2/9/2006
Opportunistic Opportunistic Networks:Networks:The Concept and Research The Concept and Research
ChallengesChallengesLeszek Lilien, Zille Huma Kamal and Ajay GuptaLeszek Lilien, Zille Huma Kamal and Ajay Gupta
In cooperation with: Vijay Bhuse and Zijiang (James) YangIn cooperation with: Vijay Bhuse and Zijiang (James) Yang
WiWireless Sensornet Laboratory (reless Sensornet Laboratory (WiSe LabWiSe Lab))http://www.cs.wmich.edu/wsn
Department of Computer ScienceDepartment of Computer ScienceWestern Michigan UniversityWestern Michigan University
Kalamazoo, MI 49008Kalamazoo, MI 49008
2/9/2006
Basic Concepts for Opportunistic Basic Concepts for Opportunistic NetworksNetworks
New paradigm and technology:New paradigm and technology:Opportunistic Networks (Oppnets)Opportunistic Networks (Oppnets)
Facing Facing thethe challenge of challenge of PervasivePervasive Computing Computing AdvancingAdvancing leading-edge leading-edge pervasive computing and pervasive computing and
networking networking know-howknow-how
Applications ranging from EPR to mundane Applications ranging from EPR to mundane chores, etc.chores, etc.
2
2/9/2006
Startup: Seed OppnetStartup: Seed Oppnet
3
Oppnet starts as a Oppnet starts as a seedseed oppnetoppnet
Seed oppnet grows into an Seed oppnet grows into an expandedexpanded oppnetoppnet
Wireless Nodes
Link tothe World
Base Station
2/9/2006
Growth: Expanded OppnetGrowth: Expanded Oppnet
4
Wireless Nodes
Link tothe World
Base Station
Appliance(refrigerator
)
Satellite
Computer Network
MicrowaveRelay
Overturned Vehicle with OnStar
CellphoneTower
HeterogenousHeterogenous helpers helpers join oppnet join oppnet Add communication, computing, sensing, storage, other resourcesAdd communication, computing, sensing, storage, other resources
2/9/2006
Important Concepts in OppnetsImportant Concepts in Oppnets InitialInitial seed oppnet seed oppnet actionsactions
Localize nodesLocalize nodes Configure seed oppnetConfigure seed oppnet Adapt seed oppnet to environmentAdapt seed oppnet to environment
Seed oppnet Seed oppnet growthgrowth Detecting & identifying candidate helpersDetecting & identifying candidate helpers Contacting & inviting selected candidate Contacting & inviting selected candidate
helpershelpers Admitting & integrating helpersAdmitting & integrating helpers Offloading tasks to helpersOffloading tasks to helpers
Determining useful colaborative functionalitiesDetermining useful colaborative functionalities Managing offloaded tasksManaging offloaded tasks
5
2/9/2006
Basic Oppnet CategoriesBasic Oppnet Categories
2 major oppnet 2 major oppnet categoriescategories:: BenevolentBenevolent oppnets oppnets MalevolentMalevolent oppnets oppnets
Corresponding oppnets Corresponding oppnets scenariosscenarios:: BenevolentBenevolent oppnet scenario: oppnet scenario:
““Citizens Called to Arms”Citizens Called to Arms”
MalevolentMalevolent oppnet scenario: oppnet scenario:
““Bad Guys Gang Up”Bad Guys Gang Up”
6
2/9/2006
BenevolentBenevolent OppnetOppnetScenario: Scenario: ““Citizens Citizens Called to Arms” (1)Called to Arms” (1)
SeedSeed oppnet oppnet deployeddeployedafterafter an an earthquakeearthquake(unpredictable disaster)(unpredictable disaster) Seed is aSeed is ad hoc wireless netd hoc wireless networkwork with with very very powerful nodespowerful nodes
MMore energy, computing and communication resourcesore energy, computing and communication resources
SSeed tries to eed tries to detect detect candidate helperscandidate helpers For For help in damage assessment and disaster recoveryhelp in damage assessment and disaster recovery UUses any available detection methodses any available detection method — including: — including:
RadioRadio-based (including cellphone-based) detection-based (including cellphone-based) detection SSearching for nodes using the earching for nodes using the IP addressIP address range for the range for the
affected geographic areaaffected geographic area AI-based AI-based visualvisual detection detection
E.g., visual detection of an overturned car via surveillance net E.g., visual detection of an overturned car via surveillance net / recognition of its license plate / finding / recognition of its license plate / finding OnStarOnStar connectionconnection to to it / it / contacting Body Area Networkscontacting Body Area Networks on or within bodies of car on or within bodies of car occupantsoccupants
7
7
2/9/2006
BenevolentBenevolent OppnetOppnetScenario: Scenario: ““Citizens Citizens Called to Arms” (2)Called to Arms” (2) Oppnet selects Oppnet selects optimaloptimal
subsetsubset of detected of detected nodes nodes InvitingInviting devices, clustersdevices, clusters
&& entire net entire networkworkss Helpers forHelpers for communicating communicating, , sensingsensing, , computingcomputing
UsingUsing ““hidden” capabilitieshidden” capabilities, e.g. for sensing:, e.g. for sensing: Desktop can „sense” location of a potential victim at its Desktop can „sense” location of a potential victim at its
keyboardkeyboard CCellphones ellphones can „sense” location (even ones w/o GPS can be can „sense” location (even ones w/o GPS can be
triangulated)triangulated) Using emergency functionalitiesUsing emergency functionalities
Oppnet Oppnet contactcontacts 2 s 2 independent sensornetsindependent sensornets (SNs): (SNs): water infrastructure controlwater infrastructure control SN / SN / public space surveillancepublic space surveillance SNSN
Ordered Ordered to abandon normal functionsto abandon normal functions & help in& help in disaster disaster recoveryrecovery WWater infrastructure ater infrastructure SNSN ((with multisensor capabilitieswith multisensor capabilities, , under road under road
surfaces)surfaces) — — to sense vehicular movement and traffic jamsto sense vehicular movement and traffic jams PPublic space surveillance ublic space surveillance SNSN — — to search for images of human to search for images of human
victimsvictims
8
8
2/9/2006
9
MalevolentMalevolent OppnetOppnetScenario: Scenario: ““Bad Guys Bad Guys Gang Up” (1)Gang Up” (1)
9
Scenario 1 — TerroristsScenario 1 — Terroristscreatecreate apparentlyapparently harmless weather harmless weather monito-monito-ring ring sensornetsensornet (SN): (SN): SNSN becomes a seed of a becomes a seed of a malevolentmalevolent
opportunistic opportunistic SNSN SN exploitsSN exploits other nodes from many other other nodes from many other
networksnetworks (w/o revealing its true goals)(w/o revealing its true goals) ““CCritical mass” ritical mass” of the of the opportunistic opportunistic SNSN is reached is reached ((in in
terms of geographical spread and terms of geographical spread and sensing sensing capabilitiescapabilities))
SN SN waits for waits for wind patterns that can wind patterns that can speed upspeed up spread of poisonous chemicalsspread of poisonous chemicals CCollected data used to deciollected data used to decide when to de when to start chemicalstart chemical
attackattack
2/9/2006
10
MalevolentMalevolent OppnetOppnetScenario: Scenario: ““Bad Guys Bad Guys Gang Up” (2)Gang Up” (2)
Scenario 2 — network at home starts spying on you:Scenario 2 — network at home starts spying on you: Becomes a seed oppnetBecomes a seed oppnet Exploits other devices/nets to collect all info on you:Exploits other devices/nets to collect all info on you:
From your From your fridgefridge (& RFID-equipped food packaging)(& RFID-equipped food packaging): : what/when you eatwhat/when you eat
From your From your computercomputer: keylogs your passwords, sensitive : keylogs your passwords, sensitive datadata
From your From your cellphonecellphone: who you call & when: who you call & when From your networked From your networked cameracamera: what photos you take: what photos you take From your home From your home security surveillancesecurity surveillance system: your system: your
private imagesprivate images CyberflyCyberfly with camera eyes and microphone ears with camera eyes and microphone ears ......
HugeHuge privacy problem! privacy problem! / Huge/ Huge security problem! security problem! ControlsControls to counteract malevolent oppnets to counteract malevolent oppnets badly badly
neededneeded
2/9/2006
Section 2:Section 2:Research ChallengesResearch Challenges
for Basic Oppnets Operatfor Basic Oppnets Operatiionsons
Presented in the order defined by the Presented in the order defined by the order of basic oppnet operationsorder of basic oppnet operations
Security/privacy challenges covered Security/privacy challenges covered later in Section 3later in Section 3
12
2/9/2006
YES
NO
Collaborative processing
Detect candidate helpers (system)
GR
OW
TH
Integrate helper’s resources
Admit candidatesinto oppnet
Work done?
Clean up all helpers Release helpers
NOYES
Command Center
Need to
grow?
YES
Deployseed oppnet
NO
Enoughgood
candidates?
13
2/9/2006
Challenges in Seed Oppnet Challenges in Seed Oppnet DeploymentDeployment
LocalizationLocalization Self-configuration & reconfigurationSelf-configuration & reconfiguration Adaptability Adaptability
14
2/9/2006
YES
NO
Collaborative processing
Detect candidate helpers (system)
GR
OW
TH
Integrate helper’s resources
Admit candidatesinto oppnet
Work done?
Clean up all helpers Release helpers
NOYES
Command Center
Need to
grow?
YES
Deployseed oppnet
NO
Enoughgood
candidates?
15
2/9/2006
Challenges in Challenges in DetectDetectinging Helper Helper SystemsSystems (1) (1)
Develop Develop primitives/methods to detectprimitives/methods to detect helpershelpers OverOver heterogeneous communication mediaheterogeneous communication media
Wired/WiFiWired/WiFi BluetoothBluetooth SatelliteSatellite Ham radiosHam radios ……
ability to integrate diverse technologiesability to integrate diverse technologies
16
2/9/2006
Identify and categorizeIdentify and categorize detected detected candidatescandidates E.g.,E.g., a system detect on Bluetooth a system detect on Bluetooth::
is it cellphone or laptop?is it cellphone or laptop?
ClassifyClassify detected candidates detected candidates BBased on dependability and usefulnessased on dependability and usefulness
EvaluateEvaluate candidates candidates CCan an given given candidate facilitate oppnet candidate facilitate oppnet
operationoperationss??
Challenges in Challenges in DetectDetectinging Helper Helper SystemsSystems ( (22))
17
2/9/2006
YES
NO
Collaborative processing
Detect candidate helpers (system)
GR
OW
TH
Integrate helper’s resources
Admit candidatesinto oppnet
Work done?
Clean up all helpers Release helpers
NOYES
Command Center
Need to
grow?
YES
Deployseed oppnet
NO
Enoughgood
candidates?
18
2/9/2006
Invite & Admit Candidate HelperInvite & Admit Candidate Helperss
SelectSelect candidates to invite candidates to invite Design primitives/methods to send invitationsDesign primitives/methods to send invitations
Develop methods that enable Develop methods that enable helper tohelper to accept or reject invitationaccept or reject invitation CCandidates are andidates are helpershelpers not slavesnot slaves
But in emergency situations could be forced to joinedBut in emergency situations could be forced to joined
DDesign primitives/methods to esign primitives/methods to admitadmit helperhelper into oppnetinto oppnet
Devise primitives/methods to Devise primitives/methods to managemanage expanded oppnetexpanded oppnet
19
2/9/2006
YES
NO
Collaborative processing
Detect candidate helpers (system)
GR
OW
TH
Integrate helper’s resources
Admit candidatesinto oppnet
Work done?
Clean up all helpers Release helpers
NOYES
Command Center
Need to
grow?
YES
Deployseed oppnet
NO
Enoughgood
candidates?
20
2/9/2006
Integrate Helper ResourcesIntegrate Helper Resources
Select goalsSelect goals to be facilittated by helpers to be facilittated by helpers DeterminDeterminee tasks tasks to be offloaded to helpers to be offloaded to helpers CoordinateCoordinate all tasks all tasks
21
2/9/2006
YES
NO
Collaborative processing
Detect candidate helpers (system)
GR
OW
TH
Integrate helper’s resources
Admit candidatesinto oppnet
Work done?
Clean up all helpers Release helpers
NOYES
Command Center
Need to
grow?
YES
Deployseed oppnet
NO
Enoughgood
candidates?
22
2/9/2006
CollaboratiCollaborative Processingve Processing Collaborative tCollaborative tasksasks::
GrowthGrowth Data collectionData collection and q and queryueryinging Data aggregation Data aggregation // information fusion information fusion Routing Routing Assuring cAssuring connectivityonnectivity ......
IssuesIssues:: EffectivenessEffectiveness
In emergencies, eIn emergencies, effectiveness outweighs ffectiveness outweighs eefffficiencyiciency Ideally, no cost on human life or sufferingIdeally, no cost on human life or suffering
EfficiencyEfficiency EEnergy conservation nergy conservation Efficient querying Efficient querying
Security and privacySecurity and privacy ……
23
2/9/2006
YES
NO
Collaborative processing
Detect candidate helpers (system)
GR
OW
TH
Integrate helper’s resources
Admit candidatesinto oppnet
Work done?
Clean up all helpers Release helpers
NOYES
Command Center
Need to
grow?
YES
Deployseed oppnet
NO
Enoughgood
candidates?
24
2/9/2006
CleanClean UUp p and Release Helpersand Release Helpers
Oppnet Oppnet restores restores ““original state”original state” of helpers of helpers As close as possible to their state just before As close as possible to their state just before
they joinedthey joined Imperative to minimize intrusiveness of helperImperative to minimize intrusiveness of helper
Oppnet Oppnet releases releases helpers from helpers from ““duty”duty”
25
2/9/2006
YES
NO
Collaborative processing
Detect candidate helpers (system)
GR
OW
TH
Integrate helper’s resources
Admit candidatesinto oppnet
Work done?
Clean up all helpers Release helpers
NOYES
Command Center
Need to
grow?
YES
Deployseed oppnet
NO
Enoughgood
candidates?
26
2/9/2006
Command CenterCommand Center (CC) (CC) CC capable ofCC capable of interactive interactive (h (human uman
interventionintervention)) or autonomousor autonomous actions actions
CC CC taskstasks include: include: Determine/modify Determine/modify goalgoalss AActivatectivate actuators/sensors actuators/sensors ManageManage oppnet oppnet
Decide when/how to growDecide when/how to grow Optimize resourcesOptimize resources ......
Facilitate Facilitate human inputhuman input for for interactive heuristics interactive heuristics DetermineDetermine c critical massritical mass of seed oppnet of seed oppnet && expanded expanded
oppnetoppnet OOptimize oppnet ptimize oppnet configurationconfiguration ......
CC aCC assuressuress realization realization of oppnet goals of oppnet goals 27
2/9/2006
RelatedRelated ResearchResearch Oppnets Oppnets viewed as aviewed as a superset of superset of MANETMANET
((MANET MANET = = Mobile AdMobile Ad h hoc Noc NETETworkwork))
=>=> Challenges Challenges inherent to MANET carried over inherent to MANET carried over toto oppnetsoppnets
LLocalization, data ocalization, data iintegration & aggregationntegration & aggregation
Growth in Growth in P2PP2P ssystems ystems Searching for peers in unstructured systemsSearching for peers in unstructured systems
GridGrid Systems Systems Integrating and managing heterogeneous systemsIntegrating and managing heterogeneous systems
Trojan HorsesTrojan Horses MimicMimic their spread capabilities their spread capabilities in search for in search for
helpershelpers OthersOthers
CenWitsCenWits 28
2/9/2006
Section 3:Section 3: Research Challenges Research Challenges
for Security and Privacy in Oppnets (1)for Security and Privacy in Oppnets (1) Prevent Prevent malicious malicious helpershelpers from joining from joining
Common Common attacksattacks MITMMITM Packet droppingPacket dropping DoS attack on weak devicesDoS attack on weak devices ID spoofingID spoofing ......
Finding Finding ““good”good” cryptographic primitivescryptographic primitives
30
2/9/2006
Increasing Increasing trusttrust Routing through more trusted systemsRouting through more trusted systems SharShareded secrets secrets forfor each each communicating communicating pair pair Using shared secrets with broadcast Using shared secrets with broadcast
authentication authentication Using digital signatureUsing digital signaturess
Assuring Assuring privacyprivacy Privacy of communicationPrivacy of communicationss and data storage and data storage Communication patternsCommunication patterns
Broadcast/Broadcast/mmulticast from the base station ulticast from the base station Messages Messages among nodes & among nodes & from nodes to the base from nodes to the base
station station 31
Research ChallengesResearch Challengesfor Security and Privacy in Oppnets for Security and Privacy in Oppnets
(2)(2)
2/9/2006
Intrusion detectionIntrusion detection Why?Why?
When prevention failsWhen prevention fails Lack of initial authentication mechanismLack of initial authentication mechanism
Issues in Issues in intrusion detectionintrusion detection Securely distributing information about malicious entities Securely distributing information about malicious entities Heterogeneous – Heterogeneous – rrealeal--time intrusion detection and time intrusion detection and
response response
32
Research ChallengesResearch Challengesfor Security and Privacy in Oppnets for Security and Privacy in Oppnets
(3)(3)
2/9/2006
Section 4a:Section 4a:ConclusionsConclusions
High-payoff High-payoff potentialpotential for the oppnet Initiative for the oppnet Initiative RReduction of human suffering & loss of lifeeduction of human suffering & loss of life EEconomic conomic benefitsbenefits Technological, educational & research benefitsTechnological, educational & research benefits
34
2/9/2006
Impact of Oppnets Impact of Oppnets on the Societyon the Society Impact onImpact on Emergency Preparadness and ResponseEmergency Preparadness and Response
operationsoperations in Homeland Security (in Homeland Security (HSHS) — current app ) — current app focusfocus TTremendous leveraging potentiaremendous leveraging potential in emergenciesl in emergencies
AA wealth wealth of of freely freely availableavailable resourcesresources ReReduction of human suffering duction of human suffering && loss of life loss of life IIncreasing safety ncreasing safety && efficiency of the first responders efficiency of the first responders
Impact on Impact on other applicationsother applications in HS and outside HS in HS and outside HS EconomicEconomic impact impact
Technology Technology ttransfer ransfer && ccommercializationommercialization Benefits for the computer industryBenefits for the computer industry
ProductionProduction of software of software / / networking networking equipmentequipment Benefits for other industriesBenefits for other industries
Enhancing many products with standard oppnet interfacesEnhancing many products with standard oppnet interfaces E.g.: cars with oppnet-capable nodes — E.g.: cars with oppnet-capable nodes — auto industryauto industry
benefitsbenefits35
2/9/2006
Advancing Advancing the the network know-hownetwork know-how By dBy development of the evelopment of the oppnetoppnet technology technology Enhancing distributed applications served by „regular” Enhancing distributed applications served by „regular”
networksnetworks Enabling new Enabling new application niches we can not even foreseeapplication niches we can not even foresee
AAdvancdvancing ing otherother critical areas critical areas of computer of computer technologytechnology IIncluding wireless ncluding wireless systems, sensornets, systems, sensornets, ad hoc systems ad hoc systems &&
pervasive computingpervasive computing AA side effect side effect of oppnet developmentsof oppnet developments
TTechnology impacts echnology impacts sspeedpeededed up up && enhance enhancedd by by the the planned planned technology transfertechnology transfer plusplus commercializationcommercialization activitiesactivities
36
Impact of Oppnets Impact of Oppnets on on TechnologyTechnology
2/9/2006
Impact on Impact on sstudentstudents For project participants: hFor project participants: hands-on ands-on B.S./M.S./Ph.DB.S./M.S./Ph.D trainingtraining For others: cFor others: course enhancementsourse enhancements / / course projectscourse projects / /
seminarseminarss Oppnet pOppnet prototype used rototype used for lab for lab experimentexperimentss
DDissemination of issemination of reresearch research resultssults PPublications, presentationsublications, presentations,, seminars, poster sessions, seminars, poster sessions,
web siteweb site Public availability of Public availability of the the oppnet oppnet prototype, tools prototype, tools && data data
OOutreachutreach activities activities IIncluding K-12 demosncluding K-12 demos for underrepresented minorities for underrepresented minorities
All activities will All activities will bbroadenroaden the the America’s America’s talent pooltalent pool in critical technologies and applicationsin critical technologies and applications Training Training more minority more minority && female female studentsstudents at all levels at all levels
37
Impact of Oppnets Impact of Oppnets ononEducationEducation & Research & Research
2/9/2006
Section 4b:Section 4b:Future WorkFuture Work
Building a Building a prototypeprototype To To demonstratdemonstratee technical prowess & economic technical prowess & economic
benefitsbenefits
TTechnology transferechnology transfer && commercializationcommercialization Discussed aboveDiscussed above
38
2/9/2006
Future Work:Future Work:EPR Oppnet Initiative — EPR Oppnet Initiative —
MilestonesMilestones Building Building state-of-the-art state-of-the-art lab flab facilitacilitiesies Constructing an Constructing an oppnetoppnet prototypeprototype in the l in the labab DDevelopevelopinging performance analysis performance analysis toolstools to to
support testing support testing && fine-tuning activities fine-tuning activities ExtendingExtending the the prototype prototype toto include include livingliving--
laboratorylaboratory resources available in ourresources available in our sensor- sensor- && computer-rich computer-rich buildingbuilding
TestingTesting the the prototype within the living laboratoryprototype within the living laboratory FFor fine-tuning design & implementationor fine-tuning design & implementation
ObtainingObtaining external assessmentexternal assessment of the prototype of the prototype FFrom computer rom computer && homeland security labs in homeland security labs in MI, IN, ILMI, IN, IL
39
2/9/2006
WiSe Lab Publications onWiSe Lab Publications onSensornets, Oppnets & Pervasive ComputingSensornets, Oppnets & Pervasive Computing
1.1. L. Lilien and A. Gupta, ” Opportunistic Networks L. Lilien and A. Gupta, ” Opportunistic Networks for Emergency Preparadness and Response” (for Emergency Preparadness and Response” (submisubmitted for publication).tted for publication).
2.2. V. Bhuse, A. Gupta, and L. Lilien, "Research challenges in lightweight intrusion detection for sensornets" V. Bhuse, A. Gupta, and L. Lilien, "Research challenges in lightweight intrusion detection for sensornets" ((submisubmitted for tted for publication).publication).
3.3. L. Lilien and B. Bhargava, ”A Scheme for Privacy-preserving Data Dissemination,” L. Lilien and B. Bhargava, ”A Scheme for Privacy-preserving Data Dissemination,” IEEE Transactions on Systems, Man and IEEE Transactions on Systems, Man and CyberneticsCybernetics (to appear). (to appear).
4.4. L. Lilien, Z. Kamal, V. Bhuse and A. Gupta, "Opportunistic Networks: The Concept and Research ChallengesL. Lilien, Z. Kamal, V. Bhuse and A. Gupta, "Opportunistic Networks: The Concept and Research Challenges,” ,” International International Workshop on Research Challenges in Security and Privacy for Mobile and Wireless NetworksWorkshop on Research Challenges in Security and Privacy for Mobile and Wireless Networks ( (WSPWNWSPWN 20 200606), Miami, Florida, ), Miami, Florida, March 2006March 2006 (to appear). (to appear).
5.5. T. Canli, M. Terwilliger, A. Gupta and A. Khokhar, "Power Efficient Algorithms for Computing Fast Fourier Transform over T. Canli, M. Terwilliger, A. Gupta and A. Khokhar, "Power Efficient Algorithms for Computing Fast Fourier Transform over Wireless Sensor NetworksWireless Sensor Networks,," " The Fourth ACS/IEEE Conference on Computer Systems and ApplicationsThe Fourth ACS/IEEE Conference on Computer Systems and Applications, Dubai, UAE, March 2006. , Dubai, UAE, March 2006.
6.6. V. Bhuse, A. Gupta and L. Lilien, "DPDSN: Detection of packet-dropping attacks for wireless sensor networksV. Bhuse, A. Gupta and L. Lilien, "DPDSN: Detection of packet-dropping attacks for wireless sensor networks,," " Proceedings of Proceedings of the the 4th4th International Trusted Internet Workshop (TIW) International Trusted Internet Workshop (TIW), , International Conference on High Performance ComputingInternational Conference on High Performance Computing, Goa, India, , Goa, India, December 2005. December 2005.
7.7. A. Gupta and V. Bhuse, "Anamoly Intrusion Detection in Wireless Sensor NetworksA. Gupta and V. Bhuse, "Anamoly Intrusion Detection in Wireless Sensor Networks,," " Journal of High Speed NetworksJournal of High Speed Networks, vol. 15, , vol. 15, issue 1, January-March 2006. issue 1, January-March 2006.
8.8. M. Terwilliger, A. Gupta, A. Khokhar and G. Greenwood,M. Terwilliger, A. Gupta, A. Khokhar and G. Greenwood, "Localization using Evolution Strategies in Sensornets"Localization using Evolution Strategies in Sensornets,," " Proceedings of Proceedings of the IEEE Congress on Evolutionary Computationthe IEEE Congress on Evolutionary Computation, Edinburgh, UK, Edinburgh, UK,, September 2005. September 2005.
9.9. V. Bhuse, A. Gupta, M. Terwilliger, Z. Yang and Z. Kamal, "Using Routing Data for Information Authentication in Sensor V. Bhuse, A. Gupta, M. Terwilliger, Z. Yang and Z. Kamal, "Using Routing Data for Information Authentication in Sensor NetworksNetworks,," " Proceedings of the 3rd International Trusted Internet Workshop (TIW)Proceedings of the 3rd International Trusted Internet Workshop (TIW), , International Conference on High International Conference on High Performance ComputingPerformance Computing, Bangalore, India, December 2004. , Bangalore, India, December 2004.
10.10. T. Canli, M. Terwilliger, A. Gupta and A. Khokhar, "Power-Time Efficient Algorithm for Computing FFT in Sensor NetworksT. Canli, M. Terwilliger, A. Gupta and A. Khokhar, "Power-Time Efficient Algorithm for Computing FFT in Sensor Networks,," " (E(Extended Abstractxtended Abstract)). . Proceedings of the Second ACM Conference on Embedded Networked Sensor SystemsProceedings of the Second ACM Conference on Embedded Networked Sensor Systems ( (SenSysSenSys), ), Baltimore, Maryland, November 2004.Baltimore, Maryland, November 2004.
11.11. B. Bhargava, L. Lilien, A. Rosenthal, and M. Winslett, “PervasiveTrust,” B. Bhargava, L. Lilien, A. Rosenthal, and M. Winslett, “PervasiveTrust,” IEEE Intelligent SystemsIEEE Intelligent Systems, vol. 19(5), Sep./Oct.2004, pp. , vol. 19(5), Sep./Oct.2004, pp. 74-77. 74-77.
12.12. B. Bhargava and L. Lilien, “Private and Trusted Collaborations,” B. Bhargava and L. Lilien, “Private and Trusted Collaborations,” Proc. Secure Knowledge Management (SKM 2004): A WorkshopProc. Secure Knowledge Management (SKM 2004): A Workshop, , Amherst, NY, Sep. 2004.Amherst, NY, Sep. 2004.
13.13. M. Jenamani, L. Lilien, and B. Bhargava, “Anonymizing Web Services Through a Club Mechanism with Economic Incentives,” M. Jenamani, L. Lilien, and B. Bhargava, “Anonymizing Web Services Through a Club Mechanism with Economic Incentives,” Proc. International Conference on Web Services (ICWS 2004)Proc. International Conference on Web Services (ICWS 2004), San Diego, California, July 2004, pp. 792-795., San Diego, California, July 2004, pp. 792-795.
14.14. Z. Kamal, M. Salahuddin, A. Gupta, M. Terwilliger, V. Bhuse and B. Beckmann, "Analytical Analysis of Data and Decision Fusion Z. Kamal, M. Salahuddin, A. Gupta, M. Terwilliger, V. Bhuse and B. Beckmann, "Analytical Analysis of Data and Decision Fusion in Sensor Networksin Sensor Networks,," " TThe 2004 International Conference on Embedded Systems and Applicationshe 2004 International Conference on Embedded Systems and Applications. Las Vegas, June 2004.. Las Vegas, June 2004.
15.15. M. Terwilliger, A. Gupta, V. Bhuse, Z. Kamal, and M. Salahuddin, "A Localization System M. Terwilliger, A. Gupta, V. Bhuse, Z. Kamal, and M. Salahuddin, "A Localization System UUsing Wireless Sensor Networks: A sing Wireless Sensor Networks: A Comparison of Two TechniquesComparison of Two Techniques,," " Proceedings of the 2004 Workshop on Positioning, Navigation and CommunicationProceedings of the 2004 Workshop on Positioning, Navigation and Communication, Hanover, , Hanover, Germany, March 2004 , Germany, March 2004 , pp.pp. 95-100. 95-100.
16.16. V. Bhuse, A. Gupta and R. Pidva, "A Distributed Approach to Security in SensornetsV. Bhuse, A. Gupta and R. Pidva, "A Distributed Approach to Security in Sensornets,," " The 58th IEEE Semiannual Vehicular The 58th IEEE Semiannual Vehicular Technology ConferenceTechnology Conference, Orlando, Florida, USA, Orlando, Florida, USA, , October 2003.October 2003.
17.17. L. Lilien, “Developing Pervasive Trust Paradigm for Authentication and Authorization,” L. Lilien, “Developing Pervasive Trust Paradigm for Authentication and Authorization,” Proc. Third Cracow Grid Workshop Proc. Third Cracow Grid Workshop (CGW’03)(CGW’03), Kraków (Cracow), Poland, October 2003, pp. 42-49 (invited paper)., Kraków (Cracow), Poland, October 2003, pp. 42-49 (invited paper).
40
2/9/2006
WiSe Lab Experience in Sensornets WiSe Lab Experience in Sensornets – Selected Projects Since 1/03– Selected Projects Since 1/03
DesignDesigninging of of WiSe WiSe Security Protocols: DSPSSecurity Protocols: DSPS Location Tracker Location Tracker UUsing Motessing Motes (*) (*) RHS: RHS: Remote Home SurveillanceRemote Home Surveillance (*) (*) Directed Diffusion: Attacks & CountermeasuresDirected Diffusion: Attacks & Countermeasures Improving the Accuracy of Improving the Accuracy of Mote Mote MeasurementsMeasurements
by by UUsingsing Neural NetNeural Networkworkss SOMS: SOMS: Smart Occupancy Monitoring System Smart Occupancy Monitoring System UUsing Motessing Motes (*) (*) Comparative Study of Network SimulatorsComparative Study of Network Simulators CollaborativeCollaborative Image Processing Image Processing (*) (*) DENSe: a Development Environment for Networked SensorsDENSe: a Development Environment for Networked Sensors Incorporating Incorporating MMobile-ware in obile-ware in DDistributed istributed CComputations / omputations / GGridrids s
(*)(*) ExtendExtendinging the the ns-2 ns-2 Simulator Simulator to to SSatellite and WCN atellite and WCN SSimulationimulationss Smart Smart AAntennas for WCNsntennas for WCNs Energy Energy EEfficient MAC fficient MAC PProtocols for IEEE 802.11xrotocols for IEEE 802.11x A Wireless Security Testing SystemA Wireless Security Testing System (*) (*) Mobile and Self-Mobile and Self-CCalibrating Irrigation Systemalibrating Irrigation System Collective Collective CCommunications for ommunications for SSensornetsensornets (*) (*)
* Results directly useful for oppnets* Results directly useful for oppnets41
2/9/2006
Sensor NodeSensor Node
Sen-sors CPU Radio
Battery
Event detection Wireless communication
42
Node implementation (MICA-2)
Neighboring Nodes
Node Structure
2/9/2006
Thank you very muchThank you very muchfor your time and attention!for your time and attention!
43
2/9/2006
Sensor NodeSensor Node
Sen-sors CPU Radio
Battery
Event detection Wireless communication
46
Node implementation (MICA-2)
Neighboring Nodes
Node Structure
2/9/2006
Startup: Seed OppnetStartup: Seed Oppnet
47
Oppnet starts as a Oppnet starts as a seedseed oppnetoppnet
Seed oppnet grows into an Seed oppnet grows into an expandedexpanded oppnetoppnet
Wireless Nodes
Link tothe World
Base Station
2/9/2006
Growth: Expanded OppnetGrowth: Expanded Oppnet
48
Wireless Nodes
Link tothe World
Base Station
Appliance(refrigerator
)Cellphone
Tower
Satellite
Computer Network
MicrowaveRelay
Overturned Vehicle with OnStar
HeterogenousHeterogenous helpers helpers join oppnet join oppnet Add communication, computing, sensing, other resourcesAdd communication, computing, sensing, other resources
2/9/2006
Fig - Expanded Oppnet (size : Fig - Expanded Oppnet (size : 50%)50%)
49
49
49
Best version above; worse, older version below:
2/9/2006
>>FIX OR SKIP:<<>>FIX OR SKIP:<<Integrate Helper ResourcesIntegrate Helper Resources
Select goalsSelect goals to be facilittated by helpers to be facilittated by helpers DeterminDeterminee tasks tasks to be offloaded to helpers to be offloaded to helpers CoordinateCoordinate all tasks all tasks ADD SOME MORE POINTSADD SOME MORE POINTS ANOTHER POINT ANOTHER POINT ONE MORE POINTONE MORE POINT ……
50