May 22, 2006 © Leszek T. Lilien 2006 Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Leszek Lilien WiSe Lab (Wireless.

Slides:



Advertisements
Similar presentations
Hong Zhu School of Technology Safety Technology Brookes Interdisciplinary Research Theme.
Advertisements

SECURITY RESEARCH SEVENTH FRAMEWORK PROGRAMME Mark Stroud Home Office Scientific Development Branch UK Security Programme Committee Member.
GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin (Sherman) Shen, and Xiaodong.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
ELG 5121: Multimedia Communications Course Instructor: Prof. Dr. A. El Saddik Project Presentation: Fall 2010 Md. Mahmud Hasan (Group No. 12)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
###-### title - PI - area WiSe (Wireless Sensornets) Laboratory WESTERN MICHIGAN UNIVERSITY WiSe Lab, Western Michigan University, Kalamazoo, MI
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Kick-off Meeting Athens 05/10/2004 The project ’POMPEI - P2p, location and presence mobile services for managing crisis and disaster situations’
A Service-Based Infrastructure for Advanced Logistics Luciano Baresi, Daniele Braga, Marco Comuzzi, Filippo Pacifici, and Pierluigi Plebani ESEC-FSE 2.
. Smart Cities and the Ageing Population Sustainable smart cities: from vision to reality 13 October ITU, Geneva Knud Erik Skouby, CMI/ Aalborg University-Cph.
Asia Pacific Economic Cooperation Transportation Working Group ITS Experts Group Chicago, Illinois September 2002 Walter Kulyk, P.E. Director, Office of.
###-### title - PI - area WiSe (Wireless Sensornet) Laboratory WESTERN MICHIGAN UNIVERSITY WiSe Lab, Western Michigan University, Kalamazoo, MI
2/9/2006 Opportunistic Networks: The Concept and Research Challenges Leszek Lilien, Zille Huma Kamal and Ajay Gupta In cooperation with: Vijay Bhuse and.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Wednesday, September 6, rd International Conference on Trust, Privacy & Security in Digital Business Kraków, Poland, September 4-8, 2006 Panel Discussion:
CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe.
THE DICOM 2013 INTERNATIONAL CONFERENCE & SEMINAR March 14-16Bangalore, India DICOM Medical Image Management the Challenges and Solutions – Cloud as a.
Scientific Computing Department Faculty of Computer and Information Sciences Ain Shams University Supervised By: Mohammad F. Tolba Mohammad S. Abdel-Wahab.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
Envisioned Role for NTI Concerning ITS Deployment in Egypt by Dr. Mahmoud EL-HADIDI Professor of Telecommunications at Cairo U & Consultant at NTI 3 rd.
Phoenix Convention Center Phoenix, Arizona Designing the RIGHT Prototype & Demonstration Project Energy Technologies Incorporating the Voice of the Customer.
Research Projects in the Mobile Computing and Networking (MCN) Lab Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University.
Presented at the International Workshop on Research Challenges in Security and Privacy for Mobile and Wireless Networks (WSPWN 2006), Miami, Florida, March.
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
Presented by: Chaitanya K. Sambhara Paper by: Karl Mayer and Wolfgang Fritsche IABG mbH Germany - Instructor : Dr Yingshu Li.
EAACK—A Secure Intrusion-Detection System for MANETs
IoT, Big Data and Emerging Technologies
An Overview of the Smart Grid David K. Owens Chair, AABE Legislative Issues and Public Policy Committee AABE Smart Grid Working Group Webinar September.
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
How to start research V. Jayalakshmi. Why do we research? – To solve a problem – To satisfy an itch – To gain more market share/ Develop and improve –
Lockheed Martin Aeronautics Company Candidate Collaborative Projects for Net-Centric Application Michael F. Siok, PE Lockheed Martin Aeronautics Company.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
Responding to the Unexpected Yigal Arens Paul Rosenbloom Information Sciences Institute University of Southern California.
Using SaaS and Cloud computing For “On Demand” E Learning Services Application to Navigation and Fishing Simulator Author Maha KHEMAJA, Nouha AMMARI, Fayssal.
AD-HOC NETWORK SUBMITTED BY:- MIHIR GARG A B.TECH(E&T)/SEC-A.
CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe.
Networked Embedded and Control Systems WP ICT Call 2 Objective ICT ICT National Contact Points Mercè Griera i Fisa Brussels, 23 May 2007.
1 BRUSSELS - 14 July 2003 Full Security Support in a heterogeneous mobile GRID testbed for wireless extensions to the.
A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks Anand Patwardhan, Anupam Joshi, Tim Finin, and Yelena Yesha Anand Patwardhan.
Doctoral Training at EIT Digital
SenProbe: Path Capacity Estimation in Wireless Sensor Networks Tony Sun, Ling-Jyh Chen, Guang Yang M. Y. Sanadidi, Mario Gerla.
August 3, March, The AC3 GRID An investment in the future of Atlantic Canadian R&D Infrastructure Dr. Virendra C. Bhavsar UNB, Fredericton.
Ad Hoc Network.
SocialCar a Horizon 2020 project
Governor’s Office of Homeland Security and Emergency Response State Directors Meeting February 24, 2014 Bruce A. Davis, Ph.D. Senior Program Manager Resilient.
STREP Research Project HOBNET (FP7- ICT , ) HOlistic Platform Design for Smart Buildings of the Future InterNET (
Emergency Services Workshop, 21th-24 th of October, Vienna, Austria Page 1 IP-Based Emergency Applications and Services for Next Generation Networks PEACE.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Pertemuan 16 Materi : Buku Wajib & Sumber Materi :
Overview of Wireless Networks: Cellular Mobile Ad hoc Sensor.
Societal-Scale Computing: The eXtremes Scalable, Available Internet Services Information Appliances Client Server Clusters Massive Cluster Gigabit Ethernet.
MIT Lincoln Laboratory Dynamic Declarative Networking Exploiting Declarative Knowledge To Enable Energy Efficient Collaborative Sensing Daniel J. Van Hook.
Cyberinfrastructure Overview of Demos Townsville, AU 28 – 31 March 2006 CREON/GLEON.
NTC 249 ASSIST Learning for leading/ntc249assistdotcom.
Citizen Corps Volunteer for America “Engaging Citizens In Homeland Security”
Information Technology as Inclusive Technology in Smart Cities for Sustainable Solutions Plenary talk at CMRIMS National conference on 4 th March 2016.
Internet of Things – Getting Started
Lecture 8: Wireless Sensor Networks By: Dr. Najla Al-Nabhan.
Presented by Edith Ngai MPhil Term 3 Presentation
Discovering Computers 2010: Living in a Digital World Chapter 14
Overview of Wireless Networks:
Supporting Mobile Collaboration with Service-Oriented Mobile Units
Security of Grid Computing Environments
Internet of Things: State of the Art
Leszek Lilien, Zille Huma Kamal, Vijay Bhuse and Ajay Gupta
Mobile ad hoc networking: imperatives and challenges
HOLISDER Integrating Real-Intelligence in Energy Management Systems enabling Holistic Demand Response Optimization in Buildings and Districts Project presentation.
Opportunistic Networks: A New Type of Specialized Ad Hoc Networks
Sensor Networks – Motes, Smart Spaces, and Beyond
Presentation transcript:

May 22, 2006 © Leszek T. Lilien 2006 Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Leszek Lilien WiSe Lab (Wireless Sensornet Laboratory) Department of Computer Science Western Michigan University Kalamazoo, MI 49008

© Leszek T. Lilien /22/06 Outline Part 1. Motivation for Specialized Ad Hoc Networks Part 1. Motivation for Specialized Ad Hoc Networks Part 2. Analogy to a Human Emergency Response Team Part 2. Analogy to a Human Emergency Response Team Part 3. Opportunistic Networks: A New Type of Specialized Ad Hoc Networks Part 3. Opportunistic Networks: A New Type of Specialized Ad Hoc Networks Part 4. Related Research and Research Challenges Part 4. Related Research and Research Challenges Part 5. Conclusions Part 5. Conclusions Part 6. Current and Future Work Part 6. Current and Future Work 2

© Leszek T. Lilien /22/06 Part 1. Motivation for Specialized Ad Hoc Networks Homeland Security Homeland Security One of the crucial challenges facing the USA today One of the crucial challenges facing the USA today Among its 6 mission areas is Among its 6 mission areas is Emergency Preparedness and Response (EPR) Emergency Preparedness and Response (EPR) EPR deals with: EPR deals with: Natural disasters Natural disasters Man-made disasters (incl. accidents, terrorist attacks) Man-made disasters (incl. accidents, terrorist attacks) [Natl. Strategy for Homeland Security, July 2002] Mobile ad hoc networks (MANETs) proposed for EPR [Haas, 1999] Mobile ad hoc networks (MANETs) proposed for EPR [Haas, 1999] 3

© Leszek T. Lilien /22/06 Motivation for Specialized Ad Hoc Networks (2) MANETS are not quite a natural match for EPR MANETS are not quite a natural match for EPR E.g., human rescue teams can find and mobilize as their helpers local firemen, police, National Guard or even regular citizens E.g., human rescue teams can find and mobilize as their helpers local firemen, police, National Guard or even regular citizens No analogous capability of MANETs to find and “mobilize” devices/networks No analogous capability of MANETs to find and “mobilize” devices/networks Let’s find or define a specialization (a subclass) of ad hoc networks more suitable for EPR applications Let’s find or define a specialization (a subclass) of ad hoc networks more suitable for EPR applications A new paradigm and a new technology to improve effectiveness & efficiency of EPR A new paradigm and a new technology to improve effectiveness & efficiency of EPR 4

© Leszek T. Lilien /22/06 5 This page left blank intentionally.

© Leszek T. Lilien /22/06 Part 2. Analogy to a Human Emergency Response Team Important characteristics of a human rescue team Important characteristics of a human rescue team Starts as a seed team (a small group of people) Starts as a seed team (a small group of people) The seed team grows opportunistically during its operations The seed team grows opportunistically during its operations a) Some people can always be ordered to join  Police, firemen, National Guard or Army Reserve personnel b)Anybody can be ordered to join only in life-or-death situations  Legally required to help saving lives or critical resources c) Anybody can be asked to join in other situations 6

© Leszek T. Lilien /22/06 Analogy to a Human Emergency Response Team (2) Who is ordered or invited to join? Who is ordered or invited to join? In some situations any extra pair of hands can help In some situations any extra pair of hands can help In others only highly qualified people (e.g., doctors and nurses) are ordered/asked to join In others only highly qualified people (e.g., doctors and nurses) are ordered/asked to join Human helper types Human helper types Highly prepared Highly prepared E.g., National Guard, Army Reserve or state militias E.g., National Guard, Army Reserve or state militias Signed up for service Signed up for service Undergo training in preparation for duty (even unforeseen) Undergo training in preparation for duty (even unforeseen) Somewhat prepared Somewhat prepared E.g., people that volunteer for first aid courses E.g., people that volunteer for first aid courses Become pretty valuable helpers in emergencies Become pretty valuable helpers in emergencies Not prepared at all Not prepared at all 7

© Leszek T. Lilien /22/06 Benefits of the opportunistic growth of the rescue team Benefits of the opportunistic growth of the rescue team Opportunistic leveraging of all kinds of skills and resources that new helpers can bring Opportunistic leveraging of all kinds of skills and resources that new helpers can bring Obtaining a lot of help effectively and efficiently – even for free Obtaining a lot of help effectively and efficiently – even for free 8 Analogy to a Human Emergency Response Team (3)

© Leszek T. Lilien /22/06 Analogous critical requirements for ad hoc network specialized for EPR in the priority order: Analogous critical requirements for ad hoc network specialized for EPR in the priority order: 1)Minimal starting configuration – a pre-configured seed for EPR operations Analogy to the seed rescue team 2)High interoperability in terms of communication of diverse devices or networks (Wired/WiFi, Bluetooth, satellite, ham radios, WiMAX,...) Analogy to a rescue team’s ability to contact different people, individually or via organizations 3)Highly heterogeneous software (& hardware) Analogy to heterogeneity of rescue teams in terms of members’ skills, communication and other equipment, and other resources 4)Harvesting of diverse resources as needed Analogy to finding people with different skills, equipment, and other resources 5)Persistent connectivity once it is established Analogy to being able to contact (maybe via a chain of others) members of the expanded team, including all helpers 9 Analogy to a Human Emergency Response Team (4)

© Leszek T. Lilien /22/06 If there is no specialized ad hoc network (AHN) matching the requirements, then: If there is no specialized ad hoc network (AHN) matching the requirements, then: Define a new specialized AHN paradigm Define a new specialized AHN paradigm Invent a new specialized AHN technology Invent a new specialized AHN technology No known specialized AHN matches the requirements No known specialized AHN matches the requirements Considered AHNs: Mobile ad hoc networks (MANETs) Mobile ad hoc networks (MANETs) Mesh networks Mesh networks P2P systems P2P systems Sensor networks Sensor networks Spontaneous networks (in the narrow sense, cf. [Feeney et al. 2001]) Spontaneous networks (in the narrow sense, cf. [Feeney et al. 2001]) => Need: - a new specialized AHN paradigm - a new specialized AHN technology 10 Analogy to a Human Emergency Response Team (5)

© Leszek T. Lilien /22/06 11 This page left blank intentionally.

© Leszek T. Lilien /22/06 Part 3. Opportunistic Networks: A New Type of Specialized Ad Hoc Networks Paradigm of Opportunistic Networks (Oppnets) Paradigm of Opportunistic Networks (Oppnets) Based on the analogy to operations of human rescue teams Based on the analogy to operations of human rescue teams Goals of oppnets: Goals of oppnets: Opportunistic growth Opportunistic growth Opportunistic leveraging of resources aiming at (among others) : Opportunistic leveraging of resources aiming at (among others) : Bridging diverse communication media Bridging diverse communication media Offloading computations to additional platforms Offloading computations to additional platforms Integrating independent sensing systems (enhancing their sensing capabilities) Integrating independent sensing systems (enhancing their sensing capabilities) 12

© Leszek T. Lilien /22/06 Startup: Seed Oppnet 13 Oppnet deployed as a seed oppnet Oppnet deployed as a seed oppnet Seed oppnet localizes its nodes & self-configures Seed oppnet localizes its nodes & self-configures Seed Nodes Link to the World Controller (distributed)

© Leszek T. Lilien /22/06 Seed Nodes Link to the World Controller (distributed) Appliance (refrigerator) Computer Network WiMAX Overturned Vehicle (with OnStar) Cellphone Tower Satellite Growth: Expanded Oppnet 14 Seed oppnet grows into an expanded oppnet by: Seed oppnet grows into an expanded oppnet by: Finding candidate helpers Finding candidate helpers Selecting candidates - they are ordered/asked to join Selecting candidates - they are ordered/asked to join Add communication, computing, sensing, storage, other resources Add communication, computing, sensing, storage, other resources

© Leszek T. Lilien /22/06 Summary of Oppnet Activities Discovering & identifying candidate helpers Discovering & identifying candidate helpers Contacting selected candidates Contacting selected candidates Inviting or ordering candidates to join Inviting or ordering candidates to join Admitting & integrating helpers that join oppnet Admitting & integrating helpers that join oppnet Offloading tasks to helpers Offloading tasks to helpers Determining useful colaborative functionalities Determining useful colaborative functionalities Managing offloaded tasks Managing offloaded tasks Cleaning up & releasing each helper when no longer needed Cleaning up & releasing each helper when no longer needed 15

© Leszek T. Lilien /22/06 Oppnet Reserve A challenge in oppnet growth A challenge in oppnet growth Must discover candidate helpers, then contact selected ones Must discover candidate helpers, then contact selected ones Difficult without facilities provided by candidates or infrastructure Difficult without facilities provided by candidates or infrastructure A solution: oppnet reserve — facilitating discovery/contacting A solution: oppnet reserve — facilitating discovery/contacting Analogy to Army / Navy / Air Force Reserve, etc. Analogy to Army / Navy / Air Force Reserve, etc. Volunteer helpers sign up for oppnet reserve Volunteer helpers sign up for oppnet reserve Maybe for some incentives (moral, financial, etc.) Maybe for some incentives (moral, financial, etc.) Volunteers „trained” for active duty Volunteers „trained” for active duty Install facilities that make them easier to detect and contact by oppnets Install facilities that make them easier to detect and contact by oppnets E.g., install (future) standard oppnet protocols E.g., install (future) standard oppnet protocols Matched to their capabilities: heavy-, medium- and lightweight Matched to their capabilities: heavy-, medium- and lightweight Available for active oppnet duty whenever must/can help Available for active oppnet duty whenever must/can help 16

© Leszek T. Lilien /22/06 Oppnet Reserve (2) Oppnet reserve is analogous to having highly prepared human helpers Oppnet reserve is analogous to having highly prepared human helpers (Recall the classification of human helpers into: highly prepared, somewhat prepared, unprepared) somewhat prepared, unprepared) Oppnet reserve is not required but very helpful Oppnet reserve is not required but very helpful Having highly prepared human helpers is not required either Having highly prepared human helpers is not required either 17

© Leszek T. Lilien /22/06 Basic Oppnet Categories 2 major oppnet categories: 2 major oppnet categories: Benevolent oppnets Benevolent oppnets Malevolent oppnets Malevolent oppnets Corresponding oppnets scenarios: Corresponding oppnets scenarios: Benevolent oppnet scenario: Benevolent oppnet scenario: „Citizens Called to Arms” Malevolent oppnet scenario: Malevolent oppnet scenario: „Bad Guys Gang Up” „Bad Guys Gang Up” 18

© Leszek T. Lilien /22/06 Benevolent Oppnet Scenario: „Citizens Called to Arms” (1) Seed oppnet deployed Seed oppnet deployed after an earthquake (un- predictable emergency) Seed is ad hoc wireless network with very powerful nodes Seed is ad hoc wireless network with very powerful nodes More energy, computing and communication resources More energy, computing and communication resources Seed tries to detect candidate helpers Seed tries to detect candidate helpers For help in damage assessment and disaster recovery For help in damage assessment and disaster recovery Uses any available detection method — including: Uses any available detection method — including: Cellphone- or radio-based detection Cellphone- or radio-based detection Searching for nodes using the IP address range for the affected geographic area Searching for nodes using the IP address range for the affected geographic area AI-based visual detection (next) AI-based visual detection (next) 19

© Leszek T. Lilien /22/06 Benevolent Oppnet Scenario: „Citizens Called to Arms” (2) Example: Example: Helper 1 (supervisor of security cameras) monitoring a surveillance net views an overturned car Helper 1 (supervisor of security cameras) monitoring a surveillance net views an overturned car Helper 2 (pattern recognition specialist) detects an overturned car Helper 2 (pattern recognition specialist) detects an overturned car Helper 3 (image analysis specialist) asked to recognize its license plate Helper 3 (image analysis specialist) asked to recognize its license plate Helper 4 (DB manager) finds that the cars has OnStar link Helper 4 (DB manager) finds that the cars has OnStar link Helper 5 (OnStar agent) contacts BANs (Body Area Networks) on or within bodies of car occupants via OnStar infrastructure Helper 5 (OnStar agent) contacts BANs (Body Area Networks) on or within bodies of car occupants via OnStar infrastructure Helper 6 (vital sign evaluator) evaluates obtained info Helper 6 (vital sign evaluator) evaluates obtained info Helper 7 (rescue dispatcher) decides if/when rescuers should be dispatched Helper 7 (rescue dispatcher) decides if/when rescuers should be dispatched 20

© Leszek T. Lilien /22/06 Benevolent Oppnet Scenario: „Citizens Called to Arms” (3) Oppnet selects optimal subset of detected nodes Oppnet selects optimal subset of detected nodes Inviting devices, clusters & entire networks Inviting devices, clusters & entire networks Helpers for communicating, sensing, computing Helpers for communicating, sensing, computing Using „hidden” capabilities, e.g. for sensing: Using „hidden” capabilities, e.g. for sensing: Desktop can „sense” presence of a potential victim at its keyboard Desktop can „sense” presence of a potential victim at its keyboard Cellphones can „sense” location Cellphones can „sense” location Even ones w/o GPS can be triangulated Even ones w/o GPS can be triangulated 21

© Leszek T. Lilien /22/06 Using „hidden” Using „hidden” emergency functionalities Oppnet contacts 2 independent sensornets (SNs): Oppnet contacts 2 independent sensornets (SNs): water infrastructure control SN / water infrastructure control SN / public space surveillance SN public space surveillance SN SNs ordered to abandon normal functions & help in rescue & recovery operations SNs ordered to abandon normal functions & help in rescue & recovery operations Water infrastructure SN (with multisensor capabilities, under road surfaces) — ordered to sense vehicular movement and traffic jams Water infrastructure SN (with multisensor capabilities, under road surfaces) — ordered to sense vehicular movement and traffic jams Public space surveillance SN — ordered to search for images of human victims Public space surveillance SN — ordered to search for images of human victims 22 Benevolent Oppnet Scenario: „Citizens Called to Arms” (4)

© Leszek T. Lilien /22/06 23 Malevolent Oppnet Scenario: „Bad Guys Gang Up” (1) 23 Scenario 1 — Terrorists Scenario 1 — Terrorists create apparently harmless weather monito- ring sensornet (SN): SN becomes a seed of a malevolent opportunistic SN SN becomes a seed of a malevolent opportunistic SN SN exploits other nodes from many other networks (w/o revealing its true goals) SN exploits other nodes from many other networks (w/o revealing its true goals) “Critical mass” of the opportunistic SN is reached (in terms of geographical spread and sensing capabilities) “Critical mass” of the opportunistic SN is reached (in terms of geographical spread and sensing capabilities) SN waits for wind patterns that can speed up spread of poisonous chemicals SN waits for wind patterns that can speed up spread of poisonous chemicals Collected data used to decide when to start chemical attack Collected data used to decide when to start chemical attack

© Leszek T. Lilien /22/06 24 Malevolent Oppnet Scenario: „Bad Guys Gang Up” (2) Scenario 2 — network at home starts spying on you: Scenario 2 — network at home starts spying on you: Becomes a seed oppnet Becomes a seed oppnet Exploits other devices/nets to collect all info on you: Exploits other devices/nets to collect all info on you: From your fridge (& RFID-equipped food packaging): what/when you eat From your fridge (& RFID-equipped food packaging): what/when you eat From your computer: keylogs your passwords, sensitive data From your computer: keylogs your passwords, sensitive data From your cellphone: who you call & when From your cellphone: who you call & when From your networked camera: what photos you take From your networked camera: what photos you take From your home security surveillance system: your private images From your home security surveillance system: your private images Cyberfly with camera eyes and microphone ears Cyberfly with camera eyes and microphone ears Huge privacy problem! / Huge security problem! Huge privacy problem! / Huge security problem! Controls to counteract malevolent oppnets badly needed Controls to counteract malevolent oppnets badly needed

© Leszek T. Lilien /22/06 25 This page left blank intentionally.

© Leszek T. Lilien /22/06 Part 4. Related Research and Research Challenges Examples of Related Research Examples of Related Research Interoperability Interoperability Among wireless networks - active research area Among wireless networks - active research area Among WANs, MANs, LANs, PANs (Personal Area Networks), etc. Among WANs, MANs, LANs, PANs (Personal Area Networks), etc. Among wired & wireless nets - much less research Among wired & wireless nets - much less research Ambient Networks (big European Union project, next-generation Internet—for 2015/2020, smaller networks able to compose themselves into bigger ones) Ambient Networks (big European Union project, next-generation Internet—for 2015/2020, smaller networks able to compose themselves into bigger ones) Localization and self-organization Localization and self-organization MANETs / Sensornets MANETs / Sensornets Network growth Network growth P2P systems – search for peers in unstructured systems P2P systems – search for peers in unstructured systems Trojan Horses - agents spreading in search for helpers Trojan Horses - agents spreading in search for helpers Integrating and managing heterogeneous systems, incl. data integration & aggregation Integrating and managing heterogeneous systems, incl. data integration & aggregation Grid systems / MANETs / Sensornets Grid systems / MANETs / Sensornets Other Other … 26

© Leszek T. Lilien /22/06 Research Challenges in Basic Operations Challenges in seed oppnet deployment Challenges in seed oppnet deployment E.g., localization, self-configuration, adaptability E.g., localization, self-configuration, adaptability Challenges in detecting helper systems Challenges in detecting helper systems E.g., define primitives to detect candidates, identify and categorize them, evaluate and classify them (e.g., based on dependability and usefulness) E.g., define primitives to detect candidates, identify and categorize them, evaluate and classify them (e.g., based on dependability and usefulness) Challenges in inviting & admitting candidate helpers Challenges in inviting & admitting candidate helpers E.g., select candidates to invite, develop protocols for candidates to accept or reject invitation, devise primitives /methods to manage expanded oppnets E.g., select candidates to invite, develop protocols for candidates to accept or reject invitation, devise primitives /methods to manage expanded oppnets Etc., etc. for remaining oppnet primitives Etc., etc. for remaining oppnet primitivesMore: Leszek Lilien, Z. Huma Kamal, and Ajay Gupta, "Opportunistic Networks: Research Challenges in Specializing the P2P Paradigm,” Proc. 3rd International Workshop on P2P Data Management, Security and Trust (PDMST’06), Kraków, Poland, September 2006 (to appear) 27

© Leszek T. Lilien /22/06 Research Challenges in Privacy & Security (1) 1)Privacy challenges in oppnets Privacy is critical Privacy is critical Oppnets are pervasive systems Oppnets are pervasive systems Must face all critical privacy challenges inherent to pervasive computing Must face all critical privacy challenges inherent to pervasive computing Privacy is a „make it or break it” issue for pervasive computing => Privacy is a „make it or break it” issue for pervasive computing => Privacy is a „make it or break it” issue for oppnets Basic privacy protection goals in oppnets Basic privacy protection goals in oppnets Protect helper resources from the host oppnet Protect helper resources from the host oppnet Protect oppnet from its helpers Protect oppnet from its helpers Protect environment from privacy violations by oppnet Protect environment from privacy violations by oppnet Also from malevolent oppnets Also from malevolent oppnets 28

© Leszek T. Lilien /22/06 Research Challenges in Privacy & Security (2) 2) Security challenges in oppnets Many have privacy aspects/components Many have privacy aspects/componentsMore: Leszek Lilien, Z. Huma Kamal, Vijay Bhuse and Ajay Gupta, "Opportunistic Networks: The Concept and Research Challenges in Privacy and Security,” Proc. International Workshop on Research Challenges in Security and Privacy for Mobile and Wireless Networks (WSPWN 2006), Miami, Florida, March

© Leszek T. Lilien /22/06 30 This page left blank intentionally.

© Leszek T. Lilien /22/06 Part 5. Conclusions High-payoff potential for the oppnet initiative High-payoff potential for the oppnet initiative 1)Social and economic benefits  Including reduction of human suffering & loss of life 2)Technological benefits 3)Research benefits 4)Educational benefits -- Details below Details below -- 31

© Leszek T. Lilien /22/06 1) Social & Economic Impacts Impacts on Emergency Preparedness and Response operations in Homeland Security (HS) — current app focus Impacts on Emergency Preparedness and Response operations in Homeland Security (HS) — current app focus Tremendous leveraging potential in emergencies Tremendous leveraging potential in emergencies A wealth of freely available resources A wealth of freely available resources Reduction of human suffering & loss of life Reduction of human suffering & loss of life Increasing safety & efficiency of the first responders Increasing safety & efficiency of the first responders Impacts on other applications both in HS and outside HS Impacts on other applications both in HS and outside HS Economic impacts Economic impacts Technology transfer & commercialization Technology transfer & commercialization Benefits for the computer industry Benefits for the computer industry Production of software / networking equipment Production of software / networking equipment Benefits for other industries Benefits for other industries Enhancing many products with standard oppnet interfaces Enhancing many products with standard oppnet interfaces E.g., the auto industry: cars and trucks as oppnet platforms E.g., the auto industry: cars and trucks as oppnet platforms 32

© Leszek T. Lilien /22/06 Advancing the network and pervasive computing know-how Advancing the network and pervasive computing know-how Development of the innovative oppnet technology Development of the innovative oppnet technology Enhancing network/pervasive applications by use of oppnet technologies Enhancing network/pervasive applications by use of oppnet technologies Enabling new network/pervasive application niches we can not even foresee Enabling new network/pervasive application niches we can not even foresee Advancing other areas of technology (not only computing) Advancing other areas of technology (not only computing) A side effect of oppnet developments A side effect of oppnet developments Technology impacts speeded up & enhanced by the planned technology transfer plus commercialization activities Technology impacts speeded up & enhanced by the planned technology transfer plus commercialization activities 33 2) Impacts on Technology

© Leszek T. Lilien /22/06 Encouraging oppnet research Encouraging oppnet research 1)Building our oppnet research team at WMU  4 professors, 2 Ph.D. students (incl. a Ph.D. dissertation), other students  2 high-tech companies specializing in EPR products  From Ann Arbor - Michigan’s equivalent of the Sillicon Valley  Summer 2006: 1 more Ph.D. student, ≥ 1 M.S. students  Fall 2006: many student projects 2)Initiating research collaboration with researchers outside of the WMU 3)Encouraging independent oppnet research Applying for state, NSF, and other funding for Ph.D. students and other students, post docs, and visiting faculty Applying for state, NSF, and other funding for Ph.D. students and other students, post docs, and visiting faculty Dissemination of research results and products: Dissemination of research results and products: Presentations: publications, seminars, poster sessions Presentations: publications, seminars, poster sessions A dedicated web site A dedicated web site Public availability of the oppnet prototype, tools & data Public availability of the oppnet prototype, tools & data 34 3) Impacts on Research

© Leszek T. Lilien /22/06 Impact on students Impact on students For project participants: hands-on training on the B.S./M.S./Ph.D levels For project participants: hands-on training on the B.S./M.S./Ph.D levels For others: course enhancements / course projects / seminars For others: course enhancements / course projects / seminars Oppnet prototype used for lab experiments Oppnet prototype used for lab experiments Outreach activities Outreach activities Including K-12 demos for underrepresented minorities Including K-12 demos for underrepresented minorities All activities will broaden the America’s talent pool in critical technologies and applications All activities will broaden the America’s talent pool in critical technologies and applications Training more minority & female students at all levels Training more minority & female students at all levels 35 4) Impacts on Education

© Leszek T. Lilien /22/06 36 This page left blank intentionally.

© Leszek T. Lilien /22/06 Part 6. Current and Future Work Building an oppnet prototype Building an oppnet prototype Goal: Proof of concept Goal: Proof of concept To demonstrate technical prowess & economic benefits To demonstrate technical prowess & economic benefits Designing oppnet architecture Designing oppnet architecture With its associated components: With its associated components: Methods, protocols, and algorithms Methods, protocols, and algorithms Oppnet prototype implementation Oppnet prototype implementation For stimulation and feedback For stimulation and feedback Necessary for fine-tuning oppnet design Necessary for fine-tuning oppnet design Technology transfer & commercialization Technology transfer & commercialization Mentioned above Mentioned above 37

© Leszek T. Lilien /22/06 More Details of Oppnet Prototyping More Details of Oppnet Prototyping Building state-of-the-art lab facilities Building state-of-the-art lab facilities Constructing an oppnet prototype in the lab Constructing an oppnet prototype in the lab Developing performance analysis tools to support testing & fine-tuning activities Developing performance analysis tools to support testing & fine-tuning activities Extending the prototype to include living-laboratory resources available in our sensor- & computer-rich building Extending the prototype to include living-laboratory resources available in our sensor- & computer-rich building Testing the prototype within the living laboratory Testing the prototype within the living laboratory For fine-tuning design & implementation For fine-tuning design & implementation Obtaining external assessment of the prototype Obtaining external assessment of the prototype From computer & homeland security labs in MI, IN, IL From computer & homeland security labs in MI, IN, IL 38

© Leszek T. Lilien /22/06 Search for Other Oppnet Applications Search for oppnet utilization in all kinds of application areas Search for oppnet utilization in all kinds of application areas Search for applications that... Search for applications that can start with a seed... can start with a seed... need high interoperability... need high interoperability... need highly heterogeneous software... need highly heterogeneous software... can benefit from leveraging diverse resources of helpers... can benefit from leveraging diverse resources of helpers... can maintain persistent connectivity once it is established... can maintain persistent connectivity once it is established Welcome collaboration or independent contributions Welcome collaboration or independent contributions Seeking funding that will allow to fund: Seeking funding that will allow to fund: Ph.D. students (dissertations on oppnets) Ph.D. students (dissertations on oppnets) Post docs (e.g., 3-12 months) Post docs (e.g., 3-12 months) Visiting faculty (e.g., 1-6 months) Visiting faculty (e.g., 1-6 months) 39

© Leszek T. Lilien /22/06 Publications on Oppnets (intensive work on oppnets started in our WiSe Lab in December 2005) 1.Leszek Lilien and Ajay Gupta, ” Opportunistic Networks for Emergency Preparedness and Response” (submitted for publication). 2.Leszek Lilien, Z. Huma Kamal, and Ajay Gupta, "Opportunistic Networks: Research Challenges in Specializing the P2P Paradigm,” Proc. 3rd International Workshop on P2P Data Management, Security and Trust (PDMST’06), Kraków, Poland, September 2006 (to appear) 3.Leszek Lilien, “Developing Specialized Ad Hoc Networks: The Case of Opportunistic Networks,” Proc. Workshop on Distributed Systems and Networks at the WWIC 2006 Conference,Bern, Switzerland, May 2006 (invited paper, proceedings to appear). 3.Leszek Lilien, “Developing Specialized Ad Hoc Networks: The Case of Opportunistic Networks,” Proc. Workshop on Distributed Systems and Networks at the WWIC 2006 Conference, Bern, Switzerland, May 2006 (invited paper, proceedings to appear). 4.Leszek Lilien, Z. Huma Kamal, Vijay Bhuse and Ajay Gupta, "Opportunistic Networks: The Concept and Research Challenges in Privacy and Security,” Proc. International Workshop on Research Challenges in Security and Privacy for Mobile and Wireless Networks (WSPWN 2006), Miami, Florida, March B. Bhargava, L. Lilien, A. Rosenthal, and M. Winslett, “Pervasive Trust,” IEEE Intelligent Systems, vol. 19(5), Sep./Oct.2004, pp (first brief mention of the oppnet idea, in the form of malevolent opportunistic sensor networks). 40

© Leszek T. Lilien /22/06 Selected WiSe Lab Publications on Privacy, Trust, Security, Pervasive Computing & Sensornets 1.V. Bhuse, A. Gupta, and L. Lilien, "Research challenges in lightweight intrusion detection for sensornets" (submitted for publication). 2.L. Lilien and B. Bhargava, ”A Scheme for Privacy-preserving Data Dissemination,” IEEE Transactions on Systems, Man and Cybernetics (to appear). 3.T. Canli, M. Terwilliger, A. Gupta and A. Khokhar, "Power Efficient Algorithms for Computing Fast Fourier Transform over Wireless Sensor Networks," Proc. Fourth ACS/IEEE Conference on Computer Systems and Applications, Dubai, UAE, March V. Bhuse, A. Gupta and L. Lilien, "DPDSN: Detection of packet-dropping attacks for wireless sensor networks," Proc. 4th International Trusted Internet Workshop (TIW), International Conference on High Performance Computing, Goa, India, December A. Gupta and V. Bhuse, “Anomaly Intrusion Detection in Wireless Sensor Networks," Journal of High Speed Networks, vol. 15, issue 1, January-March M. Terwilliger, A. Gupta, A. Khokhar and G. Greenwood, "Localization using Evolution Strategies in Sensornets," Proc. IEEE Congress on Evolutionary Computation, Edinburgh, UK, September V. Bhuse, A. Gupta, M. Terwilliger, Z. Yang and Z. Kamal, "Using Routing Data for Information Authentication in Sensor Networks," Proc. 3rd International Trusted Internet Workshop (TIW), International Conference on High Performance Computing, Bangalore, India, December T. Canli, M. Terwilliger, A. Gupta and A. Khokhar, "Power-Time Efficient Algorithm for Computing FFT in Sensor Networks," (Extended Abstract). Proc. Second ACM Conference on Embedded Networked Sensor Systems (SenSys), Baltimore, Maryland, November B. Bhargava, L. Lilien, A. Rosenthal, and M. Winslett, “Pervasive Trust,” IEEE Intelligent Systems, vol. 19(5), Sep./Oct.2004, pp B. Bhargava and L. Lilien, “Private and Trusted Collaborations,” Proc. Secure Knowledge Management (SKM 2004): A Workshop, Amherst, NY, Sep M. Jenamani, L. Lilien, and B. Bhargava, “Anonymizing Web Services Through a Club Mechanism with Economic Incentives,” Proc. International Conference on Web Services (ICWS 2004), San Diego, California, July 2004, pp Z. Kamal, M. Salahuddin, A. Gupta, M. Terwilliger, V. Bhuse and B. Beckmann, "Analytical Analysis of Data and Decision Fusion in Sensor Networks," Proc International Conference on Embedded Systems and Applications. Las Vegas, June M. Terwilliger, A. Gupta, V. Bhuse, Z. Kamal, and M. Salahuddin, "A Localization System Using Wireless Sensor Networks: A Comparison of Two Techniques," Proc Workshop on Positioning, Navigation and Communication, Hanover, Germany, March 2004, pp V. Bhuse, A. Gupta and R. Pidva, "A Distributed Approach to Security in Sensornets," Proc. 58th IEEE Semiannual Vehicular Technology Conference, Orlando, Florida, USA, October L. Lilien, “Developing Pervasive Trust Paradigm for Authentication and Authorization,” Proc. Third Cracow Grid Workshop (CGW’03), Kraków (Cracow), Poland, October 2003, pp (invited paper). 41

© Leszek T. Lilien /22/06 WiSe Lab Experience in Sensornets – Selected Projects Since January 2003 NOTE: Results directly useful for oppnets are marked with an asterisk (*)  Designing of WiSe Security Protocols: DSPS  Location Tracker Using Motes (*)  RHS: Remote Home Surveillance (*)  Directed Diffusion: Attacks & Countermeasures  Improving the Accuracy of Mote Measurements by Using Neural Networks  SOMS: Smart Occupancy Monitoring System Using Motes (*)  Comparative Study of Network Simulators  Collaborative Image Processing (*)  DENSe: a Development Environment for Networked Sensors  Incorporating Mobile-ware in Distributed Computations / Grids (*)  Extending the ns-2 Simulator to Satellite and WCN Simulations  Smart Antennas for WCNs  Energy Efficient MAC Protocols for IEEE x  A Wireless Security Testing System (*)  Mobile and Self-Calibrating Irrigation System  Collective Communications for Sensornets (*) 42

© Leszek T. Lilien /22/06 Thank you very much for your time and attention!