| Skip to main content | Skip to sub navigation |

This is now an inactive research group it's members have moved on. You can find them at their new research groups:

Speaker(s): Professor Pallapa Venkataram
Organiser: Dr Enrico H Gerding
Time: 30/08/2007 13:00-14:00
Location: B32/3077

Abstract

Most of the available authentication protocols or schemes for mobile communications are limited to verification of the correctness of authentication information, such as device addresses, PINs, passwords, keys, etc. Due to various types of attacks developed over these, the mobile principals are highly susceptible to loose their authentication information including cryptographic keys. The privacy impact of the decision to authenticate mobile transactions includes creation of records of individual actions based on transactional information, covert identification, privacy erosion by linking records, etc.

The talk presents cognitive agents based application level, transaction based authentication and privacy scheme for mobile transactions. The issue of maintaining anonymity during authentication has become challenging research area in mobile security. The application level authentication schemes have seriously affected by the absence of effective mechanisms to protect the privacy of a client transactions. The proposed scheme integrates procedure of authentication with privacy protection. The authentication challenges and privacy measures are dynamically deployed by cognitive agents based on mobile transaction sensitivity and users transaction time behaviors.

The scheme uses two types of cognitive agents: the mobile cognitive agent (MCA) and the static cognitive agent (SCA), which are secured with respect to their construction and inter agent communications. There is an trusted independent entity called as Privacy Handler, which provides privacy policies on request from SCA’s. The SCA creates an MCA and sends it to the respective mobile node during the beginning of service usage. The MCA generates beliefs over user transactions by observing various user behaviors periodically. The SCA dynamically generates authentication requirements, based on the sensitivity of mobile transactions and the changing beliefs on a user. At the same time it performs privacy analysis over the transactions submitted by the user, and if there is a need for privacy handling it requests for privacy policy from the Privacy Handler, by providing suitable information. A challenge/response protocol based on belief deviation has been incorporated in the system, to raise authentication challenges. The talk concludes with the simulation results and highlights the advantages of using cognitive agents for wireless security.

Speaker Biography

Professor Pallapa Venkataram

Venkataram Pallapa received his Ph.D. Degree in Information Sciences from the University of Sheffield, England, in 1986. He is currently a Professor in The Department of Electrical Communication Engineering, Indian Institute of Science, Bangalore, India. Dr. Pallapa’s research interests are in the areas of Wireless Networks, Communication Protocols, Computation Intelligence applications in Communication Networks and Multimedia Systems.

Dr. Pallapa is the holder of a Distinguished Visitor Diploma from the Orrego University, Trujillo, PERU. He has published over 150 papers in International/national Journals/conferences. Written two books: Communication Protocol Engineering, Prentice-Hall of India (PHI), New Delhi, 2004 (Co-author: Sunil Manvi), and Multimedia: Concepts & Communication, Darling Kinderley(India) Pvt. Ltd., licensees of Pearson Education in South Asia, 2006. Edited two books: Wireless Communications for Next Millennium, McGraw-Hill, 1998, and Mobile Wireless Networks & Integrated Services, John Wiley & Sons(Asia) Pvt. Ltd., 2006 (Co-editors: L.M.Patnaik & Sajal K. Das). Written chapters for two different books, and a guest editor to the IISc Journal for a special issue on Multimedia Wireless Networks. He has received best paper awards at GLOBECOM’93 and INM’95 and also CDIL (Communication Devices India Ltd) for a paper published in IETE Journal. He is a Fellow of IEE (England), Fellow of IETE(India) and a Senior member of IEEE Computer Society.