Each speaker has been asked to take some time to generate some discussion, on top of the traditional questions from the audience.
10:00 - 10:45 : Presentation
Duc-Tuyen Ta (Postdoc, LRI/INRIA), on the subject “ Strategic Surveillance Against Primary User Emulation Attacks in Cognitive Radio Networks".
Abstract: We investigate the primary user emulation (PUE) attack which is a serious security problem in cognitive radio (CR) networks. There exist on three types of PUE attackers: i) selfish one which aims at maximising it's selfish usage of channel resource, ii) malicious one which points for obstructing the operation of CR network, and iii) mixed between selfish and malicious PUE attacker. For combating a selfish PUE attacker, a channel surveillance process has to be implemented in order to determine active user’s identification and so selfish PUE attacker. An extra-sensing process has to be implemented for observing new opportunities to access the channel and so for mitigating the malicious PUE attacker’s effect. Since a rational attacker can learn to adapt to the surveillance strategy, the question is how to formulate an appropriate modelling of the strategic interaction between a defender and an attacker. Relevant strategies for deploying the above processes are obtained through a game theory-based analysis and the exhibition of Nash Equilibrium (NE) and the Strong Stackelberg Equilibrium (SSE). We show equilibrium strongly depends on the network demand, the availability of the spectrum resource, and the type of the attacker. We also show the proposed defensive strategies (surveillance and extra sensing) are efficient for combating the effects of PUE attackers.
11:00 - 11:45 : Presentation
Claude Chaudet (Professor, Webster University, Geneva), on the subject "Empowering the user: privacy vs. utility in the Internet of Devices and Things".
Abstract: Data is key in the process of addressing some key global challenges like climate change, healthcare, aging, urban mobility or energy production and distribution. Yet, massive data collection poses some ethical issues, as companies are often either accused of breaking users trust, or have to confess security breaches. A protective solution could lie in letting each user own and dispose of his/her own data, cutting the scientific and public communities from a valuable source of information. In this talk, we will examine, model and evaluate some key elements in the process of designing such a fully distributed architecture that allows users to have (more) control on the disclosure of the data they consider personal. If no ideal solution exists, we believe that such architectures bear the potential to offer a reasonable compromise between utility and privacy.