L’axe 3 de la fédération MIRES organise une demi journée de présentations (sous format hybride) le 8 juin 2023 après midi à Angoulême.

 

Programme de la demi-journée MIRES du 08/06/2023

Introduction

14h00 – 14h30: présentation 1 (20 minutes) suivi de 10 minutes d’échanges

Orateur: Mouhamed Amine Bouchiha, Université de La Rochelle

Titre: GuRuChain: Guarantee and Reputation-based Blockchain Service Trading Platform

Résumé: Blockchain (BC) is a promising Distributed Ledger Technology (DLT) that has attracted attention in recent years due to its characteristics of maintaining privacy and security.
This technology, which removes the need for a trusted third party, can be applied in various trust-related domains, such as energy trading, crowdsourcing, and the Internet of Things. This work presents GuRuChain, a platform framework for online service trading. It combines on-chain and off-chain trust management to provide a blockchain system suitable for trust-related applications. The platform does not only ensure the recording of online transactions; but also the deliverance of offline services. In GuRuChain, we propose a mathematical model to assess the trustworthiness of each participant. We also introduce an incentive mechanism based on reputation and guarantee to monitor the participants’ behavior. Finally, we maintain the consistency of the BC through the proposed consensus scheme called Proof Guarantee and Reputation (PoGR). PoGR selects nodes based on a scoring formula that uses three parameters, reputation score, guarantee balance, and risk taken to ensure fairness. The results of the performance evaluation demonstrate the feasibility, efficiency, and scalability of GuRuChain.

14h30 – 15h00: présentation 2 (20 minutes) suivi de 10 minutes d’échanges

Orateur: Akram Boutouchent

Titre: Intent-Driven Management And Orchestration System For Next-Generation Cloud-Native Networks

Résumé: Next-generation mobile networks, namely 5G and beyond, have received increasing attention from the research community due to their potential for enabling new services and unprecedented performance. To face these expectations, Mobile Network Operators (MNO) are investing in novel technologies to improve the reliability, delivery, and adaptability of their services. As a result, network infrastructures are growing in complexity, particularly with regard to computing, caching, and communications resources spanning multiple domains. Therefore, sophisticated paradigms are needed for managing and orchestrating these infrastructures to reduce the need for human experts. Intent-Based Networking (IBN) is a promising approach to realize management systems that can autonomously monitor and orchestrate these infrastructures. This paradigm introduces the notion of intent which is a high-level operational goal given to a system. An intent-based network will need to achieve these goals without any provided technical details. In this work, we propose an intent-driven management system for a cloud-native infrastructure of a Mobile Network Operator. Our proposed system takes high-level service demands expressed in a natural language and transforms them into continuously monitored deployments. The MNO provides Multi-Access Edge Computing (MEC) digital services and 5G core services to its users. We present experimental results using a 360° video streaming use case in a physical test lab to evaluate our proposal.

15h00 – 15h30: présentation 3 (20 minutes) suivi de 10 minutes d’échanges

Orateur: Cristina Onete, XLIM, université de Limoges

Titre: Subversion-resilient protocols : the case of Authenticated Key-Exchange

Résumé: In 2013, Edward Snowden revealed documents proving that large (counter-espionage agencies, including the NSA and GCHQ are willing — and have the technical capacities — to perform large-scale, intrusive attacks against electronic data that civilians store and exchange worldwide. This adversary against civilian privacy is determined, pervasive, and nearly all-powerful, which is why we refer to it as Big Brother.

One of Big Brother’s most insidious attack strategies is algorithm-substitution: Big Brother replaces the code of an actual, secure cryptographic algorithm with an algorithm that seems to behave in the same way, but in actual fact exfiltrates information to Big Brother. For instance, the verification algorithm of a secure signature scheme that depends on a PKI would involve verifying the certificate of a signer, as well as a given signature. A substituted algorithm might be programmed to ignore the verification steps for a given signer, thus enabling fraud and forgeries. In the same way, a secure PRG algorithm is supposed to provide unpredictable randomness at each execution, whereas a subverted one will provide randomness that is predictable to Big Brother (and potentially to others).

One way to prevent algorithm substitution attacks (ASAs) is to use subversion-resilient cryptography, relying, for instance, on watchdogs or reverse firewalls. In this talk we will discuss these two mechanisms, focusing on the challenges and rewards of designing reverse firewalls and reverse-firewall-friendly protocols in the real world.

15h30 – 16h00: Discussions et échanges

Les animateurs de l’axe 3 de MIRES,

Emmanuel Conchon (emmanuel.conchon@unilim.fr) & Petra Gomez-Krämer (petra.gomez@univ-lr.fr)

  • Suivez la fédération MIRES sur les réseaux sociaux