Research Projects in the Mobile Computing and Networking (MCN) Lab Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University.

Slides:



Advertisements
Similar presentations
Mobile Wireless Sensor Network (mWSN) at Nokia
Advertisements

Energy-efficient distributed algorithms for wireless ad hoc networks Ramki Gummadi (MIT)
1 A Real-Time Communication Framework for Wireless Sensor-Actuator Networks Edith C.H. Ngai 1, Michael R. Lyu 1, and Jiangchuan Liu 2 1 Department of Computer.
Robot Sensor Networks. Introduction For the current sensor network the topography and stability of the environment is uncertain and of course time is.
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin (Sherman) Shen, and Xiaodong.
Presented by : Poorya Ghafoorpoor Yazdi Eastern Mediterranean University Mechanical Engineering Department Master Thesis Presentation Eastern Mediterranean.
TDMA based MAC protocol to assist in Wide area Sensor Network Deployment Nuwan Gajaweera.
DoS Attacks on Sensor Networks Hossein Nikoonia Department of Computer Engineering Sharif University of Technology
A Cloud-Assisted Design for Autonomous Driving Swarun Kumar Shyamnath Gollakota and Dina Katabi.
1 Sensor Relocation in Mobile Sensor Networks Guiling Wang, Guohong Cao, Tom La Porta, and Wensheng Zhang Department of Computer Science & Engineering.
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
Networks and Distributed Systems: Project Ideas
Vehicle-to-Vehicle Wireless Communication Protocols for Enhancing Highway Traffic Safety - A Comparative Study of Data Dissemination Models for VANETs.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Security Issues In Sensor Networks By Priya Palanivelu.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Control over Networks. The Coming Revolution  Electronics advances Moore’s law Computing/memory  Metrology advances MEMS  Communication advances Layered.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
LPT for Data Aggregation in Wireless Sensor networks Marc Lee and Vincent W.S Wong Department of Electrical and Computer Engineering, University of British.
Di Wu 03/03/2011 Geographic Routing in Clustered Multi-layer Vehicular Ad Hoc Networks for Load Balancing Purposes.
Data Dissemination in Vehicular Ad Hoc Networks Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad-hoc Networks
August 6, Mobile Computing COE 446 Network Planning Tarek Sheltami KFUPM CCSE COE Principles of.
Processing Monitoring Queries on Mobile Objects Lecture for COMS 587 Department of Computer Science Iowa State University.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Grammati Pantziou 1, Aristides Mpitziopoulos 2, Damianos Gavalas 2, Charalampos Konstantopoulos 3, and Basilis Mamalis 1 1 Department of Informatics, Technological.
1 Meeyoung Cha and DK Lee Advisor - Sue Moon (Korea Advanced Institute of Science and Technology) IEEE INFOCOM 2005 Student Workshop Split-n-Save : Path.
A Study of Live Video Streaming over Highway Vehicular Ad hoc Networks Meenakshi Mittal ©2010 International Journal of Computer Applications ( )Volume.
Ubiquitous Networks WSN Routing Protocols Lynn Choi Korea University.
1 Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University Excerpted from
Evgueni (Eugene) Khokhlov1 A Mobility-Centric Data Dissemination Algorithm for Vehicular Networks (MDDV) Evgueni (Eugene) Khokhlov.
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
Overview of Research Activities Aylin Yener
1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.
Research Overview Sencun Zhu Asst. Prof. CSE/IST, PSU
College of Engineering Grid-based Coordinated Routing in Wireless Sensor Networks Uttara Sawant Major Advisor : Dr. Robert Akl Department of Computer Science.
Connectivity-Aware Routing (CAR) in Vehicular Ad Hoc Networks Valery Naumov & Thomas R. Gross ETH Zurich, Switzerland IEEE INFOCOM 2007.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
1 An Information Propagation Scheme for VANETs 學生: 簡志閔 彭彥能 黃尚文 Thomas D.C. Little, Senior Member, IEEE, and Ashish Agarwal,
Research Projects in the Mobile Computing and Networking (MCN) Lab Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University.
SMUCSE 8394 BTS – Communication Technologies. SMUCSE 8394 Objectives To establish and maintain a unifying exchange and sharing framework for different.
Efficient Energy Management Protocol for Target Tracking Sensor Networks X. Du, F. Lin Department of Computer Science North Dakota State University Fargo,
Problem Wensheng Zhang, Dr. Guohong Cao, and Dr. Tom La Porta Example: Battlefield Surveillance Challenges Small Sensing Range Limitations in sensor nodes.
1 TBD: Trajectory-Based Data Forwarding for Light-Traffic Vehicular Networks IEEE ICDCS’09, Montreal, Quebec, Canada Jaehoon Jeong, Shuo Gu, Yu Gu, Tian.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks
1 Utilizing Shared Vehicle Trajectories for Data Forwarding in Vehicular Networks IEEE INFOCOM MINI-CONFERENCE Fulong Xu, Shuo Gu, Jaehoon Jeong, Yu Gu,
BY PREETHI.E. * For people living in developed countries the absolute volume of road traffic can be a daily nuisance. In addition, the road traffic.
Lecture 8: Wireless Sensor Networks
The Problem of Location Determination and Tracking in Networked Systems Weikuan Yu, Hui Cao, and Vineet Mittal The Ohio State University.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Adaptive Tracking in Distributed Wireless Sensor Networks Lizhi Yang, Chuan Feng, Jerzy W. Rozenblit, Haiyan Qiao The University of Arizona Electrical.
Overview of Wireless Networks: Cellular Mobile Ad hoc Sensor.
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
Dynamic Proxy Tree-Based Data Dissemination Schemes for Wireless Sensor Networks Wensheng Zhang, Guohong Cao and Tom La Porta Department of Computer Science.
Source : 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) Auther : Nacer Khalil, Mohamed.
Lecture 8: Wireless Sensor Networks By: Dr. Najla Al-Nabhan.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Communication Protocol Engineering Lab. VANET-cloud : a generic cloud computing model for vehicular ad hoc networks IEEE Wireless Communications February.
Realistic Mobility Models for Vehicular Ad hoc Network (VANET) Simulations ITST 高弘毅 洪佳瑜 蔣克欽.
In the name of God.
Overview of Wireless Networks:
Weikuan Yu, Hui Cao, and Vineet Mittal The Ohio State University
Location Cloaking for Location Safety Protection of Ad Hoc Networks
Intelligent Large Scale Sensing Systems (ILS3) initiative
Adhoc and Wireless Sensor Networks
Developing Vehicular Data Cloud Services in the IoT Environment
Presentation transcript:

Research Projects in the Mobile Computing and Networking (MCN) Lab Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University

Mobile Computing and Networking (MCN) Lab MCN lab conducts research in many areas of wireless networks and mobile computing, emphasis on designing and evaluating mobile systems, protocols, and applications. – –Current Projects: secure sensor networks, collaborative data access in mobile P2P networks, mobile sensor networks, data centric sensor networks, resource management in wireless networks. – –Support: NSF (CAREER, ITR, NeTS/NOSS, CT, CNS), Army Research Office, DARPA, PDG/TTC and member companies Cisco, Telcordia, IBM and 3ETI. Current students: 8 PhD, 1 MS, and 2 honor BS students – –Alumni: 3 PhD, two became faculty members at Iowa State University and Florida International University, one went to Motorola lab. – –10 MS students went to various companies For the last two years: 12 infocom papers, 2 ICNP papers, 2 mobihoc paper, 1 mobisys paper, and about 40 papers in other conferences and journals.

Current Research Projects Collaborative Data Access in Mobile Ad Hoc Networks Data Dissemination in Vehicular Ad Hoc Networks Controllable Node Mobility for Mission-Oriented Sensor Networks (with La Porta, Kesidis, Das) A Framework for Defending Against Node Compromises in Distributed Sensor Networks (with Zhu) Security and Privacy support for data centric sensor networks (with Zhu) Distributed Self-Healing Mechanisms for Securing Sensor Networks (with Zhu)

3 Data Access in Ad Hoc Networks Most of the previous researches in ad hoc networks focus on routing or MAC issues. Data access is also very important, since the ultimate goal of using ad hoc networks is to provide information access to mobile nodes. In Battlefield, after a soldier obtains enemy information (e.g., battlefield map, enemy distribution) from the commander (data center), it is very likely that nearby soldiers also need the same information. – –Bandwidth and power can be saved if these data access are served by the soldier with the cached data instead of the data center which may be far away.

4

5 Mission Oriented Sensor Mobility Sensor networks can automate information gathering and processing, can support applications such as target tracking, perimeter defense, environmental monitoring, and intelligent transportation. Multiple missions, each with different requirements, may share common sensors to achieve their goals. Each mission may have its own requirements –In perimeter defense, the requirement is to have adequate sensors along a pre-define perimeter. –In target tracking, enough sensors should be deployed along the track of the target. As the mission changes, nodes may need to move.

6 Moving sensors to satisfy different mission requirements sink S1 S2 S4 S3 Other reasons such as: sensor failure or new event such as chemical spill, target approaching, sensing obstacle (blocking video sensor or acoustic sensor).

7 Research Issues Mobility assisted sensing: relocate sensors as the network condition changes (sensor failure or new event such as chemical spill, target approaching). Network monitoring: detect node failures and estimate the loss of coverage. Mobility assisted data dissemination (routing): moving sensors to improve network communication; increasing network lifetime, dealing with network partition. Integrated mobility management for sensing and routing: define utility functions that can capture the benefits of the movement from the perspective of all missions (e.g., routing or sensing).

8 Evaluations Currently evaluate with ns. Considering prototype with commercial off-the-shelf component. Each robot is small (5” x 2.5” x 3”) and costs under $200 each Mobility, built from remote- controlled toy cars. Runs TinyOS, based on Berkeley Mica Motes, has processor and wireless communication.

9 Vehicle Assisted Data Access VANET has been envisioned to be useful in road safety and many commercial applications – –A moving vehicle may want to know the sale information or remaining stocks at a department store or gas station; the available parking lot at a parking place; the room availability and price at a hotel. VANET is highly dynamic and may have frequent disconnections. How to access these data using VANET quickly?

10 Vehicle Assisted Data Access Solution: Store, carry and forward Use predictable traffic pattern and vehicle mobility to assist data delivery – –Select a forwarding path with smallest packet delivery delay

11 Secure Sensor Networks It is a big challenge to secure wireless sensor networks because of the network scale, the highly constrained system resource, and the fact that sensor networks are often deployed in unattended and hostile environments. We propose to develop a framework for defending against node compromises in unattended sensor networks. The framework consists of a suite of security mechanisms spanning three phases: – –prevention – –detection – –reaction This research will provide fundamental security services covering key management, authentication, compromise detection, and revocation.

12 A Framework for Defending Against Node Compromises in Distributed Sensor Networks