding

    Replication of credentialwhere needed via caching

    39

  • 8/3/2019 110608 Baras Comin Labs Keynote

    40/69

    Copyright John S. Baras 2010

    Network Coding Based Scheme

    Main idea: Each user only communicates with a small subset of users

    (neighbors)

    A user frequently checks with its neighbors for new credentials

    Whenever a user forwards trust credentials, it produces a linearcombination of all the credentials it currently stores and thecombined documents it has received from its neighbors

    For mdistinct documents, a user can recover them after receivingmcombined documents for which the coefficient vectors arelinearly independent

    Advantage: Only local interactions -- all operations are decentralized

    No request-response procedure

    40

  • 8/3/2019 110608 Baras Comin Labs Keynote

    41/69

    Copyright John S. Baras 2010

    Operation Diagram

    Coefficient vector

    transmitted to user D

    combDoc2

    User C

    Cred4

    Cred1

    Cred2

    User A

    User B

    combDoc1

    a1 a

    2

    combDoc3User D

    b1

    b2

    a1

    a2

    1 2 3 1 1 2 2[ , , ] [ ' , ' ,0] [0,0,1]c c c b a a b

    41

  • 8/3/2019 110608 Baras Comin Labs Keynote

    42/69

    Copyright John S. Baras 2010

    Effectiveness

    Key question: how effective the credential distributionscheme is?

    50 credentials in thenetwork

    Results: 60 combineddocuments areenough to recover all

    50 credentials

    42

  • 8/3/2019 110608 Baras Comin Labs Keynote

    43/69

    Copyright John S. Baras 2010

    Simulation

    Compare network coding based scheme and Freenet-basedscheme

    Time to finish document distribution

    Number of users who obtained documentsneeded vs simulation time

    Network coding basedscheme is more efficient indistributing credentials,

    i.e., smaller finish time

    43

  • 8/3/2019 110608 Baras Comin Labs Keynote

    44/69

    Copyright John S. Baras 2010

    Dynamic Network Trust

    Trust evaluation, trust and mistrust dynamics

    Spin glasses (from statistical physics), phase transitions

    Indirect trust; reputations, profiles; Trust computation via lineariterations in ordered semirings

    Direct trust: Iterated pairwise games on graphs with players of many

    types

    ( 1) , ( ) |i ji j is k f J s k j N

    2 31a b

    ba

    2007 IEEE Leonard Abraham PrizeNew Book , 2010, Path Problemsin Networks

    44

    O li

  • 8/3/2019 110608 Baras Comin Labs Keynote

    45/69

    Copyright John S. Baras 2010Copyright John S. Baras 2010 45

    Outline

    Broadband Communication Infrastructures andtheir Significance

    Component-Based Wireless Network ProtocolDesign

    Dynamic Network Trust

    Trusted Routing

    Cross Layer and Compositional Security

    Constrained Coalitional Games An Integrated Model and Foundational

    Problems

    Pareto Optimal

  • 8/3/2019 110608 Baras Comin Labs Keynote

    46/69

    Copyright John S. Baras 2010

    Two objectives for routing Two classical

    problems

    Delay shortest path problem (min,+)

    Dual Trust spanning tree problem (min,max)

    minpPij

    f1(p) minpPij

    d(u, v)(u,v)p

    minpPij

    f2 (p) minpPij

    max(u,v)p

    t(u, v)

    Pareto Optimal

    Trusted Routing

    46

    Haimes Method for

  • 8/3/2019 110608 Baras Comin Labs Keynote

    47/69

    Copyright John S. Baras 2010

    minParetopPij

    d(u, v)(u,v)pmax

    (u,v)pt(u, v)

    ?

    minpPij

    d(u, v)(u,v)p

    subject to max(u,v)p

    t(u, v)

    minpPij

    max(u,v)p

    t(u, v)

    subject to d (u, v)(u,v)p

    Haimes Method for

    Trusted Routing (cont.)

    47

    Haimes Method for

  • 8/3/2019 110608 Baras Comin Labs Keynote

    48/69

    Copyright John S. Baras 2010

    Constraint

    minpPij

    d(u, v)(u,v)p

    subject to max(u,v)p

    t(u, v)

    max(u,v)p

    t(u, v)

    (u, v) p, t(u, v) EdgeExclusion

    Haimes Method for

    Trusted Routing (cont.)

    48

    Haimes Method

  • 8/3/2019 110608 Baras Comin Labs Keynote

    49/69

    Copyright John S. Baras 2010

    Haimes Method

    Two Stage Recipe

    G (V,E)

    Source

    1. G reduced graph O(|E|) 2. GSP SP on reducedgraph

    O(|V|.|E|)

    49

    Examples of Idempotent

  • 8/3/2019 110608 Baras Comin Labs Keynote

    50/69

    Copyright John S. Baras 2010

    Semiring Algebraic Path Problem

    Max likelihood

    Shortest Path

    Widest Path

    Most Reliable Path

    Shared link attributes

    Shared path attributes

    Examples of Idempotent

    Semirings

    ( , min, )

    _

    ( , max, min)

    ([0,1],max,)

    (2W, U, I )

    (2W, I , U)

    ([0,1],max,)

    50

    O tli

  • 8/3/2019 110608 Baras Comin Labs Keynote

    51/69

    Copyright John S. Baras 2010Copyright John S. Baras 2010 51

    Outline

    Broadband Communication Infrastructures andtheir Significance

    Component-Based Wireless Network ProtocolDesign

    Dynamic Network Trust

    Trusted Routing

    Cross Layer and Compositional Security

    Constrained Coalitional Games An Integrated Model and Foundational

    Problems

    Security Authentication Trust

  • 8/3/2019 110608 Baras Comin Labs Keynote

    52/69

    Copyright John S. Baras 2010

    Security, Authentication, Trust

    Universally Composable Security when possible?

    Software components and interfaces -- Design interfaces carefullyand robustly major doors of attacks

    Utilize to advantage the physical layer (vastly ignored todate)

    Wave form, RF and hardware peculiarities lead to unshakeable

    fingerprints

    Authenticate the device to the network and then the user to the

    device reduces attack risk (fewer times through the net)

    Distribute assurance function across software and hardware (increasesdifficulty to attacker immensely)

    Trusted platform module (TPM) architecture modifications to allowmultiple sources input (including biometrics) open

    TPM chip add on to portable devices (TCG, TCN)

    Chip authentication

    Distributed communal trust monitoring : Know thy neighbors well, butwatch them maintain assured neighborhood information

    52

    S it A th ti ti T t ( t )

  • 8/3/2019 110608 Baras Comin Labs Keynote

    53/69

    Copyright John S. Baras 2010

    Security, Authentication, Trust (cont.)

    Cross-layer trust computation across the network

    Distributed, self-checking, trust dynamics, topology effects

    Include trust in routing via path metrics

    Distributed control around compromised neighborhoodscontainment

    New distributed hybrid systems methods for IA and trustevaluation, combine logic and statistics Combining distributed model checking and theorem proving techniques

    Use natural randomness and other signatures for ID-based keying

    Design of distributed dynamic recommender and reputationsystems

    Using TPM, TCN, to implement specification-based policies andtesting of policies

    Trusted platforms in social networks

    53

    Physical Layer Security:

  • 8/3/2019 110608 Baras Comin Labs Keynote

    54/69

    Copyright John S. Baras 2010

    Instead of multiplexing

    the authentication

    We superimpose it

    And write

    s the message and t the authentication tag

    Current research: Extensions to Multicarrier LTE and WiMAX

    Physical Layer Security:

    Perturbed Modulation

    t

    s

    54

    E i l V lid i

  • 8/3/2019 110608 Baras Comin Labs Keynote

    55/69

    Copyright John S. Baras 2010

    Experimental Validation

    Demonstrated Very Low Power Authentication is Feasible

    55

    E i t l R lt

  • 8/3/2019 110608 Baras Comin Labs Keynote

    56/69

    Copyright John S. Baras 2010

    Experimental Results

    56

    Extension to Multicarrier

    LTE and WiMAX

    Physical Layer Security:

  • 8/3/2019 110608 Baras Comin Labs Keynote

    57/69

    Copyright John S. Baras 2010

    y y y

    Trusted Computing

    Trusted Platform Module (TPM)

    Protects the integrity and confidentiality of datawith hardware support

    Performs integrity measurements and reports them,thus attesting for the software running in the device

    Source: TCG Architecture Overview, http://www.trustedcomputinggroup.org

    57Copyright John S. Baras 2009

    Outline

  • 8/3/2019 110608 Baras Comin Labs Keynote

    58/69

    Copyright John S. Baras 2010Copyright John S. Baras 2010 58

    Outline

    Broadband Communication Infrastructures andtheir Significance

    Component-Based Wireless Network ProtocolDesign

    Dynamic Network Trust

    Trusted Routing

    Cross Layer and Compositional Security

    Constrained Coalitional Games An Integrated Model and Foundational

    Problems

    A k i

  • 8/3/2019 110608 Baras Comin Labs Keynote

    59/69

    Copyright John S. Baras 2010

    A Network is

    A collection of nodes, agents,

    that collaborate to accomplish actions, gains,

    that cannot be accomplished with out such

    collaboration

    Most significant concept for autonomic

    networks

    59

    Th F d l T d ff

  • 8/3/2019 110608 Baras Comin Labs Keynote

    60/69

    Copyright John S. Baras 2010

    The Fundamental Trade-off

    The nodes gain from collaborating

    But collaboration has costs (e.g. communications)

    Trade-off: gain from collaboration vs cost of

    collaboration

    Vector metrics involved typically

    Constrained Coalitional Games

    60

    Example 1: Network Formation -- Effects on Topology

    Example 2: Collaborative robotics, communications

    Example 3: Web-based social networks and services

    Example 4: Groups of cancer tumor or virus cells

    G i

  • 8/3/2019 110608 Baras Comin Labs Keynote

    61/69

    Copyright John S. Baras 2010

    Gain

    Each node potentially offers benefits V per time unit toother nodes: e.g. Vis the number of bits per time unit.

    Potential benefit V is reduced during transmissions due to

    transmission failures and delay

    Jackson-Wolingsky connections model, gain of node i

    rij is # of hops in the shortest path between i and j

    is the communication depreciation rate

    1

    ( ) ijr

    ij g

    w G V

    0 1

    if there is no path between andijr i j

    61

    C

  • 8/3/2019 110608 Baras Comin Labs Keynote

    62/69

    Copyright John S. Baras 2010

    Cost

    Activating links is costly

    Example cost is the energy consumption for sending data

    Like wireless propagation model, cost cijof link ijas a

    function of link length dij:

    P is a parameter depending on the transmission/receiver antennagain and the system loss not related to propagation

    is path loss exponent -- depends on specific propagation

    environment.

    ij ijc Pd

    62

    P i i G d C

  • 8/3/2019 110608 Baras Comin Labs Keynote

    63/69

    Copyright John S. Baras 2010

    Pairwise Game and Convergence

    Payoffof node i from the network is defined as

    Iterated process

    Node pair ij is selected with probability pij If link ij is already in the network, the decision is whether to sever it,

    and otherwise the decision is whether to activate the link

    The nodes act myopically, activating the link if it makes each at least as

    well off and one strictly better off, and deleting the link if it makeseither player better off

    End: if after some time, no additional links are formed or severed

    With random mutations , the game converges to a unique Pareto

    equilibrium (underlying Markov chain states )

    ( ) gain cost ( ) ( )i i i

    v G w G c G

    63

    G

    Coalition Formation at the

  • 8/3/2019 110608 Baras Comin Labs Keynote

    64/69

    Copyright John S. Baras 2010

    Stable State

    The cost depends on the physical locations of nodes

    Random network where nodes are placed according to a uniform

    Poisson point process on the [0,1] x [0,1] square.

    Theorem: The coalition formation at the stable state for n

    Given is a

    sharp threshold for establishing thegrand coalition ( number ofcoalitions = 1).

    For , the threshold is

    less than

    2

    0

    ln,

    nV P

    n

    0 1 2

    ln.

    nP

    n

    n = 20

    64

    Topologies Formed

  • 8/3/2019 110608 Baras Comin Labs Keynote

    65/69

    Copyright John S. Baras 2010

    Topologies Formed

    65

    Outline

  • 8/3/2019 110608 Baras Comin Labs Keynote

    66/69

    Copyright John S. Baras 2010Copyright John S. Baras 2010 66

    Outline

    Broadband Communication Infrastructures andtheir Significance

    Component-Based Wireless Network ProtocolDesign

    Dynamic Network Trust

    Trusted Routing

    Cross Layer and Compositional Security

    Constrained Coalitional Games An Integrated Model and Foundational

    Problems

    Dynamic Integrated Networks:

  • 8/3/2019 110608 Baras Comin Labs Keynote

    67/69

    Copyright John S. Baras 2010

    y g

    Humans, Machines, ICT,

    Multiple Interacting Multigraphs

    Nodes: agents, individuals, groups,organizations

    Directed graphs

    Links: ties, relationships

    Weights on links : value (strength,

    significance) of tie Weights on nodes : importance of

    node (agent)

    Value directed graphs withweighted nodes

    Real-life problems: Dynamic,time varying graphs,relations, weights

    67

    Social/Cognitive

    Information

    Comms

    S

    ijw : Sii w

    :S

    jj w

    I

    klw:I

    kk w :

    I

    ll w

    C

    mnw:

    C

    mm w : Cn

    n w

    Organizational needs

    Network architecture

    and operation

    Network Complexity:

  • 8/3/2019 110608 Baras Comin Labs Keynote

    68/69

    Copyright John S. Baras 2010 68

    p y

    Four Fundamental Challenges

    Multiple interacting dynamic multigraphs involved Collaboration multigraph: who collaborates with whom / when

    Communication multigraph: who communicates with whom / when

    Effects of connectivity topologies:

    Find graph topologies with favorable tradeoff between

    performance (benefit) vs cost of collaborative behaviors Small word graphs achieve such tradeoff; Expander graphs;

    Components, Interfaces, Compositional Synthesis Network protocols component based networking

    Compositional Universal Security

    Need for different probability models the classical Kolmogorovmodel is not correct Probability models over logics and timed structures

    Logic of projections in Hilbert spaces not the Boolean of subsets of a set

    Copyright John S. Baras 2010

  • 8/3/2019 110608 Baras Comin Labs Keynote

    69/69

    Thank [email protected]

    301-405-6606

    http://www.isr.umd.edu/~baras

    Questions?

    http://www.isr.umd.edu/~barashttp://www.isr.umd.edu/~baras