COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring. |
University of Cambridge > Talks.cam > Wednesday Seminars - Department of Computer Science and Technology > Security and Cooperation in Wireless Networks
Security and Cooperation in Wireless NetworksAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Timothy G. Griffin. According to most technology pundits, progress in wireless and sensor networks will lead us into a world of ubiquitous computing, in which myriads of tiny, untethered sensors and actuators will communicate with each other. Information technology will thus deliver its most encompassing and pervasive accomplishment to mankind, promptly taking care of the needs and wishes of everyone. Or maybe not. The described evolution is driven primarily by market forces and vastly ignores the users’ intentions. Yet the recent history of the Internet has shown that these intentions can have devastating effects; for example, spam, viruses, “phishing” and denial of service attacks have unfortunately become commonplace. The misbehavior of a relatively small number of users is leading to a substantial inconvenience to the whole community. Similar or even worse misdeeds are and will be perpetrated in wireless networks. This talk addresses the fundamental questions related to this problem, in particular: How are users and devices identified? How can a security association be established between two wireless peers? How can packets be securely and cooperatively routed in a multi-hop network? How can the fair share of bandwidth between nodes located in the same radio domain be guaranteed? How do wireless operators behave, if they have to share a given chunk of the spectrum? How can naturally selfish players be encouraged to behave cooperatively? And, above all, how is privacy protected? All these issues are addressed in a graduate textbook co-authored with Levente Buttyan, to appear in 2007, published by Cambridge University Press. The book treats each of these questions from a theoretical point of view and illustrates them by means of concrete examples such as mesh, ad hoc, vehicular, sensor, and RFID networks. More information about the book can be found at http://secowinet.epfl.ch/. The current version (around 460 pages) can be downloaded from there. About the speaker: http://people.epfl.ch/jean-pierre.hubaux This talk is part of the Wednesday Seminars - Department of Computer Science and Technology series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsVision Science Journal Club CUAAS (Cambridge University Atheist and Agnostic)Other talksThe Rise of Augmented Intelligence in Edge Networks Disease Migration The clinical and biological basis of prostate cancer - from diagnosis to personalised therapy CANCELLED Ñande reko: alterity and (non-)participatory research with guaraní women in Bolivia Cooperation, Construction, Coercion, Consent: Understanding the Role of Reimagined Urban Space within Nazi Germany and Fascist Italy International Snowballing and the Multi-Sited Research of Diplomats Fumarate hydratase and renal cancer: oncometabolites and beyond Alzheimer's talks Horizontal transfer of antimicrobial resistance drives multi-species population level epidemics Refugees and Migration Cambridge-Lausanne Workshop 2018 - Day 1 |