2/9/2006 Opportunistic Networks: The Concept and Research Challenges Leszek Lilien, Zille Huma Kamal...

50
2/9/2006 Opportunistic Opportunistic Networks: Networks: The Concept and Research The Concept and Research Challenges Challenges Leszek Lilien, Zille Huma Kamal and Ajay Gupta Leszek Lilien, Zille Huma Kamal and Ajay Gupta In cooperation with: Vijay Bhuse and Zijiang In cooperation with: Vijay Bhuse and Zijiang (James) Yang (James) Yang Wi Wi reless Sensornet Laboratory ( reless Sensornet Laboratory ( WiSe Lab WiSe Lab ) ) http://www.cs.wmich.edu/wsn Department of Computer Science Department of Computer Science Western Michigan University Western Michigan University Kalamazoo, MI 49008 Kalamazoo, MI 49008
  • date post

    21-Dec-2015
  • Category

    Documents

  • view

    222
  • download

    1

Transcript of 2/9/2006 Opportunistic Networks: The Concept and Research Challenges Leszek Lilien, Zille Huma Kamal...

2/9/2006

Opportunistic Opportunistic Networks:Networks:The Concept and Research The Concept and Research

ChallengesChallengesLeszek Lilien, Zille Huma Kamal and Ajay GuptaLeszek Lilien, Zille Huma Kamal and Ajay Gupta

In cooperation with: Vijay Bhuse and Zijiang (James) YangIn cooperation with: Vijay Bhuse and Zijiang (James) Yang

WiWireless Sensornet Laboratory (reless Sensornet Laboratory (WiSe LabWiSe Lab))http://www.cs.wmich.edu/wsn

Department of Computer ScienceDepartment of Computer ScienceWestern Michigan UniversityWestern Michigan University

Kalamazoo, MI 49008Kalamazoo, MI 49008

2/9/2006

Basic Concepts for Opportunistic Basic Concepts for Opportunistic NetworksNetworks

New paradigm and technology:New paradigm and technology:Opportunistic Networks (Oppnets)Opportunistic Networks (Oppnets)

Facing Facing thethe challenge of challenge of PervasivePervasive Computing Computing AdvancingAdvancing leading-edge leading-edge pervasive computing and pervasive computing and

networking networking know-howknow-how

Applications ranging from EPR to mundane Applications ranging from EPR to mundane chores, etc.chores, etc.

2

2/9/2006

Startup: Seed OppnetStartup: Seed Oppnet

3

Oppnet starts as a Oppnet starts as a seedseed oppnetoppnet

Seed oppnet grows into an Seed oppnet grows into an expandedexpanded oppnetoppnet

Wireless Nodes

Link tothe World

Base Station

2/9/2006

Growth: Expanded OppnetGrowth: Expanded Oppnet

4

Wireless Nodes

Link tothe World

Base Station

Appliance(refrigerator

)

Satellite

Computer Network

MicrowaveRelay

Overturned Vehicle with OnStar

CellphoneTower

HeterogenousHeterogenous helpers helpers join oppnet join oppnet Add communication, computing, sensing, storage, other resourcesAdd communication, computing, sensing, storage, other resources

2/9/2006

Important Concepts in OppnetsImportant Concepts in Oppnets     InitialInitial seed oppnet seed oppnet actionsactions

Localize nodesLocalize nodes Configure seed oppnetConfigure seed oppnet Adapt seed oppnet to environmentAdapt seed oppnet to environment

Seed oppnet Seed oppnet growthgrowth Detecting & identifying candidate helpersDetecting & identifying candidate helpers Contacting & inviting selected candidate Contacting & inviting selected candidate

helpershelpers Admitting & integrating helpersAdmitting & integrating helpers Offloading tasks to helpersOffloading tasks to helpers

Determining useful colaborative functionalitiesDetermining useful colaborative functionalities Managing offloaded tasksManaging offloaded tasks

5

2/9/2006

Basic Oppnet CategoriesBasic Oppnet Categories

2 major oppnet 2 major oppnet categoriescategories:: BenevolentBenevolent oppnets oppnets MalevolentMalevolent oppnets oppnets

Corresponding oppnets Corresponding oppnets scenariosscenarios:: BenevolentBenevolent oppnet scenario: oppnet scenario:

““Citizens Called to Arms”Citizens Called to Arms”

MalevolentMalevolent oppnet scenario: oppnet scenario:

““Bad Guys Gang Up”Bad Guys Gang Up”

6

2/9/2006

BenevolentBenevolent OppnetOppnetScenario: Scenario: ““Citizens Citizens Called to Arms” (1)Called to Arms” (1)

SeedSeed oppnet oppnet deployeddeployedafterafter an an earthquakeearthquake(unpredictable disaster)(unpredictable disaster) Seed is aSeed is ad hoc wireless netd hoc wireless networkwork with with very very powerful nodespowerful nodes

MMore energy, computing and communication resourcesore energy, computing and communication resources

SSeed tries to eed tries to detect detect candidate helperscandidate helpers For For help in damage assessment and disaster recoveryhelp in damage assessment and disaster recovery UUses any available detection methodses any available detection method — including: — including:

RadioRadio-based (including cellphone-based) detection-based (including cellphone-based) detection SSearching for nodes using the earching for nodes using the IP addressIP address range for the range for the

affected geographic areaaffected geographic area AI-based AI-based visualvisual detection detection

E.g., visual detection of an overturned car via surveillance net E.g., visual detection of an overturned car via surveillance net / recognition of its license plate / finding / recognition of its license plate / finding OnStarOnStar connectionconnection to to it / it / contacting Body Area Networkscontacting Body Area Networks on or within bodies of car on or within bodies of car occupantsoccupants

7

7

2/9/2006

BenevolentBenevolent OppnetOppnetScenario: Scenario: ““Citizens Citizens Called to Arms” (2)Called to Arms” (2) Oppnet selects Oppnet selects optimaloptimal

subsetsubset of detected of detected nodes nodes InvitingInviting devices, clustersdevices, clusters

&& entire net entire networkworkss Helpers forHelpers for communicating communicating, , sensingsensing, , computingcomputing

UsingUsing ““hidden” capabilitieshidden” capabilities, e.g. for sensing:, e.g. for sensing: Desktop can „sense” location of a potential victim at its Desktop can „sense” location of a potential victim at its

keyboardkeyboard CCellphones ellphones can „sense” location (even ones w/o GPS can be can „sense” location (even ones w/o GPS can be

triangulated)triangulated) Using emergency functionalitiesUsing emergency functionalities

Oppnet Oppnet contactcontacts 2 s 2 independent sensornetsindependent sensornets (SNs): (SNs): water infrastructure controlwater infrastructure control SN / SN / public space surveillancepublic space surveillance SNSN

Ordered Ordered to abandon normal functionsto abandon normal functions & help in& help in disaster disaster recoveryrecovery WWater infrastructure ater infrastructure SNSN ((with multisensor capabilitieswith multisensor capabilities, , under road under road

surfaces)surfaces) — — to sense vehicular movement and traffic jamsto sense vehicular movement and traffic jams PPublic space surveillance ublic space surveillance SNSN — — to search for images of human to search for images of human

victimsvictims

8

8

2/9/2006

9

MalevolentMalevolent OppnetOppnetScenario: Scenario: ““Bad Guys Bad Guys Gang Up” (1)Gang Up” (1)

9

Scenario 1 — TerroristsScenario 1 — Terroristscreatecreate apparentlyapparently harmless weather harmless weather monito-monito-ring ring sensornetsensornet (SN): (SN): SNSN becomes a seed of a becomes a seed of a malevolentmalevolent

opportunistic opportunistic SNSN SN exploitsSN exploits other nodes from many other other nodes from many other

networksnetworks (w/o revealing its true goals)(w/o revealing its true goals) ““CCritical mass” ritical mass” of the of the opportunistic opportunistic SNSN is reached is reached ((in in

terms of geographical spread and terms of geographical spread and sensing sensing capabilitiescapabilities))

SN SN waits for waits for wind patterns that can wind patterns that can speed upspeed up spread of poisonous chemicalsspread of poisonous chemicals CCollected data used to deciollected data used to decide when to de when to start chemicalstart chemical

attackattack

2/9/2006

10

MalevolentMalevolent OppnetOppnetScenario: Scenario: ““Bad Guys Bad Guys Gang Up” (2)Gang Up” (2)

Scenario 2 — network at home starts spying on you:Scenario 2 — network at home starts spying on you: Becomes a seed oppnetBecomes a seed oppnet Exploits other devices/nets to collect all info on you:Exploits other devices/nets to collect all info on you:

From your From your fridgefridge (& RFID-equipped food packaging)(& RFID-equipped food packaging): : what/when you eatwhat/when you eat

From your From your computercomputer: keylogs your passwords, sensitive : keylogs your passwords, sensitive datadata

From your From your cellphonecellphone: who you call & when: who you call & when From your networked From your networked cameracamera: what photos you take: what photos you take From your home From your home security surveillancesecurity surveillance system: your system: your

private imagesprivate images CyberflyCyberfly with camera eyes and microphone ears with camera eyes and microphone ears ......

HugeHuge privacy problem! privacy problem! / Huge/ Huge security problem! security problem! ControlsControls to counteract malevolent oppnets to counteract malevolent oppnets badly badly

neededneeded

2/9/2006

11

This page left blank intentionally.

2/9/2006

Section 2:Section 2:Research ChallengesResearch Challenges

for Basic Oppnets Operatfor Basic Oppnets Operatiionsons

Presented in the order defined by the Presented in the order defined by the order of basic oppnet operationsorder of basic oppnet operations

Security/privacy challenges covered Security/privacy challenges covered later in Section 3later in Section 3

12

2/9/2006

YES

NO

Collaborative processing

Detect candidate helpers (system)

GR

OW

TH

Integrate helper’s resources

Admit candidatesinto oppnet

Work done?

Clean up all helpers Release helpers

NOYES

Command Center

Need to

grow?

YES

Deployseed oppnet

NO

Enoughgood

candidates?

13

2/9/2006

Challenges in Seed Oppnet Challenges in Seed Oppnet DeploymentDeployment

LocalizationLocalization Self-configuration & reconfigurationSelf-configuration & reconfiguration Adaptability Adaptability

14

2/9/2006

YES

NO

Collaborative processing

Detect candidate helpers (system)

GR

OW

TH

Integrate helper’s resources

Admit candidatesinto oppnet

Work done?

Clean up all helpers Release helpers

NOYES

Command Center

Need to

grow?

YES

Deployseed oppnet

NO

Enoughgood

candidates?

15

2/9/2006

Challenges in Challenges in DetectDetectinging Helper Helper SystemsSystems (1) (1)

Develop Develop primitives/methods to detectprimitives/methods to detect helpershelpers OverOver heterogeneous communication mediaheterogeneous communication media

Wired/WiFiWired/WiFi BluetoothBluetooth SatelliteSatellite Ham radiosHam radios ……

ability to integrate diverse technologiesability to integrate diverse technologies

16

2/9/2006

Identify and categorizeIdentify and categorize detected detected candidatescandidates E.g.,E.g., a system detect on Bluetooth a system detect on Bluetooth::

is it cellphone or laptop?is it cellphone or laptop?

ClassifyClassify detected candidates detected candidates BBased on dependability and usefulnessased on dependability and usefulness

EvaluateEvaluate candidates candidates CCan an given given candidate facilitate oppnet candidate facilitate oppnet

operationoperationss??

Challenges in Challenges in DetectDetectinging Helper Helper SystemsSystems ( (22))

17

2/9/2006

YES

NO

Collaborative processing

Detect candidate helpers (system)

GR

OW

TH

Integrate helper’s resources

Admit candidatesinto oppnet

Work done?

Clean up all helpers Release helpers

NOYES

Command Center

Need to

grow?

YES

Deployseed oppnet

NO

Enoughgood

candidates?

18

2/9/2006

Invite & Admit Candidate HelperInvite & Admit Candidate Helperss

SelectSelect candidates to invite candidates to invite Design primitives/methods to send invitationsDesign primitives/methods to send invitations

Develop methods that enable Develop methods that enable helper tohelper to accept or reject invitationaccept or reject invitation CCandidates are andidates are helpershelpers not slavesnot slaves

But in emergency situations could be forced to joinedBut in emergency situations could be forced to joined

DDesign primitives/methods to esign primitives/methods to admitadmit helperhelper into oppnetinto oppnet

Devise primitives/methods to Devise primitives/methods to managemanage expanded oppnetexpanded oppnet

19

2/9/2006

YES

NO

Collaborative processing

Detect candidate helpers (system)

GR

OW

TH

Integrate helper’s resources

Admit candidatesinto oppnet

Work done?

Clean up all helpers Release helpers

NOYES

Command Center

Need to

grow?

YES

Deployseed oppnet

NO

Enoughgood

candidates?

20

2/9/2006

Integrate Helper ResourcesIntegrate Helper Resources

Select goalsSelect goals to be facilittated by helpers to be facilittated by helpers DeterminDeterminee tasks tasks to be offloaded to helpers to be offloaded to helpers CoordinateCoordinate all tasks all tasks

21

2/9/2006

YES

NO

Collaborative processing

Detect candidate helpers (system)

GR

OW

TH

Integrate helper’s resources

Admit candidatesinto oppnet

Work done?

Clean up all helpers Release helpers

NOYES

Command Center

Need to

grow?

YES

Deployseed oppnet

NO

Enoughgood

candidates?

22

2/9/2006

CollaboratiCollaborative Processingve Processing Collaborative tCollaborative tasksasks::

GrowthGrowth Data collectionData collection and q and queryueryinging Data aggregation Data aggregation // information fusion information fusion Routing Routing Assuring cAssuring connectivityonnectivity ......

IssuesIssues:: EffectivenessEffectiveness

In emergencies, eIn emergencies, effectiveness outweighs ffectiveness outweighs eefffficiencyiciency Ideally, no cost on human life or sufferingIdeally, no cost on human life or suffering

EfficiencyEfficiency EEnergy conservation nergy conservation Efficient querying Efficient querying

Security and privacySecurity and privacy ……

23

2/9/2006

YES

NO

Collaborative processing

Detect candidate helpers (system)

GR

OW

TH

Integrate helper’s resources

Admit candidatesinto oppnet

Work done?

Clean up all helpers Release helpers

NOYES

Command Center

Need to

grow?

YES

Deployseed oppnet

NO

Enoughgood

candidates?

24

2/9/2006

CleanClean UUp p and Release Helpersand Release Helpers

Oppnet Oppnet restores restores ““original state”original state” of helpers of helpers As close as possible to their state just before As close as possible to their state just before

they joinedthey joined Imperative to minimize intrusiveness of helperImperative to minimize intrusiveness of helper

Oppnet Oppnet releases releases helpers from helpers from ““duty”duty”

25

2/9/2006

YES

NO

Collaborative processing

Detect candidate helpers (system)

GR

OW

TH

Integrate helper’s resources

Admit candidatesinto oppnet

Work done?

Clean up all helpers Release helpers

NOYES

Command Center

Need to

grow?

YES

Deployseed oppnet

NO

Enoughgood

candidates?

26

2/9/2006

Command CenterCommand Center (CC) (CC) CC capable ofCC capable of interactive interactive (h (human uman

interventionintervention)) or autonomousor autonomous actions actions

CC CC taskstasks include: include: Determine/modify Determine/modify goalgoalss AActivatectivate actuators/sensors actuators/sensors ManageManage oppnet oppnet

Decide when/how to growDecide when/how to grow Optimize resourcesOptimize resources ......

Facilitate Facilitate human inputhuman input for for interactive heuristics interactive heuristics DetermineDetermine c critical massritical mass of seed oppnet of seed oppnet && expanded expanded

oppnetoppnet OOptimize oppnet ptimize oppnet configurationconfiguration ......

CC aCC assuressuress realization realization of oppnet goals of oppnet goals 27

2/9/2006

RelatedRelated ResearchResearch Oppnets Oppnets viewed as aviewed as a superset of superset of MANETMANET

((MANET MANET = = Mobile AdMobile Ad h hoc Noc NETETworkwork))

=>=> Challenges Challenges inherent to MANET carried over inherent to MANET carried over toto oppnetsoppnets

LLocalization, data ocalization, data iintegration & aggregationntegration & aggregation

Growth in Growth in P2PP2P ssystems ystems Searching for peers in unstructured systemsSearching for peers in unstructured systems

GridGrid Systems Systems Integrating and managing heterogeneous systemsIntegrating and managing heterogeneous systems

Trojan HorsesTrojan Horses MimicMimic their spread capabilities their spread capabilities in search for in search for

helpershelpers OthersOthers

CenWitsCenWits 28

2/9/2006

29

This page left blank intentionally.

2/9/2006

Section 3:Section 3: Research Challenges Research Challenges

for Security and Privacy in Oppnets (1)for Security and Privacy in Oppnets (1) Prevent Prevent malicious malicious helpershelpers from joining from joining

Common Common attacksattacks MITMMITM Packet droppingPacket dropping DoS attack on weak devicesDoS attack on weak devices ID spoofingID spoofing ......

Finding Finding ““good”good” cryptographic primitivescryptographic primitives

30

2/9/2006

Increasing Increasing trusttrust Routing through more trusted systemsRouting through more trusted systems SharShareded secrets secrets forfor each each communicating communicating pair pair Using shared secrets with broadcast Using shared secrets with broadcast

authentication authentication Using digital signatureUsing digital signaturess

Assuring Assuring privacyprivacy Privacy of communicationPrivacy of communicationss and data storage and data storage Communication patternsCommunication patterns

Broadcast/Broadcast/mmulticast from the base station ulticast from the base station Messages Messages among nodes & among nodes & from nodes to the base from nodes to the base

station station 31

Research ChallengesResearch Challengesfor Security and Privacy in Oppnets for Security and Privacy in Oppnets

(2)(2)

2/9/2006

Intrusion detectionIntrusion detection Why?Why?

When prevention failsWhen prevention fails Lack of initial authentication mechanismLack of initial authentication mechanism

Issues in Issues in intrusion detectionintrusion detection Securely distributing information about malicious entities Securely distributing information about malicious entities Heterogeneous – Heterogeneous – rrealeal--time intrusion detection and time intrusion detection and

response response

32

Research ChallengesResearch Challengesfor Security and Privacy in Oppnets for Security and Privacy in Oppnets

(3)(3)

2/9/2006

33

This page left blank intentionally.

2/9/2006

Section 4a:Section 4a:ConclusionsConclusions

High-payoff High-payoff potentialpotential for the oppnet Initiative for the oppnet Initiative RReduction of human suffering & loss of lifeeduction of human suffering & loss of life EEconomic conomic benefitsbenefits Technological, educational & research benefitsTechnological, educational & research benefits

34

2/9/2006

Impact of Oppnets Impact of Oppnets on the Societyon the Society Impact onImpact on Emergency Preparadness and ResponseEmergency Preparadness and Response

operationsoperations in Homeland Security (in Homeland Security (HSHS) — current app ) — current app focusfocus TTremendous leveraging potentiaremendous leveraging potential in emergenciesl in emergencies

AA wealth wealth of of freely freely availableavailable resourcesresources ReReduction of human suffering duction of human suffering && loss of life loss of life IIncreasing safety ncreasing safety && efficiency of the first responders efficiency of the first responders

Impact on Impact on other applicationsother applications in HS and outside HS in HS and outside HS EconomicEconomic impact impact

Technology Technology ttransfer ransfer && ccommercializationommercialization Benefits for the computer industryBenefits for the computer industry

ProductionProduction of software of software / / networking networking equipmentequipment Benefits for other industriesBenefits for other industries

Enhancing many products with standard oppnet interfacesEnhancing many products with standard oppnet interfaces E.g.: cars with oppnet-capable nodes — E.g.: cars with oppnet-capable nodes — auto industryauto industry

benefitsbenefits35

2/9/2006

Advancing Advancing the the network know-hownetwork know-how By dBy development of the evelopment of the oppnetoppnet technology technology Enhancing distributed applications served by „regular” Enhancing distributed applications served by „regular”

networksnetworks Enabling new Enabling new application niches we can not even foreseeapplication niches we can not even foresee

AAdvancdvancing ing otherother critical areas critical areas of computer of computer technologytechnology IIncluding wireless ncluding wireless systems, sensornets, systems, sensornets, ad hoc systems ad hoc systems &&

pervasive computingpervasive computing AA side effect side effect of oppnet developmentsof oppnet developments

TTechnology impacts echnology impacts sspeedpeededed up up && enhance enhancedd by by the the planned planned technology transfertechnology transfer plusplus commercializationcommercialization activitiesactivities

36

Impact of Oppnets Impact of Oppnets on on TechnologyTechnology

2/9/2006

Impact on Impact on sstudentstudents For project participants: hFor project participants: hands-on ands-on B.S./M.S./Ph.DB.S./M.S./Ph.D trainingtraining For others: cFor others: course enhancementsourse enhancements / / course projectscourse projects / /

seminarseminarss Oppnet pOppnet prototype used rototype used for lab for lab experimentexperimentss

DDissemination of issemination of reresearch research resultssults PPublications, presentationsublications, presentations,, seminars, poster sessions, seminars, poster sessions,

web siteweb site Public availability of Public availability of the the oppnet oppnet prototype, tools prototype, tools && data data

OOutreachutreach activities activities IIncluding K-12 demosncluding K-12 demos for underrepresented minorities for underrepresented minorities

All activities will All activities will bbroadenroaden the the America’s America’s talent pooltalent pool in critical technologies and applicationsin critical technologies and applications Training Training more minority more minority && female female studentsstudents at all levels at all levels

37

Impact of Oppnets Impact of Oppnets ononEducationEducation & Research & Research

2/9/2006

Section 4b:Section 4b:Future WorkFuture Work

Building a Building a prototypeprototype To To demonstratdemonstratee technical prowess & economic technical prowess & economic

benefitsbenefits

TTechnology transferechnology transfer && commercializationcommercialization Discussed aboveDiscussed above

38

2/9/2006

Future Work:Future Work:EPR Oppnet Initiative — EPR Oppnet Initiative —

MilestonesMilestones     Building Building state-of-the-art state-of-the-art lab flab facilitacilitiesies Constructing an Constructing an oppnetoppnet prototypeprototype in the l in the labab DDevelopevelopinging performance analysis performance analysis toolstools to to

support testing support testing && fine-tuning activities fine-tuning activities ExtendingExtending  the the prototype prototype toto include include livingliving--

laboratorylaboratory resources available in ourresources available in our sensor- sensor- && computer-rich computer-rich buildingbuilding

TestingTesting the the prototype within the living laboratoryprototype within the living laboratory FFor fine-tuning design & implementationor fine-tuning design & implementation

ObtainingObtaining external assessmentexternal assessment of the prototype of the prototype FFrom computer rom computer && homeland security labs in homeland security labs in MI, IN, ILMI, IN, IL

39

2/9/2006

WiSe Lab Publications onWiSe Lab Publications onSensornets, Oppnets & Pervasive ComputingSensornets, Oppnets & Pervasive Computing

1.1. L. Lilien and A. Gupta, ” Opportunistic Networks L. Lilien and A. Gupta, ” Opportunistic Networks for Emergency Preparadness and Response” (for Emergency Preparadness and Response” (submisubmitted for publication).tted for publication).

2.2. V. Bhuse, A. Gupta, and L. Lilien, "Research challenges in lightweight intrusion detection for sensornets" V. Bhuse, A. Gupta, and L. Lilien, "Research challenges in lightweight intrusion detection for sensornets" ((submisubmitted for tted for publication).publication).

3.3. L. Lilien and B. Bhargava, ”A Scheme for Privacy-preserving Data Dissemination,” L. Lilien and B. Bhargava, ”A Scheme for Privacy-preserving Data Dissemination,” IEEE Transactions on Systems, Man and IEEE Transactions on Systems, Man and CyberneticsCybernetics (to appear). (to appear).

4.4. L. Lilien, Z. Kamal, V. Bhuse and A. Gupta, "Opportunistic Networks: The Concept and Research ChallengesL. Lilien, Z. Kamal, V. Bhuse and A. Gupta, "Opportunistic Networks: The Concept and Research Challenges,” ,” International International Workshop on Research Challenges in Security and Privacy for Mobile and Wireless NetworksWorkshop on Research Challenges in Security and Privacy for Mobile and Wireless Networks ( (WSPWNWSPWN 20 200606), Miami, Florida, ), Miami, Florida, March 2006March 2006 (to appear). (to appear).

5.5. T. Canli, M. Terwilliger, A. Gupta and A. Khokhar, "Power Efficient Algorithms for Computing Fast Fourier Transform over T. Canli, M. Terwilliger, A. Gupta and A. Khokhar, "Power Efficient Algorithms for Computing Fast Fourier Transform over Wireless Sensor NetworksWireless Sensor Networks,," " The Fourth ACS/IEEE Conference on Computer Systems and ApplicationsThe Fourth ACS/IEEE Conference on Computer Systems and Applications, Dubai, UAE, March 2006. , Dubai, UAE, March 2006.

6.6. V. Bhuse, A. Gupta and L. Lilien, "DPDSN: Detection of packet-dropping attacks for wireless sensor networksV. Bhuse, A. Gupta and L. Lilien, "DPDSN: Detection of packet-dropping attacks for wireless sensor networks,," " Proceedings of Proceedings of the the 4th4th   International Trusted Internet Workshop (TIW)   International Trusted Internet Workshop (TIW), , International Conference on High Performance ComputingInternational Conference on High Performance Computing, Goa, India, , Goa, India, December 2005. December 2005.

7.7. A. Gupta and V. Bhuse, "Anamoly Intrusion Detection in Wireless Sensor NetworksA. Gupta and V. Bhuse, "Anamoly Intrusion Detection in Wireless Sensor Networks,," " Journal of High Speed NetworksJournal of High Speed Networks,  vol. 15, ,  vol. 15, issue 1, January-March 2006. issue 1, January-March 2006.

8.8. M. Terwilliger, A. Gupta, A. Khokhar and G. Greenwood,M. Terwilliger, A. Gupta, A. Khokhar and G. Greenwood, "Localization using Evolution Strategies in Sensornets"Localization using Evolution Strategies in Sensornets,," " Proceedings of Proceedings of the IEEE Congress on Evolutionary Computationthe IEEE Congress on Evolutionary Computation, Edinburgh, UK, Edinburgh, UK,, September 2005. September 2005.

9.9. V. Bhuse, A. Gupta, M. Terwilliger, Z. Yang and Z. Kamal, "Using Routing Data for Information Authentication in Sensor V. Bhuse, A. Gupta, M. Terwilliger, Z. Yang and Z. Kamal, "Using Routing Data for Information Authentication in Sensor NetworksNetworks,," " Proceedings of the 3rd   International Trusted Internet Workshop (TIW)Proceedings of the 3rd   International Trusted Internet Workshop (TIW), , International Conference on High International Conference on High Performance ComputingPerformance Computing, Bangalore, India, December 2004. , Bangalore, India, December 2004.

10.10. T. Canli, M. Terwilliger, A. Gupta and A. Khokhar, "Power-Time Efficient Algorithm for Computing FFT in Sensor NetworksT. Canli, M. Terwilliger, A. Gupta and A. Khokhar, "Power-Time Efficient Algorithm for Computing FFT in Sensor Networks,," " (E(Extended Abstractxtended Abstract)). . Proceedings of the Second ACM Conference on Embedded Networked Sensor SystemsProceedings of the Second ACM Conference on Embedded Networked Sensor Systems ( (SenSysSenSys), ), Baltimore, Maryland, November 2004.Baltimore, Maryland, November 2004.

11.11. B. Bhargava, L. Lilien, A. Rosenthal, and M. Winslett, “PervasiveTrust,” B. Bhargava, L. Lilien, A. Rosenthal, and M. Winslett, “PervasiveTrust,” IEEE Intelligent SystemsIEEE Intelligent Systems, vol. 19(5), Sep./Oct.2004, pp. , vol. 19(5), Sep./Oct.2004, pp. 74-77. 74-77.

12.12. B. Bhargava and L. Lilien, “Private and Trusted Collaborations,” B. Bhargava and L. Lilien, “Private and Trusted Collaborations,” Proc. Secure Knowledge Management (SKM 2004): A WorkshopProc. Secure Knowledge Management (SKM 2004): A Workshop, , Amherst, NY, Sep. 2004.Amherst, NY, Sep. 2004.

13.13. M. Jenamani, L. Lilien, and B. Bhargava, “Anonymizing Web Services Through a Club Mechanism with Economic Incentives,” M. Jenamani, L. Lilien, and B. Bhargava, “Anonymizing Web Services Through a Club Mechanism with Economic Incentives,” Proc. International Conference on Web Services (ICWS 2004)Proc. International Conference on Web Services (ICWS 2004), San Diego, California, July 2004, pp. 792-795., San Diego, California, July 2004, pp. 792-795.

14.14. Z. Kamal, M. Salahuddin, A. Gupta, M. Terwilliger, V. Bhuse and B. Beckmann, "Analytical Analysis of Data and Decision Fusion Z. Kamal, M. Salahuddin, A. Gupta, M. Terwilliger, V. Bhuse and B. Beckmann, "Analytical Analysis of Data and Decision Fusion in Sensor Networksin Sensor Networks,," " TThe 2004 International Conference on Embedded Systems and Applicationshe 2004 International Conference on Embedded Systems and Applications. Las Vegas, June 2004.. Las Vegas, June 2004.

15.15. M. Terwilliger, A. Gupta, V. Bhuse, Z. Kamal, and M. Salahuddin, "A Localization System M. Terwilliger, A. Gupta, V. Bhuse, Z. Kamal, and M. Salahuddin, "A Localization System UUsing Wireless Sensor Networks: A sing Wireless Sensor Networks: A Comparison of Two TechniquesComparison of Two Techniques,," " Proceedings of the 2004 Workshop on Positioning, Navigation and CommunicationProceedings of the 2004 Workshop on Positioning, Navigation and Communication, Hanover, , Hanover, Germany, March 2004 , Germany, March 2004 , pp.pp. 95-100. 95-100.

16.16. V. Bhuse, A. Gupta and R. Pidva, "A Distributed Approach to Security in SensornetsV. Bhuse, A. Gupta and R. Pidva, "A Distributed Approach to Security in Sensornets,," " The 58th IEEE Semiannual Vehicular The 58th IEEE Semiannual Vehicular Technology ConferenceTechnology Conference, Orlando, Florida, USA, Orlando, Florida, USA, , October 2003.October 2003.

17.17. L. Lilien, “Developing Pervasive Trust Paradigm for Authentication and Authorization,” L. Lilien, “Developing Pervasive Trust Paradigm for Authentication and Authorization,” Proc. Third Cracow Grid Workshop Proc. Third Cracow Grid Workshop (CGW’03)(CGW’03), Kraków (Cracow), Poland, October 2003, pp. 42-49 (invited paper)., Kraków (Cracow), Poland, October 2003, pp. 42-49 (invited paper).

40

2/9/2006

WiSe Lab Experience in Sensornets WiSe Lab Experience in Sensornets – Selected Projects Since 1/03– Selected Projects Since 1/03

DesignDesigninging of of WiSe WiSe Security Protocols: DSPSSecurity Protocols: DSPS Location Tracker Location Tracker UUsing Motessing Motes (*) (*) RHS: RHS: Remote Home SurveillanceRemote Home Surveillance (*) (*) Directed Diffusion: Attacks & CountermeasuresDirected Diffusion: Attacks & Countermeasures Improving the Accuracy of Improving the Accuracy of Mote Mote MeasurementsMeasurements

by by UUsingsing Neural NetNeural Networkworkss SOMS: SOMS: Smart Occupancy Monitoring System Smart Occupancy Monitoring System UUsing Motessing Motes (*) (*) Comparative Study of Network SimulatorsComparative Study of Network Simulators CollaborativeCollaborative Image Processing Image Processing (*) (*) DENSe: a Development Environment for Networked SensorsDENSe: a Development Environment for Networked Sensors Incorporating Incorporating MMobile-ware in obile-ware in DDistributed istributed CComputations / omputations / GGridrids s

(*)(*) ExtendExtendinging the the ns-2 ns-2 Simulator Simulator to to SSatellite and WCN atellite and WCN SSimulationimulationss Smart Smart AAntennas for WCNsntennas for WCNs Energy Energy EEfficient MAC fficient MAC PProtocols for IEEE 802.11xrotocols for IEEE 802.11x A Wireless Security Testing SystemA Wireless Security Testing System (*) (*) Mobile and Self-Mobile and Self-CCalibrating Irrigation Systemalibrating Irrigation System Collective Collective CCommunications for ommunications for SSensornetsensornets (*) (*)

* Results directly useful for oppnets* Results directly useful for oppnets41

2/9/2006

Sensor NodeSensor Node

Sen-sors CPU Radio

Battery

Event detection Wireless communication

42

Node implementation (MICA-2)

Neighboring Nodes

Node Structure

2/9/2006

Thank you very muchThank you very muchfor your time and attention!for your time and attention!

43

2/9/2006

44

2/9/2006

45

2/9/2006

Sensor NodeSensor Node

Sen-sors CPU Radio

Battery

Event detection Wireless communication

46

Node implementation (MICA-2)

Neighboring Nodes

Node Structure

2/9/2006

Startup: Seed OppnetStartup: Seed Oppnet

47

Oppnet starts as a Oppnet starts as a seedseed oppnetoppnet

Seed oppnet grows into an Seed oppnet grows into an expandedexpanded oppnetoppnet

Wireless Nodes

Link tothe World

Base Station

2/9/2006

Growth: Expanded OppnetGrowth: Expanded Oppnet

48

Wireless Nodes

Link tothe World

Base Station

Appliance(refrigerator

)Cellphone

Tower

Satellite

Computer Network

MicrowaveRelay

Overturned Vehicle with OnStar

HeterogenousHeterogenous helpers helpers join oppnet join oppnet Add communication, computing, sensing, other resourcesAdd communication, computing, sensing, other resources

2/9/2006

Fig - Expanded Oppnet (size : Fig - Expanded Oppnet (size : 50%)50%)

49

49

49

Best version above; worse, older version below:

2/9/2006

>>FIX OR SKIP:<<>>FIX OR SKIP:<<Integrate Helper ResourcesIntegrate Helper Resources

Select goalsSelect goals to be facilittated by helpers to be facilittated by helpers DeterminDeterminee tasks tasks to be offloaded to helpers to be offloaded to helpers CoordinateCoordinate all tasks all tasks ADD SOME MORE POINTSADD SOME MORE POINTS ANOTHER POINT ANOTHER POINT ONE MORE POINTONE MORE POINT ……

50