Led by
Michel Barbeau
Participating researchers include:
Prof. Evangelos
Kranakis
Prof. Ramiro
Liscano
Prof. Paul Van
Oorschot
The problem of service discovery is about
dynamically locating, in a network, servers that fulfill
requirements of clients. A strategy is a way to apply a service
discovery protocol. The goal of this work is to devise new service
discovery strategies and to characterize them in terms of cost and
latency. Regarding satellite transport protocols, we look at the
problem of handling communication errors compromising the reliable
and efficient delivery of units of data from application to
application. Most transport protocols are only designed to handle
congestion-related errors common to wired networks, resulting in
severe degradation in effective throughput. Our approach consists of
integrating differentiating error control strategies in transport
protocols. Threats to security of mobile and wireless networks are
facts of life. The research on intrusion detection in mobile and
wireless networks acknowledges the fact that creating a defense for
every possible method of attack is an impossible task. The long term
goal of this research is to develop tools to help network managers
to detect and pinpoint sources of attacks and tools to quickly
recover and repair damages caused by attacks (e.g. contaminated
data). Currently, the focus is on detecting and pinpointing tools,
that is to say, intrusion detection systems. Spontaneous
communication is about the establishment, on-the-fly, of
communication among members of a group of users for collaboration
purposes. It is a model of user level communication typically
encountered in mobile and wireless networks. Collaboration groups
are called virtual because their topology does not necessarily match
the underlying physical topology. Virtual private services address
the challenges associated with distributed responsibility for access
control of resources. Virtual private services ensure security and
privacy policies that are adhered to through coordinated policy
enforcement points. The core challenge faced in this communication
model is the ability to develop a solution that ensures consistent
access-control policies across a set of distributed firewalls
between disparate enterprises. While current tools can easily
distribute policy files, we address the deeper problem in ensuring
consistent access policies, across many different systems, is far
more difficult.
Additional information can be found in the NETWORKS
and SECURITY
Groups.
|