Learn More
—Cooperation incentives are essential in user-centric networks to motivate users to share services and resources (including bandwidth, computational power, and storage space) and to avoid selfish nodes to hinder the functioning of the entire system. Virtual currency and reputation mechanisms are commonly adopted in online communities to boost participation,(More)
—With the advent of the Bring-Your-Own-Device (BYOD) trend, mobile work is achieving a widespread diffusion that challenges the traditional view of security standard and risk management. A recently proposed model, called opportunity-enabled risk management (OPPRIM), aims at balancing the analysis of the major threats that arise in the BYOD setting with the(More)
While trust management systems can be used in isolation in order to provide robustness to a given architecture, cooperation incentives can be used to complement and collaborate with trust management systems as users can benefit from them while using the system, thus encouraging user’s good behaviour. We have designed a fully decentralized trust management(More)
A few years ago , an experimental facility composed of networking gear and simulation tools was sufficient for testing the main features of a prototype before the final product could be launched to the Internet market. This paradigm has certainly changed , but the lack of platforms enabling the realistic assessment of the different facets of a product ,(More)
Incentive strategies are used in collaborative user-centric networks , the functioning of which depends on the willingness of users to cooperate. Classical mechanisms stimulating cooperation are based on trust, which allows to set up a reputation infrastructure quantifying the subjective reliance on the expected behavior of users, and on virtual currency ,(More)
— Wireless networks today are partially being formed by nodes (e.g. Internet access points, smartphones, femtocells) that are owned and carried by humans. In such scenarios where several strangers are expected to interact for the sake of robust data transmission, trust and reputation are of vital importance. As such, User Centric Networks require(More)
—In this paper, we discuss the remaining security risk of Wi-Fi AP spoofing with current AP joining approaches and how a new solution has been developed as part of the ULOOP project in order to be more user-friendly and secure. It was an important step for increased security because our evaluation shows that even computer aware users do not know or do not(More)