Information Trust Institute (ITI) Calendar

Back to Listing

ITI Distinguished Lecture: Jean-Pierre Hubaux: "Security and Non-Cooperative Behavior in Wireless Networks"

Event Type
Lecture
Sponsor
Information Trust Institute
Location
2405 Siebel Center
Date
Apr 28, 2009   4:00 pm  
Speaker
Jean-Pierre Hubaux, EPFL
Originating Calendar
Information Trust Institute (ITI) archival calendar

ABSTRACT:

Various malicious and selfish misdeeds against wireless networks have already been perpetrated. But as these networks are becoming ubiquitous, much worse is to be expected. In this talk, we will briefly address the future development of wireless networks. Focusing first on security, we will discuss key establishment, secure neighbor discovery, and location privacy. After a brief introduction to game theory, we will then address selfishness and (non-)cooperative behavior and discuss the so-called "Chimp-Bonobo cross-layer schizophrenia." Finally, we will describe the impact of non-cooperative behavior on security mechanisms. For that purpose, we will consider the case of revocation in high-mobility (or "ephemeral") networks.

Note: some of the material of this talk appears in the book Security and Cooperation in Wireless Networks by L. Buttyan and J.-P. Hubaux, Cambridge University Press, 2008, available at http://secowinet.epfl.ch.

Reception to follow.

BIOGRAPHY:

Jean-Pierre Hubaux joined the faculty of EPFL in 1990. His research is focused on wireless networks, with a special interest in security, privacy, and non-cooperative behavior. In 1991, he designed the first curriculum in communication systems at EPFL. In 1999, he defined some of the main ideas of the National Competence Center in Research named "Mobile Information and Communication Systems" (NCCR/MICS); this center is often nicknamed "the Terminodes Project." In that framework, he has notably defined, in close collaboration with his students, novel schemes for security and cooperation in wireless networks; in particular, he has devised new techniques for key management, secure positioning, and incentives for cooperation in such networks. In 2003, he identified the security of vehicular networks as one of the main research challenges for real-world mobile ad hoc networks.

link for robots only