Security issues and Directions of Intelligent Transport Systems within limited-resources constraints
Intelligent transport system (ITS) is becoming a necessity in our everyday life for traffic control, time management, real-time traffic flow, incident management, etc. In the context of limited-resources constraints (i.e. lack of infrastructure), some necessary information may not be available and/or a single source of data may not be enough in order to provide accurate decision by the core modules. In this context, the proposed idea is to rely on vehicles as principal source of information, diversify the sources of data and build cooperative and service-based models at all layers of ITS in order to target the aforementioned problem. However, such approach entails several challenges in terms of adaptability, context-awareness, QoS and security. In my talk, I will be discussing security problems and solutions targeting separately services cooperation/composition and vehicular networks, which will potentially form the base to elaborate the intended approach.
Starting with the security of services cooperation, current solutions for Web services composition (e.g. BPEL) still do not provide mechanisms to dynamically adapt the business process with the rapid changes in business goals and requirements. Therefore, more efforts are needed to reach high adaptation of composition at several levels, most importantly, business logic, behavioral rules and security policies. In terms of security, XACML (eXtensible Access Control Markup Language) has been known as the de facto standard widely used by many vendors for specifying access control and context-aware policies for individual Web services. Due to the complexity of interaction in composite services, diversity of rules, and notably complexity of policies specification languages, many flaws and conflicts are more likely to arise, specially that the size of XACML policies are significantly growing to cope with the composed behaviors. In this context, we will discuss E-AspectBPEL, a model driven approach based on aspect-oriented programming for defining both context-aware policies to reach higher adaptability, and dependability between policies hardened in the BPEL process to overcome the conflict among them. Moreover, we will discuss SBA-XACML, a novel set-based algebra scheme that provides better evaluation performance and allows to detect flaws, conflicts and redundancies in XACML policies.
As for the security of Vehicular network, we will discuss the problem of clustering in Vehicular Ad Hoc Networks (VANETs) in the presence of selfish nodes. The problem arises due to the highly mobile topology of VANET, which leads to frequent clusters disconnections and alters the Quality of Service (QoS) over the network. Moreover, the presence of selfish nodes would hinder the application of any clustering model. These nodes behave rationally and tend hence to maximize their gain regardless of the negatives implication that may affect the network. Thus, the proposed solution is concerned with introducing a stable clustering model that deals with the high mobility of vehicles by considering a tradeoff between QoS requirements and high mobility constraints. This model is accompanied with a multi-phase model able to stimulate the cooperation of the vehicles, detect the selfish nodes, and regulate the cooperation. In this regard, several theories and algorithms will be discussed such as Ant Colony Optimization algorithms, incentive mechanism, cooperative watchdog based on Dempster-Shafer theory and repeated game theory based on Tit-for-Tat strategy.
Thème(s) : Conférences Recherche
Séminaire confiance numérique (Manik Lal Das, DA-IICT, Ganghinagar, India)
Séminaire confiance numérique (Catalin Hritcu, Equipe INRIA PROSECCO)
Séminaire confiance numérique (Vincent Cheval, LORIA, Equipe INRIA PESTO)
Séminaire confiance numérique (Ioana Boureanu Carlson, University of Surrey, Surrey Centre for Cyber Security (SCCS), UK)
Séminaire confiance numérique (Benjamin Nguyen, INSA Centre Val de Loire, LIFO, Equipe Security and Distributed Systems, SQL/AA)
Séminaire confiance numérique (Pascal Thoniel, NTX Research)
Séminaire confiance numérique (Philippe Elbaz-Vincent, Université Grenoble Alpes, Institut Fourier)
Séminaire confiance numérique (David Hely, LCSI)
Séminaire confiance numérique (Emmanuel Fleury, Labri)
Séminaire confiance numérique (Vincent Nicomette, LAAS)
Séminaire confiance numérique (Olivier Levillain, ANSSI)
Séminaire confiance numérique (Lilian Bossuet, Laboratoire Hubert Curien, CNRS UMR 5516, Université Jean Monnet, Saint-Etienne)
Séminaire confiance numérique (Sébastien Bardin, CEA LIST)
Séminaire confiance numérique (Mathieu CHARBOIS, Directeur d'agence Fidens, Consultant Sécurité)
Séminaire confiance numérique (Steve Kremer, Inria Nancy Grand-Est & Loria, Pesto team)
Séminaire confiance numérique (Barbara Kordy, IRISA INSA Rennes)
Séminaire confiance numérique (Hervé Debar, Institut Mines-Télécom/Télécom SudParis)
Séminaire confiance numérique (Adrien Bécue R & T Coordinator Airbus Defence & Space CYBERSECURITY)
Séminaire confiance numérique (Jean-Guillaume Dumas Laboratoire Jean Kuntzman , Université Joseph Fourier)
FOUNDATIONS & PRACTICE OF SECURITY 2015 (Evangelos Kranakis, Chancellor?s Professor, PhD, Carleton University, Ottawa, Canada)
FOUNDATIONS & PRACTICE OF SECURITY 2015 (David Pointcheval, Directeur de Recherche, PhD, CNRS, Ecole Normale Supérieure, Paris, France)
Séminaire confiance numérique (Slawomir Grzonkowski Symantec, Dublin)
Séminaire confiance numérique (Emmanuel Thomé INRIA Equipe Caramel)
Séminaire confiance numérique (Marine Minier, INSA de Lyon, Laboratoire CITI, INRIA Equipe Privatics)
Séminaire confiance numérique (Cristina Onete, IRISA, Equipe CIDre)
Séminaire confiance numérique (Philippe Owezarski LAAS)
Séminaire confiance numérique (Ralf Sasse Institute of Information Security, Department of Computer Science, ETH Zurich, ARPKI)
Séminaire confiance numérique (Amrit Kumar Privatics team, INRIA Grenoble)
Séminaire confiance numérique (Guillaume Bonfante LORIA)
Séminaire confiance numérique (Maryline Laurent Institut Mines-Télécom/Télécom SudParis, CNRS UMR 5157 SAMOVAR Co-fondatrice de la chaire Valeurs et politiques des informations personnelles)
Séminaire confiance numérique (Florent Autréau, Mataru)
Séminaire confiance numériques (Vincent Mazenod, expert SSI à la DR7 CNRS)
Séminaire confiance numérique (Alexandre Anzala-Yamajako Thales Communication & Security, Thales Paris, France)
Séminaire confiance numérique (Olivier Pereira Université catholique de Louvain (UCL), Crypto group)
Séminaire confiance numérique (Gildas Avoine IRISA INSA Rennes)
Séminaire confiance numérique (Olivier Blazy from Xlim )
Séminaire confiance numérique (Serge Vaudenay, Security and Cryptography Laboratory (LASEC), EPFL)
Séminaire confiance numérique (Lionel Rivière, SAFRAN Morpho, IDentity and Security Alliance et Télécom ParisTech)
Séminaire confiance numérique (Sébastien Canard, Orange Labs Applied Cryptography Group)
Séminaire confiance numérique (Jordi Herrera, Universitat Autonòma de Barcelona (UAB))
Séminaire confiance numérique (Philippe AMBLARD, Docteur en droit)
Séminaire confiance numérique (Tancrède Lepoint, CryptoExperts)
Séminaire confiance numérique (Marie-Laure Potet, Verimag DCS)
Séminaire confiance numériques (Kasper Rasmussen, Oxford University)
Séminaire confiance numériques (François Devoret, Lex Persona)
Séminaire confiance numériques (Aurélien Francillon, EURECOM)
Séminaire confiance numériques (Damien Vergnaud, LIENS)
Séminaire confiance numérique (Mathieu Cunche, Privatics)
Séminaire confiance numérique (Sébastien Gambs, IRISA/INRIA)
Séminaire confiance numérique (Cédric Lauradoux, INRIA)
Séminaire confiance numérique (Jean-Louis Lanet, XLIM)
Séminaire confiance numérique (Jean-Marie Tirbois, Almerys)
Séminaire confiance numérique (Pascal Lafourcade, LIMOS)