SMUCSE 8394 BTS – Communication Technologies. SMUCSE 8394 Objectives To establish and maintain a unifying exchange and sharing framework for different.

Slides:



Advertisements
Similar presentations
Department of Military Affairs & Public Safety WV Office of Emergency Services Primary GIS Missions: Support Emergency Operations Partner with GIS Data.
Advertisements

SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Facilitating a Dialog between the NSDI and Utility Companies J. Peter Gomez Manager, Information Requirements, Xcel Energy.
A Mobile Ad hoc Biosensor Network Muzammil KP S7,ECE Govt. Engg. College, Wayanad.
Group #1: Protocols for Wireless Mobile Environments.
Introduction to Wireless Sensor Networks
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
The Role of Global Positional Systems in Policing and Crime Prevention William J. Artis Jr. FRS 142: Where’s Waldo April 19, 2004.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
Security Issues In Sensor Networks By Priya Palanivelu.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
A Survey on Sensor Networks Rick Han CSCI 7143 Secure Sensor Networks Fall 2004.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
A Survey on Energy Efficient MAC Protocol for Wireless Sensor Networks Huma Naushad.
Key Distribution in Sensor Networks (work in progress report) Adrian Perrig UC Berkeley.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley.
SPINS: Security Protocols for Sensor Networks Adrian Perrig Robert Szewczyk Victor Wen David Culler Doug TygarUC Berkeley.
Wireless Sensor Network Security Anuj Nagar CS 590.
Chapter Preview  In this chapter, we will study:  The basic components of a telecomm system  The technologies used in telecomm systems  Various ways.
1 Energy Efficient Communication in Wireless Sensor Networks Yingyue Xu 8/14/2015.
NAME: NASIRAHMADPROGRAM: B.S TELECOMSEMESTER: 7THREG#: SU/ PRESENTED TO: ENGR. GUL ZAMEEN KHANDATE: UNIVERSITY: SARHAD UNIVERSITY.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
SMUCSE 8394 BTS – Communications II Requirements and Technologies.
Presented by Amira Ahmed El-Sharkawy Ibrahim.  There are six of eight turtle species in Ontario are listed as endangered, threatened or of special concern.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
An Introduction Table Of Context Sensor Network PreviewRouting in Sensor NetworksMobility in Sensor Networks Structure and characteristics of nodes and.
Industrial Control Security & Access Control Facilities Management UNECE International Forum on Trade Facilitation Geneva, Switzerland May
Introduction to Wireless Sensor Networks
CEOS WGISS Preliminary Workshop on Data Access and Integration: Global and Regional SDI and Client Perspectives 8-9 May 2000, Canberra ESCAP Regional Space.
Presented BY:- JITENDRA KUMAR 4JN07EC018. CONTENTS  Introduction  Bluetooth  Smart sensor network  Research issues  Sensor network imlementation.
Microcontroller-Based Wireless Sensor Networks
1 Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University Excerpted from
GPS GIS GIS in Campbell River GPS: Global Positioning System Originally designed for use by the military It is a satellite-based, radio navigation.
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
Security on Sensor Networks Presented by Min-gyu Cho SPINS: Security Protocol for Sensor Networks TinySec: Security for TinyOS SPINS: Security Protocol.
SENSOR NETWORKS BY Umesh Shah Mayuresh Patil G P Reddy GUIDES Prof U.B.Desai Prof S.N.Merchant.
Wireless Sensor Networks Nov 1, 2006 Jeon Bokgyun
Differential Ad Hoc Positioning Systems Presented By: Ramesh Tumati Feb 18, 2004.
A Survey on Sensor Networks Hussein Alzoubi Rami Alnamneh
Ad Hoc Network.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Lecture 8: Wireless Sensor Networks
Security in Wireless Sensor Networks by Toni Farley.
Overview of Wireless Networks: Cellular Mobile Ad hoc Sensor.
Wireless Ad Hoc Networks
Overview of Cellular Networks Mobile Ad hoc Networks Sensor Networks.
Wireless Sensor Networks
Sensor Networks Jason Turbyfill 16 February 2005.
SURVEYING Subject Code : Presented By : Topic : GPS ( ) ( ) ( )
Wireless Sensor Networks: A Survey I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci.
Lecture 8: Wireless Sensor Networks By: Dr. Najla Al-Nabhan.
Wireless sensor networks: a survey
Created by :- prashant more prashant more. INTRODUCTION Bluetooth is wireless high speed data transfer technology over a short range ( meters).
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
In the name of God.
Wireless Sensor Networks
Wireless Sensor Networks
Overview of Wireless Networks:
SPINS: Security Protocols for Sensor Networks
Wireless Sensor Network (WSN)
Introduction to Wireless Sensor Networks
SPINS: Security Protocols for Sensor Networks
Lecture 3: Wireless Sensor Networks
SPINS: Security Protocols for Sensor Networks
Protocols.
Connected Sensor Cover Problem
Outline A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001 Sensor.
Protocols.
Presentation transcript:

SMUCSE 8394 BTS – Communication Technologies

SMUCSE 8394 Objectives To establish and maintain a unifying exchange and sharing framework for different types of data Information exchange essential –To pre-emergency planning –Critical first response actions, relief efforts, and community recovery –Greatly enhance daily operations and cooperation among agencies in meeting homeland defense responsibilities Where the world is going –Web-based spatial decision support system where multiple agencies can rapidly share and exchange their GIS databases and remotely sensed imagery

SMUCSE 8394 Technology Components Command, Control and Communications –Dispatch –Force management –Radio and data communications –Geographical Information Systems (GIS) –Global positioning system (GPS)

SMUCSE 8394 Benefits of GIS Deploy response capabilities. Locate resources Improve planning capabilities Develop training scenarios Improve accuracy Provide timely decision support Develop contingency plans.

SMUCSE 8394 GIS for HS

SMUCSE 8394 GIS for Emergency Response Identifying the location of schools, medical centers, staging areas, and evacuation routes Analysis can identify transportation choke points near bridges or overpasses Route response vehicles Quickly identify critical infrastructures such as water storage/treatment facilities, communication networks, electric generation facilities, refineries, and more

SMUCSE 8394 Global Positioning System (GPS) Worldwide radio-navigation system formed from a constellation of 24 satellites and their ground stations –Position identified based on triangulation from 3 satellites – Uses 2 carrier frequencies (L1 and L2) –Two types PRCodes (C/A and P) –P could be encrypted  Y code

SMUCSE 8394 GPS Applications Location - determining a basic position Navigation- getting from one location to another Tracking - monitoring the movement of people and things Mapping - creating maps of the world Timing - bringing precise timing to the world

SMUCSE 8394 Communication Infrastructure Requirements –Reliability –Security –Inter-operability New initiatives Usual suspects –Satellite communication –Microwave links –Infrared channels –Fiber-optic links –Wireless

SMUCSE 8394 Starting from the Bottom Sensor Networks

SMUCSE 8394 What Where & When What? –Low cost, low power, multi-functional sensor nodes –Communicates within short distances –Enabled by MEMS, wireless, and digital electronics Where: –Military, health, environmental

SMUCSE 8394 Ad hoc Networks vs. SNs Number of nodes several orders larger Densely deployed More prone to failures Dynamic topology (frequent changes) SNs use broadcasts instead of PP Power, CPU, and memory limitations No global IDS

SMUCSE 8394 Applications Military/BTS –c4ISRT, NBC detection etc. Environmental –Forest fire, bio-complexity analysis, flood detection Health –Tele-monitoring, tracking, drug admin.

SMUCSE 8394 Applications (cont’d) Commercial –Environmental control of office buildings $55 b savings/year, reduction of 35 mmt of carbon emission –Detection of vehicle thefts –Inventory control

SMUCSE 8394 Design Factors Fault tolerance Scalability Cost ~= $1/node –Cheap BT is 10 times more costly Hardware constraints Transmission constraints Power constraints

SMUCSE 8394 Security in Sensor Networks To provide –Confidentiality –Authenticity, integrity –Timeliness – freshness With minimum power consumption –Minimize communication – key exchanges –Private key encryption

SMUCSE 8394 Trust Model Sensor Nodes are not trusted Sink node part of the trusted network Sink node and the sensor nodes share secret Node trusts its own resources –Clock, memory etc.

SMUCSE 8394 SPIN – Two Protocols Secure Network Encryption Protocol (SNEP) –Provides confidentiality, authentication, freshness between endpoints µTESLA - Micro Timed Efficient Stream Loss-tolerant Authentication –Provides broadcast authentication

SMUCSE 8394 Encryption Details SNEP Private key encryption –DES-CBC –Derive subsequent keys from the original shared key using RC5 –Use counter mechanism for freshness µTESLA –Authenticated broadcast –Use of public key too expensive, use modified shared key (delayed disclosure)