Sunday, December 11, 2011
Friday, October 21, 2011
Monday, September 12, 2011
Student Branch of C4I
Student Branch of Command, Control, Communications, Computers and Intelligence
- Activities
- Members
- Links
- SBC4I Table of Contents
- Contact
- doc/constitution.pdf
- doc/form.pdf
- image/sbc4i.jpg
Student Branch of of Command, Control, Communications, Computers and Intelligence at Sharif University of Technology
Sunday, May 22, 2011
Game-theoretic approach to mitigate packet dropping in wireless Ad-hoc networks
Game-theoretic approach to mitigate packet dropping in wireless Ad-hoc networks
Tootaghaj, Diman Zad ; Farhat, Farshid ; Pakravan, Mohammad-Reza ; Aref, Mohammad-Reza ;
Information Systems and Security Lab (ISSL), Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran
This paper appears in: Consumer Communications and Networking Conference (CCNC), 2011 IEEE
Issue Date : 9-12 Jan. 2011
On page(s): 163
Print ISBN: 978-1-4244-8789-9
Digital Object Identifier : 10.1109/CCNC.2011.5766444
Date of Current Version : 12 May 2011
ABSTRACT
Performance of routing is severely degraded when misbehaving nodes drop packets instead of properly forwarding them. In this paper, we propose a Game-Theoretic Adaptive Multipath Routing (GTAMR) protocol to detect and punish selfish or malicious nodes which try to drop information packets in routing phase and defend against collaborative attacks in which nodes try to disrupt communication or save their power. Our proposed algorithm outranks previous schemes because it is resilient against attacks in which more than one node coordinate their misbehavior and can be used in networks which wireless nodes use directional antennas. We then propose a game theoretic strategy, ERTFT, for nodes to promote cooperation. In comparison with other proposed TFT-like strategies, ours is resilient to systematic errors in detection of selfish nodes and does not lead to unending death spirals.
Risk of attack coefficient effect on availability of Ad-hoc networks
Risk of attack coefficient effect on availability of Ad-hoc networks
Tootaghaj, Diman Zad ; Farhat, Farshid ; Pakravan, Mohammad-Reza ; Aref, Mohammad-Reza ;
Information Systems and Security Lab (ISSL), Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran
This paper appears in: Consumer Communications and Networking Conference (CCNC), 2011 IEEE
Issue Date : 9-12 Jan. 2011
On page(s): 166
Print ISBN: 978-1-4244-8789-9
Digital Object Identifier : 10.1109/CCNC.2011.5766445
Date of Current Version : 12 May 2011
ABSTRACT
Security techniques have been designed to obtain certain objectives. One of the most important objectives all security mechanisms try to achieve is the availability, which insures that network services are available to various entities in the network when required. But there has not been any certain parameter to measure this objective in network. In this paper we consider availability as a security parameter in ad-hoc networks. However this parameter can be used in other networks as well. We also present the connectivity coefficient of nodes in a network which shows how important is a node in a network and how much damage is caused if a certain node is compromised.
Wednesday, May 18, 2011
Game-Theoretic Approach in Network Security, Availability and Privacy
Game-Theoretic Network Simulator
This is GTNS: game theoretic network simulator help document. In order to download GTNS click it. To download samples click it!
Introduction:
GTNS is a discrete-event network simulator targeted primarily for research and educational use.
GTNS is written in Visual C++ programming language and supports different network topologies. This simulator was first produced to implement locally multipath adaptive routing (LMAR) protocol, classified as a new reactive distance vector routing protocol for MANETs. LMAR can find an ad-hoc path without selfish nodes and wormholes using an exhaustive search algorithm in polynomial time. Also when the primary path fails, it discovers an alternative safe path if network graph remains connected after eliminating selfish/malicious nodes. The key feature of LMAR to seek safe route free of selfish and malicious nodes in polynomial time is its searching algorithm and flooding stage that its generated traffic is equi-loaded compared to single-path routing protocols but its security efficiency to bypass the attacks is much better than the other multi-path routing protocols. LMAR concept is introduced to provide the security feature known as availability and a simulator has been developed to analyze its behavior in complex network environments [1]. Then we have added detection mechanism to the simulator, which can detect selfish nodes in network. The proposed algorithm is resilient against collision and can be used in networks which wireless nodes use directional antennas and it also defend against an attack that malicious nodes try to break communications by relaying the packets in a specific direction. Some game theoretic strategies to enforce cooperation in network have been implemented in GTNS, for example Forwarding-Ratio Strategy, TFT-Strategy and ERTFT. This tutorial helps new users to get familiar with GTNS and run different network scenarios.
Getting Started with GTNS:
After debugging GTNS simulator you can see the following window:
Figure 1- GTNS simulator environment
Network-Router:
To implement your own network you can click on Network-Router as you can see in figure 2 and 3 you can add one node by clicking on add button, or you can add different number of nodes, randomly placed over screen by clicking the Self-Generate button. In figure 4 you can see a sample network topology created by adding 5 nodes to the network. You can change the default preferences of node by clicking on Default Preferences button, or you can change different parameters of any node in the network by clicking on that node in the screen. Any node in the network can be deleted or you can change its parameters during simulation or you can force it as a selfish node. Figure 5 shows different parameters of nodes that can be changed. You can change the router's caption, its coverage range, delay, X_axis and Y_axis of the router in the screen, the length and width of router image and battery power of any router can be changed in the network.
Figure 2- Network-Router button
Figure 3- Network-Router-Self-Generate button
Figure 4- A sample of network topology created by adding 5 nodes in GTNS environment
Figure 5- Editing node parameters by clicking on any node on the screen
Creating Links between nodes in GTNS:
As it is seen in figure 6 you can add links between nodes by clicking on Network-Link-Self-Generate button. All nodes which are in the coverage range of each other will be connected with a full-duplex link.
You can also add links between any two nodes in network by clicking on Network-Link-Add. Figure 7 shows different parameters that can be changed by clicking this button. You can select two routers that you want to make a link between them and frequency and duplicity of the link. You can add wormhole links between any two nodes by creating links between nodes which are not in the coverage range of each other. During simulation you can add or delete a specific link between any two nodes in network.
Figure 8 shows a sample topology created by using Link-Self-Generate button.
Figure 6- Adding links between nodes in GTNS simulator
Figure 7- Different parameters that can be changed by clicking Link-Add button
Figure 8- A sample network created by adding self-generate links between 10 nodes in GTNS
Adding Traffic to network:
As you see from figure 9, you can add traffic between any two nodes in network by clicking Network-Traffic-Add. Figure 10 shows different parameters that you can change when you want to add traffic between any two source and destination node in network. You can select routing protocol and start time of traffic sparks.
Figure 9- Adding traffic to the network
In GTNS you can add random traffic to network. Figure 11 shows the window when you click on Network-Traffic-Self-Generate-Ad-hoc. You can select the starting and stopping time of random traffic generated, and number of connections during this interval. Data traffic rate and different protocols can be selected in this window.
Figure 10- different parameters that can be changed during adding traffic between any two nodes
Figure 11- Different parameters that can be selected by adding random traffic in network
Simulation in GTNS:
To simulate the network created in GTNS, you should click on Simulation-Profile button as you can see in figure 12. Then the Simulation window will be opened where you can see the clock and view events. Figure 13 shows Simulation window. You can also change the speed of simulation by moving Master and slave speed buttons.
By clicking on Resume button you can run the simulation and see different packet exchange in network.
For example we have created one connection between node 1 and 64. After clicking Resume button node 1 will broadcast RReq packets. Figure 14 shows broadcasting of RReq packets, when RReq passes a link, it will become blue. When the first RReq packet reaches to destination, node 64 will broadcast RRep packets. Figure 15 shows broadcasting of RRep packets. Links become yellow when RRep packets pass them.
Figure 12- A sample grid network topology and simulation button in GTNS
Figure 13- Simulation-Profile window
Figure 14- A sample grid network topology and broadcasting of RReq packets
Figure 15- A sample grid network topology and broadcasting of RRep packets
Afterwards node 1 sends the traffic towards node 64 by choosing the shortest path in its routing table. The intermediate nodes send the traffic towards their first index entry, the best path. The purple line in Figure 16 shows the forwarding path from the source to the destination (this line is overwritten by the return path of ACK packet). The ACK packet traverses the reverse path (the green line) back to the source, as the intermediate nodes set the reverse hop back to the source in their routing tables. So the green line of reverse path over-color the purple line of forwarding path.
Figure 16: Established connection with the shortest path
Getting results:
You can see different statistic results of the simulation by clicking on Simulation-Statistic button as shown in figure 17. Figure 18 shows the Statistics window opened when you click on this button. You can see different parameters of network. For example you can see number of data packets that have been forwarded by intermediate nodes in Data Trans. No, you can see number of forwarded RReq and RRep packets in the fields RReq Trans. No and RRep Trans. No respectively. Also number of data packets and number of Ack packets generated during simulation are shown in Gen. Data No. CN and Gen. Ack No. CN. Number of established connections and total power of network after simulation and number of ad-hoc nodes and selfish nodes of type 1 and 2 and clock of the system is shown in this window.
Also after clicking on Simulation-Statistics button, the results of simulation will be saved in my_file.txt file. An example of this file and simulation results of some simulations are shown in figure 19.
Figure 17- Simulation-Statistics button in GTNS
Figure 18- The Statistics window which shows the simulation results created in GTNS
Figure 19- Simulation results written in my_file.txt in GTNS
REFERENCES:
[1] F. Farhat, M. R. Pakravan, M. Salmasizadeh, M. R. Aref, "Locally Multipath Adaptive Routing Protocol Resilient to Selfishness and Wormholes", ISPEC 2010: 187-200.
[2] http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5766445
[3] http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5766444
- Location and data privacy
- Privacy and security mechanisms with selfish players
We study security/privacy mechanisms in the presence of selfish stakeholders, notably by means of game theory. For more information,
click here. We are applying this approach notably to:
. Securing online advertisement
. Recommendation systems
. Revocation
. Location privacy
- Secure neighbor discovery
Other aspects of wireless networks (these projects have been phased out)
- Secure vehicular communications
- Non-cooperative behavior in wireless networks
- Key management in decentralized wireless networks
- DOMINO (protecting WiFi hotspots against greedy behavior)
- CommonSense (Water management in rural areas by means of wireless sensors)
- Wireless Sensor Networks with Mobile Elements
- Group Communication in ad hoc networks
Tuesday, April 26, 2011
Information Systems and Security Lab
Information Systems and Security Lab
Home
- People
- Groups
- Publications
- papers/ghabeli/Commletter.pdf
- papers/ghabeli/IET1.pdf
- papers/ghabeli/IET2.pdf
- papers/salimi/IET1.pdf
- papers/salimi/IET2.pdf
- papers/yassae/Yasaee Slepian-Wolf Coding Over Cooperative Relay Networks.pdf
- papers/akhbari/IET_5494868.pdf
- papers/akhbari/ITW09.pdf
- papers/farhat
- papers/farhat/lmar.pdf
- papers/farhat/1569353017.pdf
- papers/farhat/1569353021.pdf
- Links
- Contents
- Contact
Wednesday, April 20, 2011
Cryptography and Information Theoretic Security Workshop
Cryptography and Information Theoretic Security Workshop
Department of Electrical Engineering, Sharif University of Technology.
Date & Location
Wednesday, 4th of May, 2011 (Ordibehesht 14, 1390)
Kahroba Hall, EE Dep, Sharif Uni of Tech.
Presentations Schedule
Mrs. Somayeh Salimi (PhD Student): Secret key sharing from the information theoretic point of view
Ms. Parisa Babaheydarian (MSc Student): A new secret key agreement scheme in a four-terminal networks
Mr. Amir Sonee (MSc Graduate): Cooperation for secrecy in relay networks
Ms. Maryam Rajabzadeh Assar (PhD Student): Design and Analysis of Electronic Voting Protocols
Mr. Farshid Farhat (PhD Student): Security Improvement of Routing Protocols in Ad hoc Networks
Ms. Diman ZadTootaghaj (MSc Graduate): Game-theoretic approach to mitigate packet dropping in wireless ad hoc networks
Mr. Mohammad Ehdaie (PhD Student): Key Pre-Distribution Schemes for Wireless Sensor Networks
Mr. Mahdi Alaghband (PhD Student): Key management infrastructures in heterogeneous wireless sensor networks
Ms. Zahra Ahmadian (PhD Student): Distinguishing Attack on Shannon cipher
Mr. Hadi Soleymani (MSc Graduate): On the security o AES
Sponsors
Center of Excellence in Cryptology
Cryptology Chair of Iranian National Science Foundation
Student Branch of Iranian Society of Cryptology
At
Department of Electrical Engineering
Sharif University of Technology
REGISTER NOW
Friday, March 18, 2011
Collaborative Workshopbetween Department of Informatics, University of Bergen and Department of Electrical Engineering, Sharif University of Technology
Collaborative Workshopbetween Department of Informatics, University of Bergen and Department of Electrical Engineering, Sharif University of Technology
Date & Location
Wednesday, 4th of May, 2011 (Ordibehesht 14, 1390)
Kahroba Hall, EE Dep, Sharif Uni of Tech.
Presentations Schedule
Prof. Tor Helleseth: Sequences and Stream Ciphers Generals
Prof. Torleiv Kløve: Error Detection in Coding Theory
Dr. Aleksander Kholosha: Pomoranch Stream Cipher Designer
Dr. Irina Naydenova: Coding Theory Aspects
Mr. Seyyed Mehdi Hassanzadeh (PhD student): New Statistical Tests for Cryptographic Primitives
Mr. Mohammad Reza Sohizadeh Abyaneh (PhD Student): Lightweight Cryptography
Mrs. Somayeh Salimi (PhD Student): Secret key sharing from the information theoretic point of view
Mr. Farshid Farhat (PhD Student): Security Improvement of Routing Protocols in Ad hoc Networks
Mr. Mohammad Ehdaie (PhD Student): Key Pre-Distribution Schemes for Wireless Sensor Networks
Mr. Mahdi Alaghband (PhD Student): Key management infrastructures in heterogeneous wireless sensor networks
Ms. Maryam Rajabzadeh Assar (PhD Student): Design and Analysis of Electronic Voting Protocols
Ms. Zahra Ahmadian (PhD Student): Distinguishing Attack on Shannon cipher
Sponsors
Center of Excellence in Cryptology
Cryptology Chair of Iranian National Science Foundation
Student Branch of Iranian Society of Cryptology
At
Department of Electrical Engineering
Sharif University of Technology
REGISTER NOW