GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin (Sherman) Shen, and Xiaodong.

Slides:



Advertisements
Similar presentations
1 A Real-Time Communication Framework for Wireless Sensor-Actuator Networks Edith C.H. Ngai 1, Michael R. Lyu 1, and Jiangchuan Liu 2 1 Department of Computer.
Advertisements

anywhere and everywhere. omnipresent A sensor network is an infrastructure comprised of sensing (measuring), computing, and communication elements.
Josh Alcorn Larry Brachfeld An in depth review of ad hoc mobile network & cloud security concerns.
A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
1 Secure Handshake with Symptoms-matching: The Essential to the Success of mHealthcare Social Network University of Waterloo & University of Ontario Institute.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
A Mobile Ad hoc Biosensor Network Muzammil KP S7,ECE Govt. Engg. College, Wayanad.
Sensor Network 教育部資通訊科技人才培育先導型計畫. 1.Introduction General Purpose  A wireless sensor network (WSN) is a wireless network using sensors to cooperatively.
1 Distributed Adaptive Sampling, Forwarding, and Routing Algorithms for Wireless Visual Sensor Networks Johnsen Kho, Long Tran-Thanh, Alex Rogers, Nicholas.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
University of Waterloo & UOIT & INRIA Lille Presenter: Rongxing Lu
1 Prediction-based Strategies for Energy Saving in Object Tracking Sensor Networks Yingqi Xu, Wang-Chien Lee Proceedings of the 2004 IEEE International.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
1 On Handling QoS Traffic in Wireless Sensor Networks 吳勇慶.
A Survey on Wireless Mesh Networks Sih-Han Chen 陳思翰 Department of Computer Science and Information Engineering National Taipei University of Technology.
Security Issues In Sensor Networks By Priya Palanivelu.
Data-Centric Energy Efficient Scheduling for Densely Deployed Sensor Networks IEEE Communications Society 2004 Chi Ma, Ming Ma and Yuanyuan Yang.
Energy-Efficient Target Coverage in Wireless Sensor Networks Mihaela Cardei, My T. Thai, YingshuLi, WeiliWu Annual Joint Conference of the IEEE Computer.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Maximum Network lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Mihaela Cardei, Jie Wu, Mingming Lu, and Mohammad O. Pervaiz Department.
DATA SECURITY AND PRIVACY IN WIRELESS BODY AREA NETWORKS MING LI AND WENJING LOU, WORCESTER POLYTECHNIC INSTITUTE KUI REN, ILLINOIS INSTITUTE OF TECHNOLOGY.
Wireless Sensor Network Security Anuj Nagar CS 590.
Talha Naeem Qureshi Joint work with Tauseef Shah and Nadeem Javaid
1 Energy Efficient Communication in Wireless Sensor Networks Yingyue Xu 8/14/2015.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Project Introduction 이 상 신 Korea Electronics Technology Institute.
EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications Rongxing Lu, Xiaohui Liang, Xu Li, Xiaodong Lin, Xuemin.
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
Enhancing the Security of Corporate Wi-Fi Networks using DAIR PRESENTED BY SRAVANI KAMBAM 1.
Grammati Pantziou 1, Aristides Mpitziopoulos 2, Damianos Gavalas 2, Charalampos Konstantopoulos 3, and Basilis Mamalis 1 1 Department of Informatics, Technological.
A Mobile-IP Based Mobility System for Wireless Metropolitan Area Networks Chung-Kuo Chang; Parallel Processing, ICPP 2005 Workshops. International.
A Design for Secure and Survivable Wireless Sensor Networks Yi Qian, Kejie Lu, David Tipper Presented by: William Newton University of Maryland, Baltimore.
Preserving Area Coverage in Wireless Sensor Networks by using Surface Coverage Relay Dominating Sets Jean Carle, Antoine Gallais and David Simplot-Ryl.
COST289 14th MCM Towards Cognitive Communications 13 April Towards Cognitive Communications A COST Action Proposal Mehmet Safak.
Overview of Research Activities Aylin Yener
Efficient Deployment Algorithms for Prolonging Network Lifetime and Ensuring Coverage in Wireless Sensor Networks Yong-hwan Kim Korea.
Maximum Network Lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Cardei, M.; Jie Wu; Mingming Lu; Pervaiz, M.O.; Wireless And Mobile.
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
Hybrid Cellular-Ad hoc Data Network Shuai Zhang, Ziwen Zhang, Jikai Yin.
SENSOR NETWORKS BY Umesh Shah Mayuresh Patil G P Reddy GUIDES Prof U.B.Desai Prof S.N.Merchant.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
An Energy-Aware Periodical Data Gathering Protocol Using Deterministic Clustering in Wireless Sensor Networks (WSN) Mohammad Rajiullah & Shigeru Shimamoto.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Ad Hoc Network.
Tufts Wireless Laboratory Tufts University School Of Engineering Real-Time Data Services for Cyber Physical Systems Zhong Zou.
Copyright © 2011, Scalable and Energy-Efficient Broadcasting in Multi-hop Cluster-Based Wireless Sensor Networks Long Cheng ∗ †, Sajal K. Das†,
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Internet of Things in Industries
TELEHEALTH [3] Remote Patient Monitoring obtained from patches of sensors on human body. Challenge: Energy efficient Body Area Network (BAN) and reliable.
Mitigating starvation in Wireless Ad hoc Networks: Multi-channel MAC and Power Control Adviser : Frank, Yeong-Sung Lin Presented by Shin-Yao Chen.
Saran Jenjaturong, Chalermek Intanagonwiwat Department of Computer Engineering Chulalongkorn University Bangkok, Thailand IEEE CROWNCOM 2008 acceptance.
Energy Efficient Detection of Compromised Nodes in Wireless Sensor Networks Haengrae Cho Department of Computer Engineering, Yeungnam University Gyungbuk.
VEHICULAR AD HOC NETWORKS GAURAV KORDE KAPIL SHARMA.
Cognitive Radio Wireless Sensor Networks: Applications, Challenges and Research Trends Prepared by: Ameer Sameer Hamood University of Babylon - Iraq Information.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
An Efficient Routing Protocol for Green Communications in Vehicular Ad-hoc Networks Jamal Toutouh, Enritue Alba GECCO’ 11, July Presented by 劉美妙.
In the name of God.
Hacker Detection in Wireless sensor network
Energy Efficient Detection of Compromised Nodes in Wireless Sensor Networks Haengrae Cho Department of Computer Engineering, Yeungnam University Gyungbuk.
Net 435: Wireless sensor network (WSN)
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (Sherman) Shen
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (Sherman) Shen
Authors: Ing-Ray Chen; Yating Wang Present by: Kaiqun Fu
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
Protocols.
An Overview of Security Issues in Sensor Network
Protocols.
Presentation transcript:

GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin (Sherman) Shen, and Xiaodong Lin IEEE Communications Magazine April 2011

OUTLINE  Introduction  Overview and GRS requirements  Energy efficiency in M2M communications  Reliability in M2M communications  Security in M2M communications  Conclusions

Introduction  The exponential growth of wireless communication devices and the ubiquity of wireless communication networks have recently led to the emergence of wireless machine-to-machine (M2M) communications as the most promising solution for revolutionizing the future “ intelligent ” pervasive applications.

Introduction  The primary advantage of M2M communications Intelligent wireless devices collaboratively collecting delivering real time monitoring data to people it does not need direct human intervention

Introduction  The best know application of M2M communications Satellite navigation system

Introduction  Typical applications and benefits of M2M communications

Overview of M2M Communications Architecture  M2M communications paradigm, which mainly consists of three interlinked domains: M2M domain Network domain Application domain

Overview of M2M Communications Architecture  M2M communications paradigm, which mainly consists of three interlinked domains: M2M domain Network domain Application domain

Overview of M2M Communications Architecture  M2M communications paradigm, which mainly consists of three interlinked domains: M2M domain Network domain Application domain

Overview of M2M Communications Architecture  M2M communications paradigm, which mainly consists of three interlinked domains: M2M domain Network domain Application domain

Introduction  M2M faces many technical challenges : M2M deployment architecture M2M software M2M communication’s energy efficiency, reliability, and security

The GRS Requirements in M2M Communication M2M GRS requirement GreenReliabilitySecurity

The GRS Requirements in M2M Communication  Green M2M GRS requirement Green Since a mass of M2M nodes {N 0, N 1, …} are deployed in the M2M domain, M2M communications should focus on energy saving by optimizing M2M nodes’ sensing, processing, and transmissions, and ultimately prolong the lifetime of the whole M2M communications.

The GRS Requirements in M2M Communication  Reliability unreliable sensing, processing, and transmission can cause : false monitoring data reports long delays data loss M2M GRS requirement Reliability

The GRS Requirements in M2M Communication  Security M2M GRS requirement Security unattended M2M domain in many M2M applications makes an attacker able to easily launch some physical attacks, compromising M2M nodes. for energy saving, a fraction of M2M nodes could switch into sleeping mode, which further makes these attacks undetectable.

Energy efficiency in M2M communications

 Because a massive number of machines are involved in M2M communications, the energy efficiency (green) becomes a challenging issue especially in M2M domain. Adjusting transmission power efficient communication protocols. (e.g., routing protocols) activity scheduling scheme Energy efficiency in M2M communications

 Activity scheduling scheme. A. Gallais et al., “Localized Sensor Area Coverage With Low Communication Overhead,” IEEE Trans. Mobile Computing, vol. 7, no. 5, 2008, pp. 661–72

Reliability in M2M Communications

Reliability In M2M Communications  For achieving green M2M communications, since not all M2M nodes are expected to simultaneously be active in the M2M domain, reliability is a challenging issue. Reliability in Sensing and Processing Reliability in Transmission Reliability at The BS

 Reliability In Sensing And Processing N. Katenka, E. Levina, and G. Michailidis, “Local Vote Decision Fusion for Target Detection in Wireless Sensor Networks,” IEEE Trans. Sig. Proc., vol. 56, no. 1, 2008, pp. 329–38. Local vote decision fusion (LVDF) algorithm  Reliability In Transmission W. Lou et al., “Spread: Improving Network Security by Multipath Routing in Mobile Ad Hoc Networks,” Wireless Networks, vol. 15, no. 3, 2009, pp. 279–94.  Reliability At The BS Reliability In M2M Communications

 Reliability At The BS

Security in M2M communications

Security in M2M Communications  M2M attack can be classified : Passive attack Active attack  Security Requirements For M2M Communication.  Security Mechanism Adapted To M2M Domain Security.

Security Requirements For M2M Communication  Confidentiality : ensures that only authorized entities can read these data in M2M communications systems.  Integrity : Integrity must be ensured so that illegal alteration of the sensory data (e.g., modifying, deleting, delaying, or replaying data) can be detected.  Non-repudiation : Non-repudiation guarantees that M2M nodes, once sending data, cannot deny the transmission.

Security Requirements For M2M Communication  Access control : Access control is the ability to limit and control access to the BS in the application domain.  Availability : Availability ensures that whenever M2M application systems access the BS, the BS is always available.  Privacy : Privacy is also of paramount importance in some privacy-sensitive M2M communications systems (e.g., e- healthcare systems).

Security Mechanism Adapted To M2M Domain Security  Early Detecting Node Compromise in M2M Domain. HW Couple Couple with child

Conclusions  In this article, we have studied the issues to achieve green M2M communications by employing efficient activity scheduling techniques for energy saving.  We have also offered several approaches to address the reliability and security issues in M2M communications.