CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe.

Slides:



Advertisements
Similar presentations
OneM2M Technical Requirements - Driven by EU BUTLER and IEEE PAC - Group Name: WG1 (REQ) Source: Friedbert Berens, FBConsulting Sarl,
Advertisements

SECURITY RESEARCH SEVENTH FRAMEWORK PROGRAMME Mark Stroud Home Office Scientific Development Branch UK Security Programme Committee Member.
GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin (Sherman) Shen, and Xiaodong.
May 22, 2006 © Leszek T. Lilien 2006 Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Leszek Lilien WiSe Lab (Wireless.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
###-### title - PI - area WiSe (Wireless Sensornets) Laboratory WESTERN MICHIGAN UNIVERSITY WiSe Lab, Western Michigan University, Kalamazoo, MI
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Kick-off Meeting Athens 05/10/2004 The project ’POMPEI - P2p, location and presence mobile services for managing crisis and disaster situations’
A Service-Based Infrastructure for Advanced Logistics Luciano Baresi, Daniele Braga, Marco Comuzzi, Filippo Pacifici, and Pierluigi Plebani ESEC-FSE 2.
. Smart Cities and the Ageing Population Sustainable smart cities: from vision to reality 13 October ITU, Geneva Knud Erik Skouby, CMI/ Aalborg University-Cph.
Wireless Network Organization
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Asia Pacific Economic Cooperation Transportation Working Group ITS Experts Group Chicago, Illinois September 2002 Walter Kulyk, P.E. Director, Office of.
CS 239: Advanced Security Spring 04 Security in Pervasive and Ubiquitous Environments Sam Irvine
Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.
###-### title - PI - area WiSe (Wireless Sensornet) Laboratory WESTERN MICHIGAN UNIVERSITY WiSe Lab, Western Michigan University, Kalamazoo, MI
2/9/2006 Opportunistic Networks: The Concept and Research Challenges Leszek Lilien, Zille Huma Kamal and Ajay Gupta In cooperation with: Vijay Bhuse and.
Wednesday, September 6, rd International Conference on Trust, Privacy & Security in Digital Business Kraków, Poland, September 4-8, 2006 Panel Discussion:
SensIT PI Meeting, April 17-20, Distributed Services for Self-Organizing Sensor Networks Alvin S. Lim Computer Science and Software Engineering.
CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe.
A Survey of Mobile Phone Sensing Michael Ruffing CS 495.
Sensor Coordination using Role- based Programming Steven Cheung NSF NeTS NOSS Informational Meeting October 18, 2005.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
Envisioned Role for NTI Concerning ITS Deployment in Egypt by Dr. Mahmoud EL-HADIDI Professor of Telecommunications at Cairo U & Consultant at NTI 3 rd.
Energy efficient sensor networks SRA Ambient Intelligence 2008.
IT 351 Mobile &Wireless Computing Semester 2, Dr. Hala Mokhtar Room 79- 2nd floor.
Presented at the International Workshop on Research Challenges in Security and Privacy for Mobile and Wireless Networks (WSPWN 2006), Miami, Florida, March.
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
Presented by: Chaitanya K. Sambhara Paper by: Karl Mayer and Wolfgang Fritsche IABG mbH Germany - Instructor : Dr Yingshu Li.
Introduction to Mobile Computing -CSE 535 Fall 2007 Sandeep K. S. Gupta School of Computing and Informatics Arizona State University.
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
Presented by: Dr. Munam Ali Shah
An Overview of the Smart Grid David K. Owens Chair, AABE Legislative Issues and Public Policy Committee AABE Smart Grid Working Group Webinar September.
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
IT 351 Mobile &Wireless Computing Semester 1, Dr. Hala Mokhtar Room th floor.
Cognitive Radio Networks
Lockheed Martin Aeronautics Company Candidate Collaborative Projects for Net-Centric Application Michael F. Siok, PE Lockheed Martin Aeronautics Company.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
Responding to the Unexpected Yigal Arens Paul Rosenbloom Information Sciences Institute University of Southern California.
AD-HOC NETWORK SUBMITTED BY:- MIHIR GARG A B.TECH(E&T)/SEC-A.
Networked Embedded and Control Systems WP ICT Call 2 Objective ICT ICT National Contact Points Mercè Griera i Fisa Brussels, 23 May 2007.
1 BRUSSELS - 14 July 2003 Full Security Support in a heterogeneous mobile GRID testbed for wireless extensions to the.
Department of Electronic Engineering Challenges & Proposals INFSO Information Day e-Infrastructure Grid Initiatives 26/27 May.
Cognitive Radio: Next Generation Communication System
August 3, March, The AC3 GRID An investment in the future of Atlantic Canadian R&D Infrastructure Dr. Virendra C. Bhavsar UNB, Fredericton.
Ad Hoc Network.
STREP Research Project HOBNET (FP7- ICT , ) HOlistic Platform Design for Smart Buildings of the Future InterNET (
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Introduction to Mobile Computing -CSE 535 Fall 2010 Sandeep K. S. Gupta School of Computing, Informatics and Decision Systems Engineering Arizona State.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Overview of Wireless Networks: Cellular Mobile Ad hoc Sensor.
Societal-Scale Computing: The eXtremes Scalable, Available Internet Services Information Appliances Client Server Clusters Massive Cluster Gigabit Ethernet.
Wireless Sensor Networks
Security and Resilience Pat Looney Brookhaven National Laboratory April 2016.
Mesh Networks and DTN Break Out Group  Common research challenges  A representative experiment  Issues for a one page writeup  what incentive for the.
Outline Voucher for Industry Association (VIA) Overview Cybersecurity VIA Program Details o Program Objectives o Project Eligibility o Funding Contributions.
Citizen Corps Volunteer for America “Engaging Citizens In Homeland Security”
Internet of Things – Getting Started
Lecture 8: Wireless Sensor Networks By: Dr. Najla Al-Nabhan.
1 Office of ASG/CITO Crisis Information Management Strategy UNGIWG-11, Geneva 15 March 2011 A written consent by the UN is required to use the information.
Overview of Wireless Networks:
Supporting Mobile Collaboration with Service-Oriented Mobile Units
Mobile &Wireless Computing
Networking: Discovery, Communication, Collaboration
Leszek Lilien, Zille Huma Kamal, Vijay Bhuse and Ajay Gupta
Mobile ad hoc networking: imperatives and challenges
Opportunistic Networks: A New Type of Specialized Ad Hoc Networks
Sensor Networks – Motes, Smart Spaces, and Beyond
ETSI Contribution to 3rd Meeting of EC Expert Group on RRS
Presentation transcript:

CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe Lab (Wireless Sensornet Laboratory) Department of Computer Science Western Michigan University Slides are © 2007 by Leszek T. Lilien Requests to use original slides for non-profit purposes will be gladly granted upon a written request.

Outline Part 1. Motivation for Specialized Ad Hoc Networks Part 2. Analogy to a Human Emergency Response Team Part 3. Opportunistic Networks: A New Type of Specialized Ad Hoc Networks Part 4. Related Research and Research Challenges Part 5. Conclusions Part 6. Current and Future Work 2

Part 1. Motivation for Specialized Ad Hoc Networks Homeland Security One of the crucial challenges facing the USA today Among its 6 mission areas is Emergency Preparedness and Response (EPR) EPR deals with: Natural disasters Man-made disasters (incl. accidents, terrorist attacks) [Natl. Strategy for Homeland Security, July 2002] Mobile ad hoc networks (MANETs) proposed for EPR [Haas, 1999] 3

Motivation for Specialized Ad Hoc Networks (2) MANETS are not quite a natural match for EPR E.g., human rescue teams can find and mobilize as their helpers local firemen, police, National Guard or even regular citizens No analogous capability of MANETs to find and “mobilize” devices/networks Let’s find or define a specialization (a subclass) of ad hoc networks more suitable for EPR applications A new paradigm and a new technology to improve effectiveness & efficiency of EPR 4

5 This page left blank intentionally.

Part 2. Analogy to a Human Emergency Response Team Important characteristics of a human rescue team Starts as a seed team (a small group of people) The seed team grows opportunistically during its operations a) Some people can always be ordered to join  Police, firemen, National Guard or Army Reserve personnel b)Anybody can be ordered to join only in life-or- death situations  Legally required to help saving lives or critical resources c) Anybody can be asked to join in other situations 6

Analogy to a Human Emergency Response Team (2) Who is ordered or invited to join? In some situations any extra pair of hands can help In others only highly qualified people (e.g., doctors and nurses) are ordered/asked to join Human helper types Highly prepared E.g., National Guard, Army Reserve or state militias Signed up for service Undergo training in preparation for duty (even unforeseen) Somewhat prepared E.g., people that volunteer for first aid courses Become pretty valuable helpers in emergencies Not prepared at all 7

Benefits of the opportunistic growth of the rescue team Opportunistic leveraging of all kinds of skills and resources that new helpers can bring Obtaining a lot of help effectively and efficiently – even for free 8 Analogy to a Human Emergency Response Team (3)

Analogous critical requirements for ad hoc network specialized for EPR in the priority order: 1)Minimal starting configuration – a pre-configured seed for EPR operations Analogy to the seed rescue team 2)High interoperability in terms of communication of diverse devices or networks (Wired/WiFi, Bluetooth, satellite, ham radios, WiMAX,...) Analogy to a rescue team’s ability to contact different people, individually or via organizations 3)Highly heterogeneous software (& hardware) Analogy to heterogeneity of rescue teams in terms of members’ skills, communication and other equipment, and other resources 4)Harvesting of diverse resources as needed Analogy to finding people with different skills, equipment, and other resources 5)Persistent connectivity once it is established Analogy to being able to contact (maybe via a chain of others) members of the expanded team, including all helpers 9 Analogy to a Human Emergency Response Team (4)

If there is no specialized ad hoc network (AHN) matching the requirements, then: Define a new specialized AHN paradigm Invent a new specialized AHN technology No known specialized AHN matches the requirements Considered AHNs: Mobile ad hoc networks (MANETs) Mesh networks P2P systems Sensor networks Spontaneous networks (in the narrow sense, cf. [Feeney et al. 2001]) => Need: - a new specialized AHN paradigm - a new specialized AHN technology Note: Other (than oppnets) specialized AHNs for emergencies are Incident Area Networks (IANs) 10 Analogy to a Human Emergency Response Team (5)

11 This page left blank intentionally.

Part 3. Opportunistic Networks: A New Type of Specialized Ad Hoc Networks Paradigm of opportunistic networks (oppnets) Based on the analogy to operations of human rescue teams Goals of oppnets: Opportunistic growth Opportunistic leveraging of resources aiming at (among others) : Bridging diverse communication media Offloading computations to additional platforms Integrating independent sensing systems (enhancing their sensing capabilities) 12

Startup: Seed Oppnet 13 Oppnet deployed as a seed oppnet Seed oppnet localizes its nodes & self-configures Seed Nodes Link to the World Controller (distributed)

Growth: Expanded Oppnet 14 Seed Nodes Link to the World Controller (distributed) Appliance(refrigerator) Computer Network WiMAX OverturnedVehicle (with OnStar, VAN) CellphoneTower Satellite Seed oppnet grows into an expanded oppnet by: Finding candidate helpers Selecting candidates - they are ordered/asked to join Add communication, computing, sensing, storage, other resources 14

Summary of Oppnet Activities Discovering & identifying candidate helpers Contacting selected candidates Inviting or ordering candidates to join Admitting & integrating helpers that join oppnet Offloading tasks to helpers Determining useful colaborative functionalities Managing offloaded tasks Cleaning up & releasing each helper when no longer needed > Need research for each of theses activities < Think which is most interesting to you as a topic for your CS6910 Team Project 15

Oppnet Reserve A challenge in oppnet growth Must discover candidate helpers, then contact selected ones Difficult without facilities provided by candidates or infrastructure A solution: oppnet reserve — facilitating discovery/contacting Analogy to Army / Navy / Air Force Reserve, etc. Volunteer helpers sign up for oppnet reserve Maybe for some incentives (moral, financial, etc.) Volunteers „trained” for active duty Install facilities that make them easier to detect and contact by oppnets E.g., install (future) standard oppnet protocols Matched to their capabilities: heavy-, medium- and lightweight Available for active oppnet duty whenever must/can help 16

Oppnet Reserve (2) Oppnet reserve is analogous to having highly prepared human helpers (Recall the classification of human helpers into: highly prepared, somewhat prepared, unprepared) Oppnet reserve is not required but very helpful Having highly prepared human helpers is not required either 17

 Oppnet is … … a specialized (application-specific or application-class- specific) ad hoc network … an opportunistic growth network … an opportunistic use of resources network / an opportunistic use of services network Spectrum, connectivity, services, … … a privacy-preserving & secure technology  Oppnet is not … … a “generic” ad hoc network … a mesh network … a grid computing system … a peer-to-peer (P2P) system … a hybrid network … 18 What Oppnet Is … / What Oppnet Is Not … (this slide added after lecture)

Basic Oppnet Categories 2 major oppnet categories: Benevolent oppnets Malevolent oppnets Corresponding oppnets scenarios: Benevolent oppnet scenario: „Citizens Called to Arms” Malevolent oppnet scenario: „Bad Guys Gang Up” 19

Benevolent Oppnet Scenario: „Citizens Called to Arms” (1) Seed oppnet deployed after an earthquake (un- predictable emergency) Seed is ad hoc wireless network with very powerful nodes More energy, computing and communication resources Seed tries to detect candidate helpers For help in damage assessment and disaster recovery Uses any available detection method — including: Cellphone- or radio-based detection Including Software Defined Radio (SDR) & Cognitive Radio Searching for nodes using the IP address range for the affected geographic area AI-based visual detection (next slide) 20

Benevolent Oppnet Scenario: „Citizens Called to Arms” (2) Example: Helper 1 (supervisor of security cameras) monito- ring a surveillance net views an overturned car Helper 2 (pattern recognition specialist) detects an overturned car Helper 3 (image analysis specialist) asked to recognize car’s license plate Helper 4 (DB manager) finds that the car has OnStar link Helper 5 (OnStar agent) contacts VAN (Vehicle Area Network) and BANs (Body Area Networks) on or within bodies of car occupants via OnStar infrastructure Helper 6 (vital sign evaluator) evaluates obtained info Helper 7 (rescue dispatcher) decides if/when rescuers should be dispatched 21

Benevolent Oppnet Scenario: „Citizens Called to Arms” (3) Oppnet selects optimal subset of detected nodes Inviting devices, clusters & entire networks Helpers for communicating, sensing, computing Using „hidden” capabilities, e.g. for sensing: Desktop can „sense” presence of a potential victim at its keyboard Cellphones can „sense” location Even ones w/o GPS can be triangulated 22

Using „hidden” emergency functionalities Oppnet contacts 2 independent sensornets (SNs): water infrastructure control SN / public space surveillance SN SNs ordered to abandon normal functions & help in rescue & recovery operations Water infrastructure SN (with multisensor capabilities, under road surfaces) — ordered to sense vehicular movement and traffic jams Public space surveillance SN — ordered to search for images of human victims 23 Benevolent Oppnet Scenario: „Citizens Called to Arms” (4) 23

24 Malevolent Oppnet Scenario: „Bad Guys Gang Up” (1) Scenario 1 — Terrorists create apparently harmless weather monito- ring sensornet (SN): SN becomes a seed of a malevolent opportunistic SN SN exploits other nodes from many other networks (w/o revealing its true goals) “Critical mass” of the opportunistic SN is reached (in terms of geographical spread and sensing capabilities) SN waits for wind patterns that can speed up spread of poisonous chemicals Collected data used to decide when to start chemical attack 24

25 Malevolent Oppnet Scenario: „Bad Guys Gang Up” (2) Scenario 2 — network at home starts spying on you: Becomes a seed oppnet Exploits other devices/nets to collect all info on you: From your fridge (& RFID-equipped food packaging) : what/when you eat From your computer: keylogs your passwords, sensitive data From your cellphone: who you call & when From your networked camera: what photos you take From your home security surveillance system: your private images Cyberfly with camera eyes and microphone ears... Huge privacy problem! / Huge security problem! Controls to counteract malevolent oppnets badly needed

26 NOTE: The following slides not required for exam. (Provided as a potential help for project selection and project work.)

Part 4. Related Research & Research Challenges Examples of Related Research Interoperability Among wireless networks - active research area Among WANs, MANs, LANs, PANs (Personal Area Networks), etc. Among wired & wireless nets - much less research Ambient Networks (big European Union project, next-generation Internet—for 2015/2020, smaller networks able to compose themselves into bigger ones) Localization & self-organization MANETs / Sensornets Network growth P2P systems – search for peers in unstructured systems Trojan Horses - agents spreading in search for helpers Integrating and managing heterogeneous systems, incl. data integration & aggregation Grid systems / MANETs / Sensornets Other … 27

Research Challenges in Basic Operations Challenges in seed oppnet deployment E.g., localization, self-configuration, adaptability Challenges in detecting helper systems E.g., define primitives to detect candidates, identify and categorize them, evaluate and classify them (e.g., based on dependability and usefulness) Challenges in inviting & admitting candidate helpers E.g., select candidates to invite, develop protocols for candidates to accept or reject invitation, devise primitives /methods to manage expanded oppnets Etc., etc. for remaining oppnet primitives More: Leszek Lilien, Z. Huma Kamal, and Ajay Gupta, "Opportunistic Networks: Research Challenges in Specializing the P2P Paradigm,” Proc. 3rd International Workshop on P2P Data Management, Security and Trust (PDMST’06), Kraków, Poland, September

Research Challenges in Privacy & Security (1) 1)Privacy challenges in oppnets Privacy is critical Oppnets are pervasive systems Must face all critical privacy challenges inherent to pervasive computing Privacy is a „make it or break it” issue for pervasive computing => Privacy is a „make it or break it” issue for oppnets Basic privacy protection goals in oppnets Protect helper resources from the host oppnet Protect oppnet from its helpers Protect environment from privacy violations by oppnet Also from malevolent oppnets 29

Research Challenges in Privacy & Security (2) 2) Security challenges in oppnets Many have privacy aspects/components More: L. Lilien, Z. H. Kamal, V. Bhuse, and A. Gupta, "Opportunistic Networks: The Concept and Research Challenges in Privacy and Security," book chapter in: "Mobile and Wireless Network Security and Privacy," ed. by K. Makki et al., Springer Science+Business Media, Norwell, Massachusetts, 2007 (to appear) – pre-publication version available upon request 30

31 This page left blank intentionally.

High-payoff potential for the oppnet initiative 1)Social and economic benefits  Including reduction of human suffering & loss of life 2)Technological benefits 3)Research benefits 4)Educational benefits -- Details below Part 5. Conclusions

1) Social & Economic Impacts Impacts on Emergency Preparedness and Response operations in Homeland Security (HS) — current app focus Tremendous leveraging potential in emergencies A wealth of freely available resources Reduction of human suffering & loss of life Increasing safety & efficiency of the first responders Impacts on other applications both in HS and outside HS [SKIP:] Economic impacts Technology transfer & commercialization Benefits for the computer industry Production of software / networking equipment Benefits for other industries Enhancing many products with standard oppnet interfaces E.g., the auto industry: cars and trucks as oppnet platforms 33 Part 5. Conclusions – cont.2

Advancing the network and pervasive computing know-how Development of the innovative oppnet technology Enhancing network/pervasive applications by use of oppnet technologies Enabling new network/pervasive application niches we can not even foresee Advancing other areas of technology (not only computing) A side effect of oppnet developments [SKIP:] Technology impacts speeded up & enhanced by the planned technology transfer plus commercialization activities 34 2) Impacts on Technology Part 5. Conclusions – cont.3

35 [SKIP:] 3) Impacts on Research [SKIP:] 4) Impacts on Education Part 5. Conclusions – cont.4

36 This page left blank intentionally.

>> Search for good uses for oppnets in all kinds of application areas << Search for applications that can start with a seed... need/have high interoperability... need/have highly heterogeneous software... can benefit from leveraging diverse resources of helpers... can maintain persistent connectivity once it is established Part 6. Current and Future Work

Part 6. Current and Future Work – cont. Building an oppnet prototype Goal: Proof of concept To demonstrate technical prowess & economic benefits Designing oppnet architecture With its associated components: Methods, protocols, and algorithms Oppnet prototype implementation For stimulation and feedback Necessary for fine-tuning oppnet design 38

Publications, Etc. Selected Publications [updated on 9/13/07] (cf. Z.H. Kamal, L. Lilien, A. Gupta, Z. Yang, and M. Batsa, ”Proof of Concept for Class 2 Opportunistic Networks – a New Paradigm for Unlicensed Mobile Access Technology,” book chapter in: Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications, Y. Zhang, L.T. Yang, and J. Ma (Eds.), Auerbach Publications, Taylor & Francis Group, Boca Raton, Florida, 43 pages (to appear) L. Lilien, Z. H. Kamal, V. Bhuse, and A. Gupta, "The Concept of Opportunistic Networks and Their Research Challenges in Privacy and Security," book chapter in: "Mobile and Wireless Network Security and Privacy," ed. by K. Makki et al., Springer Science+Business Media, Norwell, Massachusetts, 2007 (extended version of the WSPWN 2006 paper; to appear) L. Lilien, “A Taxonomy of Specialized Ad Hoc Networks and Systems for Emergency Applications,” Proc. The First International Workshop on Mobile and Ubiquitous Context Aware Systems and Applications (MUBICA 2007), Philadelphia, Pennsylvania, August 2007, CD-ROM, 8 pages L. Lilien, A. Gupta, and Z. Yang, "Opportunistic Networks for Emergency Applications and Their Standard Implementation Framework," Proc. The First International Workshop on Next Generation Networks for First Responders and Critical Infrastructure (NetCri07), New Orleans, Louisiana, April 11-13,

Publications, Etc. – cont. 1 L. Lilien, Z. H. Kamal and A. Gupta, "Opportunistic Networks: Research Challenges in Specializing the P2P Paradigm," Proc. 3rd International Workshop on P2P Data Management, Security and Trust (PDMST'06), Kraków, Poland, September 4-8, 2006, pp L. Lilien, “Developing Specialized Ad Hoc Networks: The Case of Opportunistic Networks,” Proc. Workshop on Distributed Systems and Networks (in conjunction with WWIC’06), Bern, Switzerland, May 2006 (proceedings not published) L. Lilien, Z. H. Kamal, V. Bhuse and A. Gupta, "Opportunistic Networks: The Concept and Research Challenges in Privacy and Security," Proc. International Workshop on Research Challenges in Security and Privacy for Mobile and Wireless Networks (WSPWN 2006), Miami, Florida, March 2006, pp B. Bhargava, L. Lilien, A. Rosenthal and M. Winslett, "Pervasive Trust," IEEE Intelligent Systems, vol. 19(5), Sep./Oct.2004, pp (just the first brief mention of the oppnet idea, in the form of malevolent opportunistic sensor networks). 40

Publications, Etc. – cont. 2 Selected Presentations [updated on 9/13/07] “A Taxonomy of Specialized Ad Hoc Networks and Systems for Emergency Applications,” The First International Workshop on Mobile and Ubiquitous Context Aware Systems and Applications (MUBICA 2007), Philadelphia, Pennsylvania, August 6, 2007 “Do we need specialized ad hoc networks and systems?” at the panel under the same title at the First International Workshop on Specialized Ad Hoc Networks and Systems (SAHNS 2007), Toronto, Canada, Friday, June 29, 2007 “Opportunistic Networks — A New Paradigm and Technology for Service Oriented Architecture,” at the panel: “Web 2.0 and Service Oriented Architecture,” The 6th Annual WMU IT Forum, Western Michigan University, Kalamazoo, Michigan, March 30, 2007 L. Lilien, "Opportunistic Networks: Research Challenges in Specializing the P2P Paradigm," 3rd International Workshop on P2P Data Management, Security and Trust (PDMST'06), Kraków, Poland, September 4-8, 2006 L. Lilien, "Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications," presented for Distributed Systems Research Group, Department of Computer Science, AGH University of Science and Technology, Krakow, Poland, May 22, 2006 L. Lilien, "Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications," presented for Section of Information Technology, Institute of Telecomputing, Cracow University of Technology, Kraków, Poland, May 23, 2006 L. Lilien, "Developing Specialized Ad Hoc Networks: The Case of Opportunistic Networks," Workshop on Distributed Systems and Networks (in conjunction with WWIC’06), Bern, Switzerland, May 9, 2006 L. Lilien, "Opportunistic Networks: The Concept and Research Challenges in Privacy and Security," International Workshop on Research Challenges in Security and Privacy for Mobile and Wireless Networks (WSPWN 2006), Miami, Florida, March 15-16, 2006 L. Lilien, Z.H. Kamal and A. Gupta (in cooperation with V. Bhuse and Z Yang), "Opportunistic Networks: The Concept and Research Challenges," Department of Computer Science, Western Michigan University, Kalamazoo, Michigan, February 9,

Selected Posters [updated on 9/13/07] L. Lilien and B. Bhargava (in collaboration with A. Gupta, I. Woungang, and Z. Yang), “Opportunistic Networks: Finding and Using Helpers Dynamically,” NSF NeTS Wireless Networks PI Meeting, Illinois Institute of Technology, Chicago, July 12, Z.H. Kamal (with advisors: A. Gupta and L. Lilien), “MicroOppnet: Small-Scale Testbed for Class 2 Opportunistic Networks,” Research Day, The Graduate College, Western Michigan University, Kalamazoo, Michigan, April 20, Z.H. Kamal, A. Gupta, and L. Lilien, “MicroOppnet—Small-Scale Testbed for Class 2 Opportunistic Networks,” The 6th Annual WMU IT Forum, Western Michigan University, Kalamazoo, Michigan, March 30, Leszek Lilien, Zille Huma Kamal, A. Gupta, V. Bhuse and Z. Yang, "Opportunistic Networks," 3rd International Conference on Networked Sensing Systems, Chicago, IL, May 31 - June Publications, Etc. – cont. 3

WiSe Lab Experience in Ad Hoc Networks – Selected Projects Since 1/03  Designing of WiSe Security Protocols: DSPS  Location Tracker Using Motes (*)  RHS: Remote Home Surveillance (*)  Directed Diffusion: Attacks & Countermeasures  Improving the Accuracy of Mote Measurements by Using Neural Networks  SOMS: Smart Occupancy Monitoring System Using Motes (*)  Comparative Study of Network Simulators  Collaborative Image Processing (*)  DENSe: a Development Environment for Networked Sensors  Incorporating Mobile-ware in Distributed Computations / Grids (*)  Extending the ns-2 Simulator to Satellite and WCN Simulations  Smart Antennas for WCNs  Energy Efficient MAC Protocols for IEEE x  A Wireless Security Testing System (*)  Mobile and Self-Calibrating Irrigation System  Collective Communications for Sensornets (*) * Results directly useful for oppnets 43

44 This page left blank intentionally.