Overview of Research at UNL-TDU
description
Transcript of Overview of Research at UNL-TDU
![Page 1: Overview of Research at UNL-TDU](https://reader034.fdocuments.us/reader034/viewer/2022051316/56815893550346895dc5f3c7/html5/thumbnails/1.jpg)
Overview of Researchat UNL-TDU
October 16, 2003Yoshito Tobe
Ubiquitous Networking LaboratoryTokyo Denki University
![Page 2: Overview of Research at UNL-TDU](https://reader034.fdocuments.us/reader034/viewer/2022051316/56815893550346895dc5f3c7/html5/thumbnails/2.jpg)
Goal
To establish the most suitable networking technology for ubiquitous computing
To establish a unified view and discipline of networking (particles, devices, people, society etc.)
Core: NETWORK-ING
![Page 3: Overview of Research at UNL-TDU](https://reader034.fdocuments.us/reader034/viewer/2022051316/56815893550346895dc5f3c7/html5/thumbnails/3.jpg)
History Apr. 1, 2002. Bootstrapping Dec. 2002 First students. Welcome! Dec. 20, 2003. First Event: Visiting SONY CSL Feb. 25, 2003. Visiting Todai-STONE Mar. 17, 2003. Visiting Tokuda-lab Apr. 1, 2003. One-year anniversary Apr. 26, 2003. Sight-seeing with Al Krohn May 31, 2003. Joint workshop with Todai, Keio, UEC Aug. 4, 2003. Visiting Taki-lab, TDU Aug. 25- Sep. 5, 2003. ACM SIGCOMM etc. Sep. 26, 3003. Visiting TRL. IBM [Planned] Nov. 4-9 Los Angeles Tour
![Page 4: Overview of Research at UNL-TDU](https://reader034.fdocuments.us/reader034/viewer/2022051316/56815893550346895dc5f3c7/html5/thumbnails/4.jpg)
Members
Faculty members 2 Bachelor's students 3 Joint Researchers 4 Total 5 (9 in a wider sense)
![Page 5: Overview of Research at UNL-TDU](https://reader034.fdocuments.us/reader034/viewer/2022051316/56815893550346895dc5f3c7/html5/thumbnails/5.jpg)
Faculty members
Yoshito Tobe (Sensor Maps)
Hiroki Saito (HTTP/TCP Analysis)
へ のへのもへ
![Page 6: Overview of Research at UNL-TDU](https://reader034.fdocuments.us/reader034/viewer/2022051316/56815893550346895dc5f3c7/html5/thumbnails/6.jpg)
Bachelor's Students
Kazunori Makimura (Net Mgt for Sensor Networks)
Ken'ichiro Kanehana (Computing Resource Mgt. considering Physical Env.)
Yasufumi Yamauchi (Service Cooperation Using Multi-hop Wireless Networks)
![Page 7: Overview of Research at UNL-TDU](https://reader034.fdocuments.us/reader034/viewer/2022051316/56815893550346895dc5f3c7/html5/thumbnails/7.jpg)
Joint Researchers (1)
Koichi Katayama (Sasaki Lab) Intrusion Detection
Niwat Thepvilojanapong (Univ. of Tokyo) Robust and Secure Multicast ?
![Page 8: Overview of Research at UNL-TDU](https://reader034.fdocuments.us/reader034/viewer/2022051316/56815893550346895dc5f3c7/html5/thumbnails/8.jpg)
Joint Researchers (2)
Hiroto (Keio Tokuda Lab.) Group Management of Wireless Nodes
Makoto Takizawa (Keio Tokuda Lab.)
Member of RT project
![Page 9: Overview of Research at UNL-TDU](https://reader034.fdocuments.us/reader034/viewer/2022051316/56815893550346895dc5f3c7/html5/thumbnails/9.jpg)
Research Topics
Network Management for Sensor Networks
Public-Private Association Human-Assisted Ad hoc
Networks
![Page 10: Overview of Research at UNL-TDU](https://reader034.fdocuments.us/reader034/viewer/2022051316/56815893550346895dc5f3c7/html5/thumbnails/10.jpg)
Network Management for Distributed Sensors
1
![Page 11: Overview of Research at UNL-TDU](https://reader034.fdocuments.us/reader034/viewer/2022051316/56815893550346895dc5f3c7/html5/thumbnails/11.jpg)
Problems on Sensor-Network Management
??"Which sensor ?"
Sensors
Sensors
Sensors
1. Specifying nodes is difficult.
2. Performance such as delay is unpredictable because network is self-configured.
3. When failures occur, identification of the failed nodes is difficult.
4. Replacing batteries is required before they run out.
![Page 12: Overview of Research at UNL-TDU](https://reader034.fdocuments.us/reader034/viewer/2022051316/56815893550346895dc5f3c7/html5/thumbnails/12.jpg)
Why is conventional network management not sufficient ?
3
Simple Network Management Protocol (SNMP)
Manager
Agents
Sensor-specific failures arenot handled.Physical connections are notutilized.
![Page 13: Overview of Research at UNL-TDU](https://reader034.fdocuments.us/reader034/viewer/2022051316/56815893550346895dc5f3c7/html5/thumbnails/13.jpg)
SNAC Objectives Notification of Sensor-Specific Failures Utilization of Physical Views Identification of Constructed Topology Statistical Management
4
![Page 14: Overview of Research at UNL-TDU](https://reader034.fdocuments.us/reader034/viewer/2022051316/56815893550346895dc5f3c7/html5/thumbnails/14.jpg)
Early Notification
5
Noderemaining amount of
battery
Alive Node above threshold
Weakened Node below threshold
Depleted Node none
It is desirable to replace the battery of the sensor nodebefore it is depleted . Each node is equipped with battery, and NMN(Network-Management Node) is warned when the amount of the battery at a node falls below a certain threshold.
An event is transmitted to NMN to notify that a node becomesweakened. In some case, nodes surrounding a weakened nodesend events to NMN.
![Page 15: Overview of Research at UNL-TDU](https://reader034.fdocuments.us/reader034/viewer/2022051316/56815893550346895dc5f3c7/html5/thumbnails/15.jpg)
Geographical Management
6
(0, 0)
Area-cast : specified in some range in geographical area.
Y1
Alive Node
Weakened Node
Depleted Node
Healthiness of an area is obtained using area-cast.
Area-cast is independent of the underlyingrouting protocol. However, if the routing protocol supports geographical information, the area-cast utilizes the information.
1
0
10
(0, 1)
(1, 0)
(1, 1)
10
1
0
(1, 11)(1, 01)
(1, 00) (1, 10)
… (1, 11)
… (1, 111)
Location addr
![Page 16: Overview of Research at UNL-TDU](https://reader034.fdocuments.us/reader034/viewer/2022051316/56815893550346895dc5f3c7/html5/thumbnails/16.jpg)
Performance Management
7
Sensor network is self-configured. Therefore, a route that is undesirable in terms of delay could be created. To diagnosesuch performance, NMN can identify a route between nodes.NMN can indicate to reconfigure a routedepending on the reported performance.
A1
A2A3
A4
NMN
?
?×
×Route is recorded.
![Page 17: Overview of Research at UNL-TDU](https://reader034.fdocuments.us/reader034/viewer/2022051316/56815893550346895dc5f3c7/html5/thumbnails/17.jpg)
Visual Enhancement
8
Nodes can be equipped with indicators such as LEDs. Network management can be enhanced with the aid of suchindicators.Commands: show-route-to-node show-congested-nodes
Example: find weakened nodes
Weakened NodeThe route from NMNto a target node is indicatedwith LEDs.
Alive Node
<green>LEDs blinks.
<Red>LEDs blinks
![Page 18: Overview of Research at UNL-TDU](https://reader034.fdocuments.us/reader034/viewer/2022051316/56815893550346895dc5f3c7/html5/thumbnails/18.jpg)
SNAC Prototype20 MICA Motes
Implementation built on TinyOS
Commands: (1) Show-route-to-node
(2) Light-all-alive-nodes
Event Notification
weakened node
9
![Page 19: Overview of Research at UNL-TDU](https://reader034.fdocuments.us/reader034/viewer/2022051316/56815893550346895dc5f3c7/html5/thumbnails/19.jpg)
SAPEA: Secure Management of Public-Private-Device Association
![Page 20: Overview of Research at UNL-TDU](https://reader034.fdocuments.us/reader034/viewer/2022051316/56815893550346895dc5f3c7/html5/thumbnails/20.jpg)
Background Personal Computing Devices are
equipped with short-distance radio functionality. Short-distance radio technology
IrDA IEEE802.11 Bluetooth
The increase of Hot Spot that can use a public computer equipment is forecast.
![Page 21: Overview of Research at UNL-TDU](https://reader034.fdocuments.us/reader034/viewer/2022051316/56815893550346895dc5f3c7/html5/thumbnails/21.jpg)
Problem when public equipment is used
Secret information protect when equipment is used When communicating with the equipment is not
information stolen? Does the secret information remain in the use
equipment, and do not it leak? Is not information transmitted to the equipment not
intended when there are two or more equipment? Are not you peeped at from the outsider?
The access control using physical space information is done between a public equipment and personal device.
SAPEA: Secure Ad-hoc Personalization Alliance
![Page 22: Overview of Research at UNL-TDU](https://reader034.fdocuments.us/reader034/viewer/2022051316/56815893550346895dc5f3c7/html5/thumbnails/22.jpg)
SAPEA: Secure Ad-hoc Personalization Alliance
Want to use the equipment secure in not only on the network but also the real world. Neither information nor signs remain in the
equipment after used. Use limitation only within the district zone. The secret information protect from outsider
whom does not want to be known. Grouping
![Page 23: Overview of Research at UNL-TDU](https://reader034.fdocuments.us/reader034/viewer/2022051316/56815893550346895dc5f3c7/html5/thumbnails/23.jpg)
Approach Secure use of public equipment by limitatio
n of using authority by distance from equipment, and grouping. Distance judgment by radio devices such
as RFID and Bluetooth. Grouping and communication by Bluetooth. Authentication and encryption communication by
SSL. Level of Accessible Zone (AZ) is divide.
![Page 24: Overview of Research at UNL-TDU](https://reader034.fdocuments.us/reader034/viewer/2022051316/56815893550346895dc5f3c7/html5/thumbnails/24.jpg)
Related WorksThe Resurrecting Duckling [1]
Computer equipment
Association
Ad-hoc Filesystem [2]
Personal DevicePersonal Device
Personal Device
Trust for Ubiquitous, Transparent Collaboration [3]
Personal Device Personal Device Personal Device
Phone Number
Recommendation+
Phone Number
Recommendation’+
Personal Device
![Page 25: Overview of Research at UNL-TDU](https://reader034.fdocuments.us/reader034/viewer/2022051316/56815893550346895dc5f3c7/html5/thumbnails/25.jpg)
SAPEA: System Architecture
Personal DevicePersonal Device Access StationAccess Station
SSL
Wireless Device
AssociationManager
User Interface DeviceManager
AreaManager
AssociationManager
SSL
Wireless Device
LocationDetector
Device #1
Device #2
Device #3
![Page 26: Overview of Research at UNL-TDU](https://reader034.fdocuments.us/reader034/viewer/2022051316/56815893550346895dc5f3c7/html5/thumbnails/26.jpg)
AZ2 AZ1
Only the user Can be detected and inquired
Can be used
User and Associate Can be detected and inquired
Can be used
User, Associate and Outsider
Can be detected and inquired
Not can be used
AZ
Group
![Page 27: Overview of Research at UNL-TDU](https://reader034.fdocuments.us/reader034/viewer/2022051316/56815893550346895dc5f3c7/html5/thumbnails/27.jpg)
SAPEA : Basic action
Distancejudgment
Cannot use
Demand
State inquiry
Outside of AZ Inside of AZ2
Inside of AZ1
Use state
Others are usingNo others
Notifies the user
Groupjudgment
Only the same group
Other groups are detected
Notifies all
Use or Stop
Can be used Stop
Do not useUseDistancejudgment
![Page 28: Overview of Research at UNL-TDU](https://reader034.fdocuments.us/reader034/viewer/2022051316/56815893550346895dc5f3c7/html5/thumbnails/28.jpg)
Distance judgment
AZ2: AS is detectable
AZ1: AScan be used
AccessStation
Accessible ZoneAccessible Zone
![Page 29: Overview of Research at UNL-TDU](https://reader034.fdocuments.us/reader034/viewer/2022051316/56815893550346895dc5f3c7/html5/thumbnails/29.jpg)
Grouping
A
A
A
AZ1
A
A
A
B
AccessStation
AccessStation
101 110001010
101
+
-
!?
Z
A
![Page 30: Overview of Research at UNL-TDU](https://reader034.fdocuments.us/reader034/viewer/2022051316/56815893550346895dc5f3c7/html5/thumbnails/30.jpg)
Implementation Implement environment
Access Station IBM Think Pad X30
socket Bluetooth Connection Kit Red Hat Linux kernel-2.4.18
bluez-kernel-2.3 OpenSSL 0.97b
Personal Device SHARP Zaurus SL-C700
socket Bluetooth Connection Kit bluez-kernel-2.3
RFID Printer
![Page 31: Overview of Research at UNL-TDU](https://reader034.fdocuments.us/reader034/viewer/2022051316/56815893550346895dc5f3c7/html5/thumbnails/31.jpg)
Concluding Remarks:
Networking Technologies are evolving.