Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Levente Buttyán is active.

Publication


Featured researches published by Levente Buttyán.


Mobile Networks and Applications | 2003

Stimulating cooperation in self-organizing mobile ad hoc networks

Levente Buttyán; Jean-Pierre Hubaux

In military and rescue applications of mobile ad hoc networks, all the nodes belong to the same authority; therefore, they are motivated to cooperate in order to support the basic functions of the network. In this paper, we consider the case when each node is its own authority and tries to maximize the benefits it gets from the network. More precisely, we assume that the nodes are not willing to forward packets for the benefit of other nodes. This problem may arise in civilian applications of mobile ad hoc networks. In order to stimulate the nodes for packet forwarding, we propose a simple mechanism based on a counter in each node. We study the behavior of the proposed mechanism analytically and by means of simulations, and detail the way in which it could be protected against misuse.


IEEE Transactions on Mobile Computing | 2003

Self-organized public-key management for mobile ad hoc networks

Srdjan Capkun; Levente Buttyán; Jean-Pierre Hubaux

In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they exhibit frequent partitioning due to link and node failures and to node mobility. For these reasons, traditional security solutions that require online trusted authorities or certificate repositories are not well-suited for securing ad hoc networks. We propose a fully self-organized public-key management system that allows users to generate their public-private key pairs, to issue certificates, and to perform authentication regardless of the network partitions and without any centralized services. Furthermore, our approach does not require any trusted authority, not even in the system initialization phase.


mobile ad hoc networking and computing | 2001

The quest for security in mobile ad hoc networks

Jean-Pierre Hubaux; Levente Buttyán; Srdjan Capkun

So far, research on mobile ad hoc networks has been forcused primarily on routing issues. Security, on the other hand, has been given a lower priority. This paper provides an overview of security problems for mobile ad hoc networks, distinguishing the threats on basic mechanisms and on security mechanisms. It then describes our solution to protect the security mechanisms. The original features of this solution include that (i) it is fully decentralized and (ii) all nodes are assigned equivalent roles.


IEEE Communications Magazine | 2008

Secure vehicular communication systems: design and architecture

Panagiotis Papadimitratos; Levente Buttyán; Tamás Holczer; Elmer Schoch; Julien Freudiger; Maxim Raya; Zhendong Ma; Frank Kargl; Antonio Kung; Jean-Pierre Hubaux

Significant developments have taken place over the past few years in the area of vehicular communication systems. Now, it is well understood in the community that security and protection of private user information are a prerequisite for the deployment of the technology. This is so precisely because the benefits of VC systems, with the mission to enhance transportation safety and efficiency, are at stake. Without the integration of strong and practical security and privacy enhancing mechanisms, VC systems can be disrupted or disabled, even by relatively unsophisticated attackers. We address this problem within the SeVeCom project, having developed a security architecture that provides a comprehensive and practical solution. We present our results in a set of two articles in this issue. In this first one, we analyze threats and types of adversaries, identify security and privacy requirements, and present a spectrum of mechanisms to secure VC systems. We provide a solution that can be quickly adopted and deployed. In the second article we present our progress toward the implementation of our architecture and results on the performance of the secure VC system, along with a discussion of upcoming research challenges and our related current results.


security of ad hoc and sensor networks | 2003

SECTOR: secure tracking of node encounters in multi-hop wireless networks

Srdjan Capkun; Levente Buttyán; Jean-Pierre Hubaux

In this paper we present SECTOR, a set of mechanisms for the secure verification of the time of encounters between nodes in multi-hop wireless networks. This information can be used notably to prevent wormhole attacks (without requiring any clock synchronization), to secure routing protocols based on last encounters (with only loose clock synchronization), and to control the topology of the network. SECTOR is based primarily on distance-bounding techniques, on one-way hash chains and on Merkle hash trees. We analyze the communication, computation and storage complexity of the proposed mechanisms and we show that, due to their efficiency and simplicity, they are compliant with the limited resources of most mobile devices.


IEEE Communications Magazine | 2001

Self organization in mobile ad hoc networks: the approach of Terminodes

Ljubica Blazevic; Levente Buttyán; Srdjan Capkun; Silvia Giordano; Jean-Pierre Hubaux; J.-Y. Le Boudec

The Terminodes project is designing a wide-area mobile ad hoc network which is meant to be used in a public environment; in our approach, the network is run by users themselves. We give a global description of the building blocks used by the basic operation of the network; they all rely on various concepts of self-organization. Routing uses a combination of geography-based information and local MANET-like protocols. Terminode positioning is obtained by either GPS or a relative positioning method. Mobility management uses self-organized virtual regions. Terminodes employ a form of virtual money called nuglets as an incentive to collaborate. Lastly, we discuss directions for providing some level of security.


IEEE Transactions on Mobile Computing | 2006

Nash equilibria of packet forwarding strategies in wireless ad hoc networks

Márk Félegyházi; Jean-Pierre Hubaux; Levente Buttyán

In self-organizing ad hoc networks, all the networking functions rely on the contribution of the participants. As a basic example, nodes have to forward packets for each other in order to enable multihop communication. In recent years, incentive mechanisms have been proposed to give nodes incentive to cooperate, especially in packet forwarding. However, the need for these mechanisms was not formally justified. In this paper, we address the problem of whether cooperation can exist without incentive mechanisms. We propose a model,based on game theory and graph theory to investigate equilibrium conditions of packet forwarding strategies. We prove theorems about the equilibrium conditions for both cooperative and noncooperative strategies. We perform simulations to estimate the probability that the conditions for a cooperative equilibrium hold in randomly generated network scenarios.. As the problem is involved, we deliberately restrict ourselves to a static configuration. We conclude that in static ad hoc networks where the relationships between the nodes are likely to be stab le-cooperation needs to be encouraged.


mobile ad hoc networking and computing | 2003

A charging and rewarding scheme for packet forwarding in multi-hop cellular networks

Naouel Ben Salem; Levente Buttyán; Jean-Pierre Hubaux; Markus Jakobsson

In multi-hop cellular networks, data packets have to be relayed hop by hop from a given mobile station to a base station and vice-versa. This means that the mobile stations must accept to forward information for the benefit of other stations. In this paper, we propose an incentive mechanism that is based on a charging/rewarding scheme and that makes collaboration rational for selfish nodes. We base our solution on symmetric cryptography to cope with the limited resources of the mobile stations. We provide a set of protocols and study their robustness with respect to various attacks. By leveraging on the relative stability of the routes, our solution leads to a very moderate overhead.


financial cryptography | 2003

Micro-payment scheme encouraging collaboration in multi-hop cellular networks

Bjorn Markus Jakobsson; Jean-Pierre Hubaux; Levente Buttyán

We propose a micro-payment scheme for multi-hop cellular networks that encourages collaboration in packet forwarding by letting users benefit from relaying others’ packets. At the same time as proposing mechanisms for detecting and rewarding collaboration, we introduce appropriate mechanisms for detecting and punishing various forms of abuse. We show that the resulting scheme – which is exceptionally light-weight – makes collaboration rational and cheating undesirable.


IEEE Communications Magazine | 2008

Secure vehicular communication systems: implementation, performance, and research challenges

Frank Kargl; Panagiotis Papadimitratos; Levente Buttyán; Michael Müter; Elmar Schoch; Björn Wiedersheim; Ta Vinh Thong; Giorgio Calandriello; Albert Held; Antonio Kung; Jean-Pierre Hubaux

Vehicular communication systems are on the verge of practical deployment. Nonetheless, their security and privacy protection is one of the problems that have been addressed only recently. In order to show the feasibility of secure VC, certain implementations are required. we discuss the design of a VC security system that has emerged as a result of the European SeVe-Com project. In this second article we discuss various issues related to the implementation and deployment aspects of secure VC systems. Moreover, we provide an outlook on open security research issues that will arise as VC systems develop from todays simple prototypes to full-fledged systems.

Collaboration


Dive into the Levente Buttyán's collaboration.

Top Co-Authors

Avatar

Jean-Pierre Hubaux

École Polytechnique Fédérale de Lausanne

View shared research outputs
Top Co-Authors

Avatar

István Vajda

Budapest University of Technology and Economics

View shared research outputs
Top Co-Authors

Avatar

Sebastian Staamann

École Polytechnique Fédérale de Lausanne

View shared research outputs
Top Co-Authors

Avatar

Uwe G. Wilhelm

École Polytechnique Fédérale de Lausanne

View shared research outputs
Top Co-Authors

Avatar

Boldizsár Bencsáth

Budapest University of Technology and Economics

View shared research outputs
Top Co-Authors

Avatar

Tamás Holczer

Budapest University of Technology and Economics

View shared research outputs
Top Co-Authors

Avatar

Gergely Acs

Budapest University of Technology and Economics

View shared research outputs
Top Co-Authors

Avatar

Gábor Pék

Budapest University of Technology and Economics

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge