Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where István Vajda is active.

Publication


Featured researches published by István Vajda.


security of ad hoc and sensor networks | 2007

On the effectiveness of changing pseudonyms to provide location privacy in VANETS

Levente Buttyán; Tamás Holczer; István Vajda

The promise of vehicular communications is to make road traffic safer and more efficient. However, besides the expected benefits, vehicular communications also introduce some privacy risk by making it easier to track the physical location of vehicles. One approach to solve this problem is that the vehicles use pseudonyms that they change with some frequency. In this paper, we study the effectiveness of this approach. We define a model based on the concept of the mix zone, characterize the tracking strategy of the adversary in this model, and introduce a metric to quantify the level of privacy enjoyed by the vehicles. We also report on the results of an extensive simulation where we used our model to determine the level of privacy achieved in realistic scenarios. In particular, in our simulation, we used a rather complex road map, generated traffic with realistic parameters, and varied the strength of the adversary by varying the number of her monitoring points. Our simulation results provide detailed information about the relationship between the strength of the adversary and the level of privacy achieved by changing pseudonyms.


security of ad hoc and sensor networks | 2005

Statistical wormhole detection in sensor networks

Levente Buttyán; László Dóra; István Vajda

In this paper, we propose two mechanisms for wormhole detection in wireless sensor networks. The proposed mechanisms are based on hypothesis testing and they provide probabilistic results. The first mechanism, called the Neighbor Number Test (NNT), detects the increase in the number of the neighbors of the sensors, which is due to the new links created by the wormhole in the network. The second mechanism, called the All Distances Test (ADT), detects the decrease of the lengths of the shortest paths between all pairs of sensors, which is due to the shortcut links created by the wormhole in the network. Both mechanisms assume that the sensors send their neighbor list to the base station, and it is the base station that runs the algorithms on the network graph that is reconstructed from the received neighborhood information. We describe these mechanisms and investigate their performance by means of simulation.


ad hoc networks | 2010

Barter trade improves message delivery in opportunistic networks

Levente Buttyán; László Dóra; Mark Felegyhazi; István Vajda

In opportunistic networks, selfish nodes can exploit the services provided by other nodes by downloading messages that interest them, but refusing to store and distribute messages for the benefit of other nodes. We propose a mechanism to discourage selfish behavior based on the principles of barter. We develop a game-theoretic model in which we show that the proposed approach indeed stimulates cooperation of the nodes. The results show that, in practical scenarios, the message delivery rate considerably increases, if the mobile nodes follow the Nash Equilibrium strategy in the proposed mechanism compared to the data dissemination protocol when no encouraging mechanism is present.


IEEE Transactions on Applied Superconductivity | 2004

Superconducting FCL: design and application

Vladimir Sokolovsky; V. Meerovich; István Vajda; V. Beilin

Design, parameters, and application areas of a superconducting fault current limiter (FCL) are analyzed on the basis of the requirements of power systems. The comparison of resistive and inductive designs is carried out. An example of the effective application of FCLs in distribution substations is considered and the gain from the FCL installation is discussed. It is shown that an FCL not only limits a fault current but also increases the dynamic stability of the synchronous operation of electric machines. The calculation procedure of the parameters of an inductive FCL for a specific application case is described.


security of ad hoc and sensor networks | 2006

RANBAR: RANSAC-based resilient aggregation in sensor networks

Levente Buttyán; Péter Schaffer; István Vajda

We present a novel outlier elimination technique designed for sensor networks. This technique is called RANBAR and it is based on the RANSAC (RANdom SAmple Consensus) paradigm, which is well-known in computer vision and in automated cartography. The RANSAC paradigm gives us a hint on how to instantiate a model if there are a lot of compromised data elements.However,the paradigm does not specify an algorithm and it uses a guess for the number of compromised elements, which is not known in general in real life environments. We developed the RANBAR algorithm following this paradigm and we eliminated the need for the guess. Our RANBAR algorithm is therefore capable to handle a high percent of outlier measurement data by leaning on only one preassumption,namely that the sample is i.i.d. in the unattacked case. We implemented the algorithm in a simulation environment and we used it to filter out outlier elements from a sample before an aggregation procedure. The aggregation function that we used was the average. We show that the algorithm guarantees a small distortion on the output of the aggregator even if almost half of the sample is compromised. Compared to other resilient aggregation algorithms, like the trimmed average and the median, our RANBAR algorithm results in smaller distortion, especially for high attack strengths.


world of wireless mobile and multimedia networks | 2007

Barter-based cooperation in delay-tolerant personal wireless networks

Levente Buttyán; László Dóra; Márk Félegyházi; István Vajda

In this paper, we consider the application of delay-tolerant networks to personal wireless communications. In these networks, selfish nodes can exploit the services provided by other nodes by downloading messages that interest them, but refusing to store and distribute messages for the benefit of other nodes. We propose a mechanism to discourage selfish behavior based on the principles of barter. We develop a game-theoretic model in which we show that the proposed approach indeed stimulates cooperation of the nodes. In addition, the results show that the individually most beneficial behavior leads to the social optimum of the system.


privacy enhancing technologies | 2006

Optimal key-trees for tree-based private authentication

Levente Buttyán; Tamás Holczer; István Vajda

Key-tree based private authentication has been proposed by Molnar and Wagner as a neat way to efficiently solve the problem of privacy preserving authentication based on symmetric key cryptography. However, in the key-tree based approach, the level of privacy provided by the system to its members may decrease considerably if some members are compromised. In this paper, we analyze this problem, and show that careful design of the tree can help to minimize this loss of privacy. First, we introduce a benchmark metric for measuring the resistance of the system to a single compromised member. This metric is based on the well-known concept of anonymity sets. Then, we show how the parameters of the key-tree should be chosen in order to maximize the systems resistance to single member compromise under some constraints on the authentication delay. In the general case, when any member can be compromised, we give a lower bound on the level of privacy provided by the system. We also present some simulation results that show that this lower bound is quite sharp. The results of this paper can be directly used by system designers to construct optimal key-trees in practice; indeed, we consider this as the main contribution of our work.


security of ad hoc and sensor networks | 2005

Provable security of on-demand distance vector routing in wireless ad hoc networks

Gergely Acs; Levente Buttyán; István Vajda

In this paper, we propose a framework for the security analysis of on-demand, distance vector routing protocols for ad hoc networks, such as AODV, SAODV, and ARAN. The proposed approach is an adaptation of the simulation paradigm that is used extensively for the analysis of cryptographic algorithms and protocols, and it provides a rigorous method for proving that a given routing protocol is secure. We demonstrate the approach by representing known and new attacks on SAODV in our framework, and by proving that ARAN is secure in our model.


world of wireless mobile and multimedia networks | 2007

Group-Based Private Authentication

Gildas Avoine; Levente Buttyant; Tamás Holczer; István Vajda

We propose a novel authentication scheme that ensures privacy of the provers. Our scheme is based on symmetric-key cryptography, and therefore, it is well-suited to resource constrained applications in large scale environments. A typical example for such an application is an RFID system, where the provers are low-cost RFID tags, and the number of the tags can potentially be very large. We analyze the proposed scheme and show that it is superior to the well-known key-tree based approach for private authentication both in terms of privacy and efficiency.


pervasive computing and communications | 2006

Resilient aggregation with attack detection in sensor networks

Levente Buttyán; Péter Schaffer; István Vajda

In this paper, we propose a new model of resilient data aggregation in sensor networks, where the aggregator analyzes the received sensor readings and tries to detect unexpected deviations before the aggregation function is called. In this model, the adversary does not only want to cause maximal distortion in the output of the aggregation function, but it also wants to remain undetected. The advantage of this approach is that in order to remain undetected, the adversary cannot distort the output arbitrarily, but rather the distortion is usually upper bounded, even for aggregation functions that were considered to be insecure earlier (e.g., the average). We illustrate this through an example in this paper

Collaboration


Dive into the István Vajda's collaboration.

Top Co-Authors

Avatar

Levente Buttyán

Budapest University of Technology and Economics

View shared research outputs
Top Co-Authors

Avatar

V. Meerovich

Ben-Gurion University of the Negev

View shared research outputs
Top Co-Authors

Avatar

Vladimir Sokolovsky

Ben-Gurion University of the Negev

View shared research outputs
Top Co-Authors

Avatar

Attila Györe

Budapest University of Technology and Economics

View shared research outputs
Top Co-Authors

Avatar

J. Kosa

Budapest University of Technology and Economics

View shared research outputs
Top Co-Authors

Avatar

András Szalay

Budapest University of Technology and Economics

View shared research outputs
Top Co-Authors

Avatar

Boldizsár Bencsáth

Budapest University of Technology and Economics

View shared research outputs
Top Co-Authors

Avatar

István Berta

Budapest University of Technology and Economics

View shared research outputs
Top Co-Authors

Avatar

László Györfi

Budapest University of Technology and Economics

View shared research outputs
Top Co-Authors

Avatar

S. Semperger

Budapest University of Technology and Economics

View shared research outputs
Researchain Logo
Decentralizing Knowledge