###-### title - PI - area WiSe (Wireless Sensornet) Laboratory WESTERN MICHIGAN UNIVERSITY WiSe Lab, Western Michigan University, Kalamazoo, MI 49008 www.cs.wmich.edu/wsn.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Message Integrity in Wireless Senor Networks CSCI 5235 Instructor: Dr. T. Andrew Yang Presented by: Steven Turner Abstract.
Josh Alcorn Larry Brachfeld An in depth review of ad hoc mobile network & cloud security concerns.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
May 22, 2006 © Leszek T. Lilien 2006 Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Leszek Lilien WiSe Lab (Wireless.
###-### title - PI - area WiSe (Wireless Sensornets) Laboratory WESTERN MICHIGAN UNIVERSITY WiSe Lab, Western Michigan University, Kalamazoo, MI
A Sensor-cyber Network Testbed for Plume Detection, Identification, and Tracking Yong Yang, I-Hong Hou, and Jennifer C. Hou Illinois Center for Wireless.
Raphael Frank 20 October 2007 Authentication & Intrusion Prevention for Multi-Link Wireless Networks.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
1 Intrusion Tolerance for NEST Bruno Dutertre, Steven Cheung SRI International NEST 2 Kickoff Meeting November 4, 2002.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Secure communication in cellular and ad hoc environments Bharat Bhargava Department of Computer Sciences, Purdue University This is supported.
Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.
Security & Efficiency in Ad- Hoc Routing Protocol with emphasis on Distance Vector and Link State. Ayo Fakolujo Wichita State University.
2/9/2006 Opportunistic Networks: The Concept and Research Challenges Leszek Lilien, Zille Huma Kamal and Ajay Gupta In cooperation with: Vijay Bhuse and.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Wednesday, September 6, rd International Conference on Trust, Privacy & Security in Digital Business Kraków, Poland, September 4-8, 2006 Panel Discussion:
1 Securing Information Transmission by Redundancy Jun LiPeter ReiherGerald Popek Computer Science Department UCLA NISS Conference October 21, 1999.
Applied Cryptography for Network Security
CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe.
N. GSU Slide 1 Chapter 04 Cloud Computing Systems N. Xiong Georgia State University.
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
Parts of this work are ©2013 The MITRE Corporation. All rights reserved. Approved for Public Release: Distribution Unlimited. Off-Grid Communications.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Common Devices Used In Computer Networks
Presented at the International Workshop on Research Challenges in Security and Privacy for Mobile and Wireless Networks (WSPWN 2006), Miami, Florida, March.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
Rapid Development and Flexible Deployment of Adaptive Wireless Sensor Network Applications Chien-Liang Fok, Gruia-Catalin Roman, Chenyang Lu
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Overview of computer communication and Networking Communication VS transmission Computer Network Types of networks Network Needs Standards.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 1 Wireless Sensor Network Wireless Sensor Network Based.
Objectives Functionalities and services Architecture and software technologies Potential Applications –Link to research problems.
$20 billion business 230 million printers sold  170 million inkjet  60 million laserjet #1 in ink, laser, scanners, designjet, print servers Consistent.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
MTBC Cloud Computing Initiative  Applications of cloud computing  Overview of the NSF Net-Centric Software and Systems (NCSS) I/UCRC  MTBC and NCSS.
CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe.
Misc Project Slides projects. PLANNING, EXECUTION AND CONTROL LINKAGES IN MANUFACTURING ENTERPRISE.
Attacks in Sensor Networks Team Members: Subramanian Madhanagopal Sivasankaran Rahul Poondy Mukundan.
A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks Anand Patwardhan, Anupam Joshi, Tim Finin, and Yelena Yesha Anand Patwardhan.
High-integrity Sensor Networks Mani Srivastava UCLA.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Comments on Networking and Security - Challenges for Environmental Observatories Arthur C. Sanderson Rensselaer Polytechnic Institute NSF Workshop on Cyberinfrastructure.
Internet2 AdvCollab Apps 1 Access Grid Vision To create virtual spaces where distributed people can work together. Challenges:
Azam Supervisor : Prof. Raj Jain
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University Australia.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #25 Dependable Data Management.
KAIS T Comparative studies on authentication and key exchange methods for wireless LAN Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan Computers.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
Security of the Internet of Things: perspectives and challenges
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
1 Enabling Smart Cities/Campuses to Serve the Internet of People Florence Hudson Senior Vice President & Chief Innovation Officer Internet2 TNC16 June.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Vision: A Robust Architecture for a Diverse Mobile Wireless Internet.
Network Processing Systems Design
Communication Protocol Engineering Lab. VANET-cloud : a generic cloud computing model for vehicular ad hoc networks IEEE Wireless Communications February.
Security Issues With Mobile IP
Delegation forwarding
Leszek Lilien, Zille Huma Kamal, Vijay Bhuse and Ajay Gupta
Mobile ad hoc networking: imperatives and challenges
Oppnets Applications Example 2: Emergency Application
Opportunistic Networks: A New Type of Specialized Ad Hoc Networks
Presentation transcript:

###-### title - PI - area WiSe (Wireless Sensornet) Laboratory WESTERN MICHIGAN UNIVERSITY WiSe Lab, Western Michigan University, Kalamazoo, MI Example Emergency Application  Seed oppnet is deployed after a man-made or natural disaster  Seed orders (in emergency!) many helpers to join:  computer network – ordered via wired Internet link  cellphone tower – via Bluetooth-enabled cell- phone  satellite – via a direct satellite link  home area network – via embedded processors in a refrigerator  microwave data network – via a microwave relay  BANs (body area networks) on or within bodies of occupants in an overturned car – via OnStar™  Example shows how an oppnet can leverage resources—such as communication, computation, sensing, storage, etc.—available in its environment Opportunistic Networks Leszek Lilien, 1,2 Zille Huma Kamal, 1 Ajay Gupta 1, Vijay Bhuse 1 and Zijiang Yang 1 1 WiSe Lab, Department of Computer Science, Western Michigan University, Kalamazoo, Michigan 2 Affiliated with the Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University, West Lafayette, Indiana 1. Opportunistic Networks – The Missing Link?  Communication network forms the backbone of any organization or service  Including emergency response systems  Delays, even chaos, in responses most often blamed on communications breakdown  Also blamed on lack of other resources  We have invented an entirely new category of computer networks: Opportunistic Networks, or Oppnets – can help in such problems  In oppnets, diverse systems—not deployed originally as oppnet nodes—join an oppnet dynamically in order to perform certain tasks they have been invited (or ordered) to participate in 2. Objectives  Oppnets are envisioned to provide, among others:  Bridges between disjoint communication media  Additional platforms for offloading tasks  Additional sensing modalities by integrating existing independent sensory systems 3. Seed Oppnet and Expanded Oppnet  First, a pre-designed seed oppnet is deployed (Fig.2)  Seed oppnet growth (cf. GROWTH block in Fig. 1)  Detect candidate helpers  Evaluate candidates  Invite and admit selected candidates  Candidate that joins oppnet becomes a helper  Integrate helpers’ resources  Seed oppnet grows into expanded oppnet (Fig. 3)  Collaborative processing  Oppnet determines useful helper functionalities  Oppnet offloads tasks to helpers  Oppnet manages offloaded tasks YES NO Collaborative processing Detect candidate helpers (system) GROWTH Integrate helpers’ resources Invite / admit candidates Restore and release all helpers NOYES Command Center (decentralized) Need to grow? YES Deploy seed oppnet NO Enough good candidates ? Work done? Figure 1. Basic Oppnet Operations Seed Oppnet Internet Link Figure 2. Seed Oppnet 7. Other Research Challenges (cf. Fig. 1)  Detecting candidate helpers in diverse communication media  Integrate disparate technologies  Possible solution: virtualize at the network layer to seamlessly enable communication between devices in different medium -Similar to virtual machines in grid computing  Distinguish between devices found in the same communication medium  Differentiate between devices by services rendered  Classify and evaluate candidate’s usefulness and reliability  Categorize as computation, communication, sensory, storage, etc., resource  Usefulness depends on oppnet’s goals  Inviting candidates and admitting the ones that accept invitation  Candidates are helpers not slaves  But in emergencies, mandatory „call to arms”  Integrating helpers’ resources  Managing network dynamics, offloading tasks to helpers that are best suited for given jobs, coordinating tasks  Collaborative processing  Data integration, information fusion  Restoring and releasing helpers  To minimize oppnet’s intrusiveness w.r.t. helpers Figure 3. Expanded Oppnet Seed Oppnet Appliance (refrigerator) Satellite Computer Network Microwave Relay Internet Link vehicle with OnStar Cellphone Tower Inter net Link 5. Privacy Challenges  Privacy is the „make it or break it” issue for oppnets - as for any pervasive computing technology  Protecting oppnet from helpers and helpers from oppnet  Assuring privacy  Privacy of data storage and processing  Privacy of communication based on its patterns E.g., broadcast/multicast from/to the base station  Using trust and increasing it  Routing through more trusted systems  Using shared secrets with b-cast authentication  Using digital signatures 6. Security Challenges  Prevent malicious helpers from joining  Prevent common attacks  MITM (man-in-the-middle)  Packet dropping  DoS attacks on weak devices  ID spoofing  Develop „good” lightweight cryptographic primitives  Use Intrusion Detection (ID) – when prevention fails  Heterogeneous – real-time ID and response  Secure distribution of information amongst nodes about malicious entities