Presentation is loading. Please wait.

Presentation is loading. Please wait.

2/9/2006 Opportunistic Networks: The Concept and Research Challenges Leszek Lilien, Zille Huma Kamal and Ajay Gupta In cooperation with: Vijay Bhuse and.

Similar presentations


Presentation on theme: "2/9/2006 Opportunistic Networks: The Concept and Research Challenges Leszek Lilien, Zille Huma Kamal and Ajay Gupta In cooperation with: Vijay Bhuse and."— Presentation transcript:

1 2/9/2006 Opportunistic Networks: The Concept and Research Challenges Leszek Lilien, Zille Huma Kamal and Ajay Gupta In cooperation with: Vijay Bhuse and Zijiang (James) Yang Wireless Sensornet Laboratory (WiSe Lab) Wireless Sensornet Laboratory (WiSe Lab) http://www.cs.wmich.edu/wsn Department of Computer Science Western Michigan University Kalamazoo, MI 49008

2 2/9/2006 Basic Concepts for Opportunistic Networks New paradigm and technology: New paradigm and technology: Opportunistic Networks (Oppnets) Facing the challenge of Pervasive Computing Facing the challenge of Pervasive Computing Advancing leading-edge pervasive computing and networking know-how Advancing leading-edge pervasive computing and networking know-how Applications ranging from EPR to mundane chores, etc. Applications ranging from EPR to mundane chores, etc. 2

3 2/9/2006 Startup: Seed Oppnet 3 Oppnet starts as a seed oppnet Oppnet starts as a seed oppnet Seed oppnet grows into an expanded oppnet Seed oppnet grows into an expanded oppnet Wireless Nodes Link to the World Base Station

4 2/9/2006 Growth: Expanded Oppnet 4 Wireless Nodes Link to the World Base Station Appliance (refrigerator) Satellite Computer Network Microwave Relay Overturned Vehicle with OnStar Cellphone Tower Heterogenous helpers join oppnet Heterogenous helpers join oppnet Add communication, computing, sensing, storage, other resources Add communication, computing, sensing, storage, other resources

5 2/9/2006 Important Concepts in Oppnets Important Concepts in Oppnets Initial seed oppnet actions Initial seed oppnet actions Localize nodes Localize nodes Configure seed oppnet Configure seed oppnet Adapt seed oppnet to environment Adapt seed oppnet to environment Seed oppnet growth Seed oppnet growth Detecting & identifying candidate helpers Detecting & identifying candidate helpers Contacting & inviting selected candidate helpers Contacting & inviting selected candidate helpers Admitting & integrating helpers Admitting & integrating helpers Offloading tasks to helpers Offloading tasks to helpers Determining useful colaborative functionalities Determining useful colaborative functionalities Managing offloaded tasks Managing offloaded tasks 5

6 2/9/2006 Basic Oppnet Categories 2 major oppnet categories: 2 major oppnet categories: Benevolent oppnets Benevolent oppnets Malevolent oppnets Malevolent oppnets Corresponding oppnets scenarios: Corresponding oppnets scenarios: Benevolent oppnet scenario: Benevolent oppnet scenario: “Citizens Called to Arms” Malevolent oppnet scenario: Malevolent oppnet scenario: “Bad Guys Gang Up” 6

7 2/9/2006 Benevolent Oppnet Scenario: “Citizens Called to Arms” (1) Seed oppnet deployed Seed oppnet deployed after an earthquake (unpredictable disaster) Seed is ad hoc wireless network with very powerful nodes Seed is ad hoc wireless network with very powerful nodes More energy, computing and communication resources More energy, computing and communication resources Seed tries to detect candidate helpers Seed tries to detect candidate helpers For help in damage assessment and disaster recovery For help in damage assessment and disaster recovery Uses any available detection method — including: Uses any available detection method — including: Radio-based (including cellphone-based) detection Radio-based (including cellphone-based) detection Searching for nodes using the IP address range for the affected geographic area Searching for nodes using the IP address range for the affected geographic area AI-based visual detection AI-based visual detection E.g., visual detection of an overturned car via surveillance net / recognition of its license plate / finding OnStar connection to it / contacting Body Area Networks on or within bodies of car occupants E.g., visual detection of an overturned car via surveillance net / recognition of its license plate / finding OnStar connection to it / contacting Body Area Networks on or within bodies of car occupants 7 7

8 2/9/2006 Benevolent Oppnet Scenario: “Citizens Called to Arms” (2) Oppnet selects optimal Oppnet selects optimal subset of detected nodes Inviting devices, clusters Inviting devices, clusters & entire networks Helpers for communicating, sensing, computing Helpers for communicating, sensing, computing Using “hidden” capabilities, e.g. for sensing: Using “hidden” capabilities, e.g. for sensing: Desktop can „sense” location of a potential victim at its keyboard Desktop can „sense” location of a potential victim at its keyboard Cellphones can „sense” location (even ones w/o GPS can be triangulated) Cellphones can „sense” location (even ones w/o GPS can be triangulated) Using emergency functionalities Using emergency functionalities Oppnet contacts 2 independent sensornets (SNs): Oppnet contacts 2 independent sensornets (SNs): water infrastructure control SN / public space surveillance SN water infrastructure control SN / public space surveillance SN Ordered to abandon normal functions & help in disaster recovery Ordered to abandon normal functions & help in disaster recovery Water infrastructure SN (with multisensor capabilities, under road surfaces) — to sense vehicular movement and traffic jams Water infrastructure SN (with multisensor capabilities, under road surfaces) — to sense vehicular movement and traffic jams Public space surveillance SN — to search for images of human victims Public space surveillance SN — to search for images of human victims 8 8

9 2/9/2006 9 Malevolent Oppnet Scenario: “Bad Guys Gang Up” (1) 9 Scenario 1 — Terrorists Scenario 1 — Terrorists create apparently harmless weather monito- ring sensornet (SN): SN becomes a seed of a malevolent opportunistic SN SN becomes a seed of a malevolent opportunistic SN SN exploits other nodes from many other networks (w/o revealing its true goals) SN exploits other nodes from many other networks (w/o revealing its true goals) “Critical mass” of the opportunistic SN is reached (in terms of geographical spread and sensing capabilities) “Critical mass” of the opportunistic SN is reached (in terms of geographical spread and sensing capabilities) SN waits for wind patterns that can speed up spread of poisonous chemicals SN waits for wind patterns that can speed up spread of poisonous chemicals Collected data used to decide when to start chemical attack Collected data used to decide when to start chemical attack

10 2/9/2006 10 Malevolent Oppnet Scenario: “Bad Guys Gang Up” (2) Scenario 2 — network at home starts spying on you: Scenario 2 — network at home starts spying on you: Becomes a seed oppnet Becomes a seed oppnet Exploits other devices/nets to collect all info on you: Exploits other devices/nets to collect all info on you: From your fridge (& RFID-equipped food packaging): what/when you eat From your fridge (& RFID-equipped food packaging): what/when you eat From your computer: keylogs your passwords, sensitive data From your computer: keylogs your passwords, sensitive data From your cellphone: who you call & when From your cellphone: who you call & when From your networked camera: what photos you take From your networked camera: what photos you take From your home security surveillance system: your private images From your home security surveillance system: your private images Cyberfly with camera eyes and microphone ears Cyberfly with camera eyes and microphone ears...... Huge privacy problem! / Huge security problem! Huge privacy problem! / Huge security problem! Controls to counteract malevolent oppnets badly needed Controls to counteract malevolent oppnets badly needed

11 2/9/2006 11 This page left blank intentionally.

12 2/9/2006 Section 2: Research Challenges for Basic Oppnets Operations Presented in the order defined by the order of basic oppnet operations Presented in the order defined by the order of basic oppnet operations Security/privacy challenges covered later in Section 3 Security/privacy challenges covered later in Section 3 12

13 2/9/2006 YES NO Collaborative processing Detect candidate helpers (system) GROWTH Integrate helper’s resources Admit candidates into oppnet Work done? Clean up all helpers Release helpers NO YES Command Center Need to grow? YES Deploy seed oppnet NO Enough good candidate s? 13

14 2/9/2006 Challenges in Seed Oppnet Deployment Localization Localization Self-configuration & reconfiguration Self-configuration & reconfiguration Adaptability Adaptability 14

15 2/9/2006 YES NO Collaborative processing Detect candidate helpers (system) GROWTH Integrate helper’s resources Admit candidates into oppnet Work done? Clean up all helpers Release helpers NO YES Command Center Need to grow? YES Deploy seed oppnet NO Enough good candidate s? 15

16 2/9/2006 Challenges in Detecting Helper Systems (1) Develop primitives/methods to detect helpers Develop primitives/methods to detect helpers Over heterogeneous communication media Over heterogeneous communication media Wired/WiFi Wired/WiFi Bluetooth Bluetooth Satellite Satellite Ham radios Ham radios …  ability to integrate diverse technologies 16

17 2/9/2006 Identify and categorize detected candidates Identify and categorize detected candidates E.g., a system detect on Bluetooth: E.g., a system detect on Bluetooth: is it cellphone or laptop? Classify detected candidates Classify detected candidates Based on dependability and usefulness Based on dependability and usefulness Evaluate candidates Evaluate candidates Can given candidate facilitate oppnet operations? Can given candidate facilitate oppnet operations? Challenges in Detecting Helper Systems (2) 17

18 2/9/2006 YES NO Collaborative processing Detect candidate helpers (system) GROWTH Integrate helper’s resources Admit candidates into oppnet Work done? Clean up all helpers Release helpers NO YES Command Center Need to grow? YES Deploy seed oppnet NO Enough good candidate s? 18

19 2/9/2006 Invite & Admit Candidate Helpers Select candidates to invite Select candidates to invite Design primitives/methods to send invitations Design primitives/methods to send invitations Develop methods that enable helper to accept or reject invitation Develop methods that enable helper to accept or reject invitation Candidates are helpers not slaves Candidates are helpers not slaves But in emergency situations could be forced to joined But in emergency situations could be forced to joined Design primitives/methods to admit helper into oppnet Design primitives/methods to admit helper into oppnet Devise primitives/methods to manage expanded oppnet Devise primitives/methods to manage expanded oppnet 19

20 2/9/2006 YES NO Collaborative processing Detect candidate helpers (system) GROWTH Integrate helper’s resources Admit candidates into oppnet Work done? Clean up all helpers Release helpers NO YES Command Center Need to grow? YES Deploy seed oppnet NO Enough good candidate s? 20

21 2/9/2006 Integrate Helper Resources Select goals to be facilittated by helpers Select goals to be facilittated by helpers Determine tasks to be offloaded to helpers Determine tasks to be offloaded to helpers Coordinate all tasks Coordinate all tasks 21

22 2/9/2006 YES NO Collaborative processing Detect candidate helpers (system) GROWTH Integrate helper’s resources Admit candidates into oppnet Work done? Clean up all helpers Release helpers NO YES Command Center Need to grow? YES Deploy seed oppnet NO Enough good candidate s? 22

23 2/9/2006 Collaborative Processing Collaborative tasks : Collaborative tasks : Growth Growth Data collection and querying Data collection and querying Data aggregation / information fusion Data aggregation / information fusion Routing Routing Assuring connectivity Assuring connectivity...... Issues: Issues: Effectiveness Effectiveness In emergencies, effectiveness outweighs efficiency In emergencies, effectiveness outweighs efficiency Ideally, no cost on human life or suffering Ideally, no cost on human life or suffering Efficiency Efficiency Energy conservation Energy conservation Efficient querying Efficient querying Security and privacy Security and privacy … 23

24 2/9/2006 YES NO Collaborative processing Detect candidate helpers (system) GROWTH Integrate helper’s resources Admit candidates into oppnet Work done? Clean up all helpers Release helpers NO YES Command Center Need to grow? YES Deploy seed oppnet NO Enough good candidate s? 24

25 2/9/2006 Clean Up and Release Helpers Oppnet restores “original state” of helpers Oppnet restores “original state” of helpers As close as possible to their state just before they joined As close as possible to their state just before they joined Imperative to minimize intrusiveness of helper Imperative to minimize intrusiveness of helper Oppnet releases helpers from “duty” Oppnet releases helpers from “duty” 25

26 2/9/2006 YES NO Collaborative processing Detect candidate helpers (system) GROWTH Integrate helper’s resources Admit candidates into oppnet Work done? Clean up all helpers Release helpers NO YES Command Center Need to grow? YES Deploy seed oppnet NO Enough good candidate s? 26

27 2/9/2006 Command Center (CC) CC capable of interactive (human intervention) or autonomous actions CC capable of interactive (human intervention) or autonomous actions CC tasks include: CC tasks include: Determine/modify goals Determine/modify goals Activate actuators/sensors Activate actuators/sensors Manage oppnet Manage oppnet Decide when/how to grow Decide when/how to grow Optimize resources Optimize resources...... Facilitate human input for interactive heuristics Facilitate human input for interactive heuristics Determine critical mass of seed oppnet & expanded oppnet Determine critical mass of seed oppnet & expanded oppnet Optimize oppnet configuration Optimize oppnet configuration...... CC assures realization of oppnet goals CC assures realization of oppnet goals 27

28 2/9/2006 Related Research Oppnets viewed as a superset of MANET Oppnets viewed as a superset of MANET (MANET = Mobile Ad hoc NETwork) => Challenges inherent to MANET carried over to oppnets Localization, data integration & aggregation Localization, data integration & aggregation Growth in P2P systems Growth in P2P systems Searching for peers in unstructured systems Searching for peers in unstructured systems Grid Systems Grid Systems Integrating and managing heterogeneous systems Integrating and managing heterogeneous systems Trojan Horses Trojan Horses Mimic their spread capabilities in search for helpers Mimic their spread capabilities in search for helpers Others Others CenWits CenWits 28

29 2/9/2006 29 This page left blank intentionally.

30 2/9/2006 Section 3: Research Challenges for Security and Privacy in Oppnets (1) Prevent malicious helpers from joining Prevent malicious helpers from joining Common attacks Common attacks MITM MITM Packet dropping Packet dropping DoS attack on weak devices DoS attack on weak devices ID spoofing ID spoofing...... Finding “good” cryptographic primitives Finding “good” cryptographic primitives 30

31 2/9/2006 Increasing trust Increasing trust Routing through more trusted systems Routing through more trusted systems Shared secrets for each communicating pair Shared secrets for each communicating pair Using shared secrets with broadcast authentication Using shared secrets with broadcast authentication Using digital signatures Using digital signatures Assuring privacy Assuring privacy Privacy of communications and data storage Privacy of communications and data storage Communication patterns Communication patterns Broadcast/multicast from the base station Broadcast/multicast from the base station Messages among nodes & from nodes to the base station Messages among nodes & from nodes to the base station 31 Research Challenges for Security and Privacy in Oppnets (2)

32 2/9/2006 Intrusion detection Intrusion detection Why? Why? When prevention fails When prevention fails Lack of initial authentication mechanism Lack of initial authentication mechanism Issues in intrusion detection Issues in intrusion detection Securely distributing information about malicious entities Securely distributing information about malicious entities Heterogeneous – real-time intrusion detection and response Heterogeneous – real-time intrusion detection and response 32 Research Challenges for Security and Privacy in Oppnets (3)

33 2/9/2006 33 This page left blank intentionally.

34 2/9/2006 Section 4a: Conclusions High-payoff potential for the oppnet Initiative High-payoff potential for the oppnet Initiative Reduction of human suffering & loss of life Reduction of human suffering & loss of life Economic benefits Economic benefits Technological, educational & research benefits Technological, educational & research benefits 34

35 2/9/2006 Impact of Oppnets on the Society Impact on Emergency Preparadness and Response operations in Homeland Security (HS) — current app focus Impact on Emergency Preparadness and Response operations in Homeland Security (HS) — current app focus Tremendous leveraging potential in emergencies Tremendous leveraging potential in emergencies A wealth of freely available resources A wealth of freely available resources Reduction of human suffering & loss of life Reduction of human suffering & loss of life Increasing safety & efficiency of the first responders Increasing safety & efficiency of the first responders Impact on other applications in HS and outside HS Impact on other applications in HS and outside HS Economic impact Economic impact Technology transfer & commercialization Technology transfer & commercialization Benefits for the computer industry Benefits for the computer industry Production of software / networking equipment Production of software / networking equipment Benefits for other industries Benefits for other industries Enhancing many products with standard oppnet interfaces Enhancing many products with standard oppnet interfaces E.g.: cars with oppnet-capable nodes — auto industry benefits E.g.: cars with oppnet-capable nodes — auto industry benefits 35

36 2/9/2006 Advancing the network know-how Advancing the network know-how By development of the oppnet technology By development of the oppnet technology Enhancing distributed applications served by „regular” networks Enhancing distributed applications served by „regular” networks Enabling new application niches we can not even foresee Enabling new application niches we can not even foresee Advancing other critical areas of computer technology Advancing other critical areas of computer technology Including wireless systems, sensornets, ad hoc systems & pervasive computing Including wireless systems, sensornets, ad hoc systems & pervasive computing A side effect of oppnet developments A side effect of oppnet developments Technology impacts speeded up & enhanced by the planned technology transfer plus commercialization activities Technology impacts speeded up & enhanced by the planned technology transfer plus commercialization activities 36 Impact of Oppnets on Technology

37 2/9/2006 Impact on students Impact on students For project participants: hands-on B.S./M.S./Ph.D training For project participants: hands-on B.S./M.S./Ph.D training For others: course enhancements / course projects / seminars For others: course enhancements / course projects / seminars Oppnet prototype used for lab experiments Oppnet prototype used for lab experiments Dissemination of research results Dissemination of research results Publications, presentations, seminars, poster sessions, web site Publications, presentations, seminars, poster sessions, web site Public availability of the oppnet prototype, tools & data Public availability of the oppnet prototype, tools & data Outreach activities Outreach activities Including K-12 demos for underrepresented minorities Including K-12 demos for underrepresented minorities All activities will broaden the America’s talent pool in critical technologies and applications All activities will broaden the America’s talent pool in critical technologies and applications Training more minority & female students at all levels Training more minority & female students at all levels 37 Impact of Oppnets on Education & Research

38 2/9/2006 Section 4b: Future Work Building a prototype Building a prototype To demonstrate technical prowess & economic benefits To demonstrate technical prowess & economic benefits Technology transfer & commercialization Technology transfer & commercialization Discussed above Discussed above 38

39 2/9/2006 Future Work: EPR Oppnet Initiative — Milestones Future Work: EPR Oppnet Initiative — Milestones Building state-of-the-art lab facilities Building state-of-the-art lab facilities Constructing an oppnet prototype in the lab Constructing an oppnet prototype in the lab Developing performance analysis tools to support testing & fine-tuning activities Developing performance analysis tools to support testing & fine-tuning activities Extending the prototype to include living- laboratory resources available in our sensor- & computer-rich building Extending the prototype to include living- laboratory resources available in our sensor- & computer-rich building Testing the prototype within the living laboratory Testing the prototype within the living laboratory For fine-tuning design & implementation For fine-tuning design & implementation Obtaining external assessment of the prototype Obtaining external assessment of the prototype From computer & homeland security labs in MI, IN, IL From computer & homeland security labs in MI, IN, IL 39

40 2/9/2006 WiSe Lab Publications on Sensornets, Oppnets & Pervasive Computing 1.L. Lilien and A. Gupta, ” Opportunistic Networks for Emergency Preparadness and Response” (submitted for publication). 2.V. Bhuse, A. Gupta, and L. Lilien, "Research challenges in lightweight intrusion detection for sensornets" (submitted for publication). 3.L. Lilien and B. Bhargava, ”A Scheme for Privacy-preserving Data Dissemination,” IEEE Transactions on Systems, Man and Cybernetics (to appear). 4.L. Lilien, Z. Kamal, V. Bhuse and A. Gupta, "Opportunistic Networks: The Concept and Research Challenges,” International Workshop on Research Challenges in Security and Privacy for Mobile and Wireless Networks (WSPWN 2006), Miami, Florida, March 2006 (to appear). 5.T. Canli, M. Terwilliger, A. Gupta and A. Khokhar, "Power Efficient Algorithms for Computing Fast Fourier Transform over Wireless Sensor Networks," The Fourth ACS/IEEE Conference on Computer Systems and Applications, Dubai, UAE, March 2006. 6.V. Bhuse, A. Gupta and L. Lilien, "DPDSN: Detection of packet-dropping attacks for wireless sensor networks," Proceedings of the 4th International Trusted Internet Workshop (TIW), International Conference on High Performance Computing, Goa, India, December 2005. 7.A. Gupta and V. Bhuse, "Anamoly Intrusion Detection in Wireless Sensor Networks," Journal of High Speed Networks, vol. 15, issue 1, January- March 2006. 8.M. Terwilliger, A. Gupta, A. Khokhar and G. Greenwood, "Localization using Evolution Strategies in Sensornets," Proceedings of the IEEE Congress on Evolutionary Computation, Edinburgh, UK, September 2005. 9.V. Bhuse, A. Gupta, M. Terwilliger, Z. Yang and Z. Kamal, "Using Routing Data for Information Authentication in Sensor Networks," Proceedings of the 3rd International Trusted Internet Workshop (TIW), International Conference on High Performance Computing, Bangalore, India, December 2004. 10.T. Canli, M. Terwilliger, A. Gupta and A. Khokhar, "Power-Time Efficient Algorithm for Computing FFT in Sensor Networks," (Extended Abstract). Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys), Baltimore, Maryland, November 2004. 11.B. Bhargava, L. Lilien, A. Rosenthal, and M. Winslett, “PervasiveTrust,” IEEE Intelligent Systems, vol. 19(5), Sep./Oct.2004, pp. 74-77. 12.B. Bhargava and L. Lilien, “Private and Trusted Collaborations,” Proc. Secure Knowledge Management (SKM 2004): A Workshop, Amherst, NY, Sep. 2004. 13.M. Jenamani, L. Lilien, and B. Bhargava, “Anonymizing Web Services Through a Club Mechanism with Economic Incentives,” Proc. International Conference on Web Services (ICWS 2004), San Diego, California, July 2004, pp. 792-795. 14.Z. Kamal, M. Salahuddin, A. Gupta, M. Terwilliger, V. Bhuse and B. Beckmann, "Analytical Analysis of Data and Decision Fusion in Sensor Networks," The 2004 International Conference on Embedded Systems and Applications. Las Vegas, June 2004. 15.M. Terwilliger, A. Gupta, V. Bhuse, Z. Kamal, and M. Salahuddin, "A Localization System Using Wireless Sensor Networks: A Comparison of Two Techniques," Proceedings of the 2004 Workshop on Positioning, Navigation and Communication, Hanover, Germany, March 2004, pp. 95-100. 16.V. Bhuse, A. Gupta and R. Pidva, "A Distributed Approach to Security in Sensornets," The 58th IEEE Semiannual Vehicular Technology Conference, Orlando, Florida, USA, October 2003. 17.L. Lilien, “Developing Pervasive Trust Paradigm for Authentication and Authorization,” Proc. Third Cracow Grid Workshop (CGW’03), Kraków (Cracow), Poland, October 2003, pp. 42-49 (invited paper). 40

41 2/9/2006 WiSe Lab Experience in Sensornets – Selected Projects Since 1/03  Designing of WiSe Security Protocols: DSPS  Location Tracker Using Motes (*)  RHS: Remote Home Surveillance (*)  Directed Diffusion: Attacks & Countermeasures  Improving the Accuracy of Mote Measurements by Using Neural Networks  SOMS: Smart Occupancy Monitoring System Using Motes (*)  Comparative Study of Network Simulators  Collaborative Image Processing (*)  DENSe: a Development Environment for Networked Sensors  Incorporating Mobile-ware in Distributed Computations / Grids (*)  Extending the ns-2 Simulator to Satellite and WCN Simulations  Smart Antennas for WCNs  Energy Efficient MAC Protocols for IEEE 802.11x  A Wireless Security Testing System (*)  Mobile and Self-Calibrating Irrigation System  Collective Communications for Sensornets (*) * Results directly useful for oppnets * Results directly useful for oppnets 41

42 2/9/2006 Sensor Node Sen- sors CPU Radio Battery Event detectionWireless communication 42  Node implementation (MICA-2) Neighboring Nodes  Node Structure

43 2/9/2006 Thank you very much for your time and attention! 43

44 2/9/2006 44

45 2/9/2006 45

46 2/9/2006 Sensor Node Sen- sors CPU Radio Battery Event detectionWireless communication 46  Node implementation (MICA-2) Neighboring Nodes  Node Structure

47 2/9/2006 Startup: Seed Oppnet 47 Oppnet starts as a seed oppnet Oppnet starts as a seed oppnet Seed oppnet grows into an expanded oppnet Seed oppnet grows into an expanded oppnet Wireless Nodes Link to the World Base Station

48 2/9/2006 Growth: Expanded Oppnet 48 Wireless Nodes Link to the World Base Station Appliance (refrigerator) Cellphone Tower Satellite Computer Network Microwave Relay Overturned Vehicle with OnStar Heterogenous helpers join oppnet Heterogenous helpers join oppnet Add communication, computing, sensing, other resources Add communication, computing, sensing, other resources

49 2/9/2006 Fig - Expanded Oppnet (size : 50%) 49 Best version above; worse, older version below:

50 2/9/2006 >>FIX OR SKIP: >FIX OR SKIP:<< Integrate Helper Resources Select goals to be facilittated by helpers Select goals to be facilittated by helpers Determine tasks to be offloaded to helpers Determine tasks to be offloaded to helpers Coordinate all tasks Coordinate all tasks ADD SOME MORE POINTS ADD SOME MORE POINTS ANOTHER POINT ANOTHER POINT ONE MORE POINT ONE MORE POINT … 50


Download ppt "2/9/2006 Opportunistic Networks: The Concept and Research Challenges Leszek Lilien, Zille Huma Kamal and Ajay Gupta In cooperation with: Vijay Bhuse and."

Similar presentations


Ads by Google