BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Talks.cam//talks.cam.ac.uk//
X-WR-CALNAME:Talks.cam
BEGIN:VEVENT
SUMMARY:Security and Cooperation in Wireless Networks - Jean-Pierre Hubaux
 \, EPFL
DTSTART:20070228T141500Z
DTEND:20070228T151500Z
UID:TALK6259@talks.cam.ac.uk
CONTACT:Timothy G. Griffin
DESCRIPTION:According to most technology pundits\, progress in wireless an
 d sensor\nnetworks will lead us into a world of ubiquitous computing\, in 
 which\nmyriads of tiny\, untethered sensors and actuators will communicate
 \nwith each other. Information technology will thus deliver its most\nenco
 mpassing and pervasive accomplishment to mankind\, promptly taking\ncare o
 f the needs and wishes of everyone.\n\nOr maybe not. The described evoluti
 on is driven primarily by market\nforces and vastly ignores the users' int
 entions. Yet the recent\nhistory of the Internet has shown that these inte
 ntions can have\ndevastating effects\; for example\, spam\, viruses\, "phi
 shing" and\ndenial of service attacks have unfortunately become commonplac
 e. The\nmisbehavior of a relatively small number of users is leading to a\
 nsubstantial inconvenience to the whole community. Similar or even\nworse 
 misdeeds are and will be perpetrated in wireless networks.\n\nThis talk ad
 dresses the fundamental questions related to this\nproblem\, in particular
 :\n\nHow are users and devices identified?\nHow can a security association
  be established between two wireless peers?\nHow can packets be securely a
 nd cooperatively routed in a multi-hop network?\nHow can the fair share of
  bandwidth between nodes located in the same\nradio domain be guaranteed?\
 nHow do wireless operators behave\, if they have to share a given chunk\no
 f the spectrum?\nHow can naturally selfish players be encouraged to behave
  cooperatively?\nAnd\, above all\, how is privacy protected?\n\nAll these 
 issues are addressed in a graduate textbook co-authored\nwith Levente Butt
 yan\, to appear in 2007\, published by\nCambridge University Press.\n\nThe
  book treats each of these questions from a theoretical point of\nview and
  illustrates them by means of concrete examples such as mesh\,\nad hoc\, v
 ehicular\, sensor\, and RFID networks.\n\nMore information about the book 
 can be found at\nhttp://secowinet.epfl.ch/. The current version (around 46
 0 pages) can\nbe downloaded from there.\n\nAbout the speaker: http://peopl
 e.epfl.ch/jean-pierre.hubaux
LOCATION:Lecture Theatre 1\, Computer Laboratory
END:VEVENT
END:VCALENDAR
