1 / 9

Management and Security WG

Management and Security WG. Adya, Hubaux, Qiu, Rao, Simon, Wetherall. Outline. Problem Space State of the Art Research Challenges. Problem Space. Security Classic security and privacy issues Confidentiality, integrity, authentication Denial of service Restricting network access

deliz
Download Presentation

Management and Security WG

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Management and Security WG Adya, Hubaux, Qiu, Rao, Simon, Wetherall

  2. Outline • Problem Space • State of the Art • Research Challenges

  3. Problem Space • Security • Classic security and privacy issues • Confidentiality, integrity, authentication • Denial of service • Restricting network access • Management • Accounting, provisioning, configuration • Fault diagnosis and repair

  4. State of the Art • Classic security problems technologically solved but deployment lags • DoS is an open problem • Few or poor management tools • Do low-level data collection • Do minimal fault diagnosis Much of above applies to wired networks as well

  5. Research Challenges Epsilon Management • How much can we reduce management? • Complete zero management infeasible • Incentives require management • Accounting, provisioning, configuration • E.g., Bootstrapping: what should the mesh box do • What is the charging model? What accounting data to collect?

  6. Research Challenges Fault Diagnosis and Repair • What kind of faults to analyze? • Connectivity: why are you disconnected? • Performance: what is normal behavior? • Misconfiguration, broken equipment • How do you detect and fix these faults? • Tools to detect various fault and recover from them • How much can the network be self-healing?

  7. Research Challenges Incentives for honest participation • Getting people to participate • Why should someone forward packets? • Detecting and punishing greedy behavior • Preventing protocol exploitation • Environmental tampering • Hardware tampering

  8. Research Challenges Denial of service • Physical attacks unpreventable but local • How can you locate the responsible nodes • Network attacks • How much can you localize DoS attacks? • Rationing scarce bandwidth fairly

  9. Predictions • Dan says • Administration and incentive overheads doom widespread deployment • Rest of us say • The world is not so gloomy!

More Related