Date post: | 30-Dec-2015 |
Category: |
Documents |
Upload: | scot-harrison |
View: | 213 times |
Download: | 0 times |
Presented at the International Workshop on Research Challenges in Security and Privacy for Mobile and Wireless Networks (WSPWN 2006), Miami, Florida,
March 15-16, 2006
CS 6910: Advanced Computer and Information SecurityCS 6910: Advanced Computer and Information SecurityLecture 2bLecture 2b
Opportunistic Opportunistic Networks:Networks:The Concept and Research The Concept and Research
Challenges Challenges in Privacy and Securityin Privacy and Security
Leszek Lilien, Zille Huma KamalLeszek Lilien, Zille Huma Kamal, Vijay Bhuse, Vijay Bhuse and Ajay Gupta and Ajay Gupta
WiSe (WiWiSe (Wireless Sensornetreless Sensornets) s) Lab Labhttp://www.cs.wmich.edu/wsn
Department of Computer ScienceDepartment of Computer ScienceWestern Michigan UniversityWestern Michigan University
Kalamazoo, MI 49008Kalamazoo, MI 49008
March 15-16, 2006
> CS 6910: Go to Slide 15 <> CS 6910: Go to Slide 15 <
Basic Concepts for Opportunistic NetworksBasic Concepts for Opportunistic Networks
New paradigm and technology:New paradigm and technology:opportunistic networks opportunistic networks oror oppnets oppnets
IInnovativennovative Facing Facing thethe challenge ofchallenge of pervasivepervasive ccomputingomputing AdvancingAdvancing leading-edge leading-edge pervasive computing and networking pervasive computing and networking
know-howknow-how
Oppnet deployed as a Oppnet deployed as a seed oppnetseed oppnet Localizes its nodesLocalizes its nodes Configures itselfConfigures itself Adapts to environmentAdapts to environment 2
March 15-16, 2006
Startup: Seed OppnetStartup: Seed Oppnet
3
Oppnet starts as a Oppnet starts as a seedseed oppnetoppnet
Seed oppnet grows into an Seed oppnet grows into an expandedexpanded oppnetoppnet
Seed Nodes
Link tothe World
Controller (distributed)
March 15-16, 2006
Growth: Expanded OppnetGrowth: Expanded Oppnet
4
HeterogenousHeterogenous helpers helpers join oppnet join oppnet Add communication, computing, sensing, storage, other resourcesAdd communication, computing, sensing, storage, other resources
Seed Nodes
Link tothe World
Controller (distributed)
Appliance(refrigerator)
Computer Network
Micro-waveRelay
Overturned
Vehiclewith OnStar
Cellphone
Tower
Satellite
March 15-16, 2006
Oppnet Growth ActivitiesOppnet Growth Activities
Detecting & identifying Detecting & identifying candidate helperscandidate helpers
Contacting & inviting selected candidatesContacting & inviting selected candidates
Admitting & integrating Admitting & integrating helpers helpers that join that join oppnetoppnet
Offloading tasks to helpersOffloading tasks to helpers Determining useful colaborative functionalitiesDetermining useful colaborative functionalities Managing offloaded tasksManaging offloaded tasks
Clean up and release each helper when no longer needed
5
March 15-16, 2006
Basic Oppnet CategoriesBasic Oppnet Categories
2 major oppnet 2 major oppnet categoriescategories:: BenevolentBenevolent oppnets oppnets MalevolentMalevolent oppnets oppnets
Corresponding oppnets Corresponding oppnets scenariosscenarios:: BenevolentBenevolent oppnet scenario: oppnet scenario:
„„Citizens Called to Arms”Citizens Called to Arms”
MalevolentMalevolent oppnet scenario: oppnet scenario:
„ „Bad Guys Gang Up”Bad Guys Gang Up”
6
March 15-16, 2006
BenevolentBenevolent OppnetOppnetScenario: „Citizens Scenario: „Citizens Called to Arms” (1)Called to Arms” (1) SeedSeed oppnet oppnet deployeddeployed
afterafter an an earthquakeearthquake (un-(un-predictable emergency)predictable emergency) Seed is aSeed is ad hocd hoc wireless wireless netnetworkwork with with very very
powerful nodespowerful nodes MMore energy, computing and communication resourcesore energy, computing and communication resources
SSeed tries to eed tries to detect detect candidate helperscandidate helpers For For help in damage assessment and disaster help in damage assessment and disaster
recoveryrecovery UUses any available detection methodses any available detection method — including: — including:
Celphone- Celphone- oror radio radio-based detection-based detection SSearching for nodes using the earching for nodes using the IP addressIP address range for the range for the
affected geographic areaaffected geographic area AI-based AI-based visualvisual detection detection (next)(next) 7
7
March 15-16, 2006
BenevolentBenevolent OppnetOppnetScenario: „Citizens Scenario: „Citizens Called to Arms” (2)Called to Arms” (2)
Example:Example: Helper 1 monitoring a surveillance net detects Helper 1 monitoring a surveillance net detects
an overturned caran overturned car Helper 2 asked to recognize its license plateHelper 2 asked to recognize its license plate Helper 3 finds that the cars has Helper 3 finds that the cars has OnStarOnStar linklink Helper 4Helper 4 contactscontacts BANs BANs (Body Area Network)(Body Area Network) on or on or
within bodies of car occupants via OnStar within bodies of car occupants via OnStar infrastructureinfrastructure
Helper 5 evaluates obtained info and dispatches Helper 5 evaluates obtained info and dispatches rescuersrescuers
8
8
March 15-16, 2006
BenevolentBenevolent OppnetOppnetScenario: Scenario: „Citizens Called to „Citizens Called to Arms” (3)Arms” (3)
Oppnet selects Oppnet selects optimaloptimal subset of detectedsubset of detected nodes nodes Inviting Inviting devices, clustersdevices, clusters & & entire net entire networkworkss Helpers forHelpers for communicating communicating, , sensingsensing, , computingcomputing
Using Using „hidden” capabilities„hidden” capabilities, e.g. for sensing:, e.g. for sensing: Desktop can Desktop can „sense” presence„sense” presence of a potential of a potential
victim at its keyboardvictim at its keyboard CCellphones ellphones can can „sense” location„sense” location
Even ones w/o GPS can be triangulatedEven ones w/o GPS can be triangulated
9
9
March 15-16, 2006
Using „hidden”Using „hidden”emergency functionalitiesemergency functionalities Oppnet Oppnet contactcontacts 2 s 2 independent sensornetsindependent sensornets
(SNs):(SNs):
water infrastructure controlwater infrastructure control SN / SN / public space surveillancepublic space surveillance SN SN
SNsSNs ordered ordered to abandon normal functionsto abandon normal functions & & help inhelp in rescue & recovery operationsrescue & recovery operations WWater infrastructure ater infrastructure SNSN ((with multisensor with multisensor
capabilitiescapabilities, , under road surfaces)under road surfaces) — — ordered ordered to to sense vehicular movement and traffic jamssense vehicular movement and traffic jams
PPublic space surveillance ublic space surveillance SNSN — — ordered ordered to to search for images of human victimssearch for images of human victims
10
10
Benevolent Benevolent OppnetOppnetScenario: Scenario: „Citizens Called to „Citizens Called to Arms” (4)Arms” (4)
March 15-16, 2006
11
MalevolentMalevolent OppnetOppnetScenario: „Bad Guys Scenario: „Bad Guys Gang Up” (1)Gang Up” (1)
11
Scenario 1 — TerroristsScenario 1 — Terroristscreatecreate apparentlyapparently harmless harmless weather weather monito-monito-ring ring sensornetsensornet (SN): (SN): SNSN becomes a seed of a becomes a seed of a malevolentmalevolent
opportunistic opportunistic SNSN SN exploitsSN exploits other nodes from many other other nodes from many other
networksnetworks (w/o revealing its true goals)(w/o revealing its true goals) ““CCritical mass” ritical mass” of the of the opportunistic opportunistic SNSN is reached is reached ((in in
terms of geographical spread and terms of geographical spread and sensing sensing capabilitiescapabilities))
SN SN waits for waits for wind patterns that can wind patterns that can speed upspeed up spread of poisonous chemicalsspread of poisonous chemicals CCollected data used to deciollected data used to decide when to de when to start chemicalstart chemical
attackattack
March 15-16, 2006
12
MalevolentMalevolent Oppnet Scenario:Oppnet Scenario:„Bad Guys Gang Up” (2)„Bad Guys Gang Up” (2)
Scenario 2 — network at home starts spying on you:Scenario 2 — network at home starts spying on you: Becomes a seed oppnetBecomes a seed oppnet Exploits other devices/nets to collect all info on you:Exploits other devices/nets to collect all info on you:
From your From your fridgefridge (& RFID-equipped food packaging)(& RFID-equipped food packaging): : what/when you eatwhat/when you eat
From your From your computercomputer: keylogs your passwords, sensitive : keylogs your passwords, sensitive datadata
From your From your cellphonecellphone: who you call & when: who you call & when From your networked From your networked cameracamera: what photos you take: what photos you take From your home From your home security surveillancesecurity surveillance system: your system: your
private imagesprivate images CyberflyCyberfly with camera eyes and microphone ears with camera eyes and microphone ears ......
HugeHuge privacy problem! privacy problem! / Huge/ Huge security problem! security problem! ControlsControls to counteract malevolent oppnets to counteract malevolent oppnets badly badly
neededneeded
March 15-16, 2006
RelatedRelated ResearchResearch InteroperabilityInteroperability
Among wireless networks: WANs, MANs, LANs, PANs Among wireless networks: WANs, MANs, LANs, PANs (personal)(personal)
MMuch less research on interoperability between wired uch less research on interoperability between wired && wireless wireless netsnets
Ambient networks Ambient networks (big European Union project, next-generation (big European Union project, next-generation Internet—for 2015/2020, smaller networks able to compose Internet—for 2015/2020, smaller networks able to compose themselves into bigger ones)themselves into bigger ones)
Growth in Growth in P2PP2P ssystems ystems SSearching for peers in unstructured systemsearching for peers in unstructured systems
GridGrid Systems Systems Integrating and managing heterogeneous systemsIntegrating and managing heterogeneous systems
Trojan HorsesTrojan Horses MimicMimic their spread capabilities their spread capabilities in search for helpers in search for helpers
OtherOther13
March 15-16, 2006
Research Challenges in Basic Research Challenges in Basic OperationsOperations
BypassedBypassed in this presentation in this presentation Include:Include:
Challenges inChallenges in Seed Oppnet Deployment Seed Oppnet Deployment E.g., lE.g., localizationocalization, s, self-configelf-configuration, adatptabilityuration, adatptability
Challenges inChallenges in DetectDetectinging Helper SystemsHelper Systems E.g., E.g., primitivesprimitives to detect to detect candidates, icandidates, identify and categorize dentify and categorize
them, evaluate and cthem, evaluate and classify lassify them (e.g., bthem (e.g., based on dependability ased on dependability and usefulnessand usefulness))
Challenges inChallenges in InvitInvitinging & Admit & Admittingting Candidate Candidate HelperHelperss
E.g., selectE.g., select candidates to invite candidates to invite, d, develop evelop protocols for protocols for candidates candidates to accept or reject invitationto accept or reject invitation, d, devise primitivesevise primitives /methods to manage expanded oppnet/methods to manage expanded oppnet
Etc., etc. forEtc., etc. for remaining operations remaining operations
14
March 15-16, 2006
> CS 6910: Start here <> CS 6910: Start here <
Research Challenges inResearch Challenges in Security and Security and PrivacyPrivacy
1) Major p1) Major prrivacy challengesivacy challenges in oppnets in oppnets
2) Security2) Security challengeschallenges in oppnets in oppnets With secondary privacy challengesWith secondary privacy challenges
15
March 15-16, 2006
Major Privacy Challenges Major Privacy Challenges (1)(1)
PrPrivacy challengesivacy challenges in oppnets in oppnets Oppnets are and use pervasive systemsOppnets are and use pervasive systems
Must face all privacy challenges inherent to pervasive Must face all privacy challenges inherent to pervasive computingcomputing
„„Make it or break it” issue for oppnets Make it or break it” issue for oppnets (and perv. comp)(and perv. comp)
Major pMajor privacy rivacy goalsgoals Assure privacy of Assure privacy of communicationcommunicationss and and data storagedata storage Protect Protect helperhelper resources from the host oppnet resources from the host oppnet Protect Protect oppnetoppnet from its helpers from its helpers Protect Protect environmentenvironment from privacy violations by from privacy violations by
oppnetoppnet Also from malevolent oppnetsAlso from malevolent oppnets
16
March 15-16, 2006
Major Privacy Challenges Major Privacy Challenges (2)(2) Classes of Classes of solutionssolutions to achieve the privacy goals to achieve the privacy goals
Provide Provide protected private areasprotected private areas within seed nodes/helpers within seed nodes/helpers AnonymizeAnonymize or or pseudonimizepseudonimize entities within oppnet range entities within oppnet range Detect and neutralize malevolent oppnetsDetect and neutralize malevolent oppnets Detect and neutralize exploiting oppnets for privacy Detect and neutralize exploiting oppnets for privacy
violationsviolations
Special solutionsSpecial solutions for emergency oppnet applications for emergency oppnet applications Strict Strict privacy protection relaxedprivacy protection relaxed in life-or-death situations in life-or-death situations
Must follow law and ethicsMust follow law and ethics Basic assumptionsBasic assumptions::
EEntity giventity givess up only as much privacy as indispensable for up only as much privacy as indispensable for becoming a helperbecoming a helper
EEntity’s privacy disclosure ntity’s privacy disclosure isis proportional t proportional to:o: BBenefits for the entityenefits for the entity, , or or AA broader common good broader common good
17
March 15-16, 2006
Security Challenges Security Challenges (1)(1) SourcesSources of security challenges of security challenges
Dependable aDependable authentication cannotuthentication cannot be performed be performed when when helpershelpers join join oppnetoppnet
NNot possible to ot possible to guaranteeguarantee that malicious devices will not that malicious devices will not joinjoin
Can detect notorius behavior after entity becomes Can detect notorius behavior after entity becomes a helpera helper
If available, reputation can be used beforehandIf available, reputation can be used beforehand Delivering secret keys securely to all Delivering secret keys securely to all and only and only non-non-
malicious devices is very difficultmalicious devices is very difficult RRelying alone on cryptoelying alone on crypto authentication mechanisms authentication mechanisms (e.g., (e.g.,
Kerberos)Kerberos) not sufficient not sufficient
=>=> security challengessecurity challenges in oppnetsin oppnets are are biggerbigger Incl. Incl. MITM, packet dropping, ID spoofing MITM, packet dropping, ID spoofing
(masquerading), DoS(masquerading), DoS18
March 15-16, 2006
The major security (and privacy) The major security (and privacy) challengeschallenges:: Secure routing via iSecure routing via increasing trustncreasing trust
Routing through more trusted systemsRouting through more trusted systems SharedShared secrets secrets forfor each each communicating communicating pair pair Using shared secrets with broadcast authentication Using shared secrets with broadcast authentication Using digital signatureUsing digital signaturess ……
Helper privacy and oppnet privacyHelper privacy and oppnet privacy via intrusion via intrusion detection detection (also above)(also above)
Protecting data privacyProtecting data privacy and data and data integrityintegrity Identifying Identifying and preventing and preventing most dangerous most dangerous
attacksattacks Intrusion detection Intrusion detection
All discussed nextAll discussed next 19
Security Challenges (2)Security Challenges (2)
March 15-16, 2006
Secure routing via iSecure routing via increasncreased ed trusttrust Maintain Maintain list list of “more trusted”of “more trusted” entitiesentities and and list of „less list of „less
trusted”trusted” entities entities Secure routing can use both listsSecure routing can use both lists
Secure Secure wireless ad hoc wireless ad hoc routing protocol routing protocol most most relevantrelevant for opnets: for opnets: AriadneAriadne [Hu[Hu, , PePerrig, and Johnson, rrig, and Johnson, 202002]02] OOn-demand protocoln-demand protocol WWorks in the presence of compromised nodesorks in the presence of compromised nodes UUses symmetric cryptographyses symmetric cryptography AAuthenticates routing messagesuthenticates routing messages
SStill, till, cannot use directlycannot use directly MoreMore heterogeneous heterogeneous (esp. w.r.t. (esp. w.r.t. wired wired//wireless transmission wireless transmission
media)media)
Can look for Can look for less energy-efficientless energy-efficient oppnet oppnet solutionssolutions CCan rely on growth to amass needed resources (even with a an rely on growth to amass needed resources (even with a
big safety margin)big safety margin)20
SSecure ecure RRoutingouting via Increased Trust via Increased Trust
March 15-16, 2006
Protect privacy Protect privacy via detecting intrusionsvia detecting intrusions, , illegal resource accessesillegal resource accesses
Helper privacyHelper privacy supported via:supported via: Access control (authentication and Access control (authentication and
authorization)authorization) Intrusion detectionIntrusion detection
2nd line of privacy defense2nd line of privacy defense Meant to work by scaring away attackersMeant to work by scaring away attackers
More difficult than in many other netsMore difficult than in many other nets Bec. of heterogeneity, spontaneous growthBec. of heterogeneity, spontaneous growth
Oppnet privacyOppnet privacy supported via: supported via: Intrusion detectionIntrusion detection
Catches helpers that become attackersCatches helpers that become attackers
21
Helper Helper PPrivacy and rivacy and OOppnet ppnet PPrivacyrivacyvia Intrusion Detectionvia Intrusion Detection
March 15-16, 2006
Data privacy Data privacy challengeschallenges CCapture of even a single apture of even a single oppnet entityoppnet entity (especially (especially
in crisis when providing physical protection is even more in crisis when providing physical protection is even more difficult)difficult) cripples cripples whole symmetric key whole symmetric key cryptography scheme cryptography scheme
Attacker masquerading as controller Attacker masquerading as controller (or cluster (or cluster
head)head) can distribute its own crypto keys can distribute its own crypto keys
Data integrity Data integrity challengeschallenges Digital signatures are expensive Digital signatures are expensive
computationally for lightweight devices computationally for lightweight devices (cellphone, PDA, etc.)(cellphone, PDA, etc.)
Packet format convesrsions can be attackedPacket format convesrsions can be attacked Heterogeneous entities/media fragment/aggregate Heterogeneous entities/media fragment/aggregate
packetspackets 22
Protecting Protecting DData ata PPrivacyrivacy and Data and Data IntegrityIntegrity
March 15-16, 2006
MITMMITM: : e.g.,e.g., malicious device malicious device becomes a MITM on the becomes a MITM on the communication line between a victim and first communication line between a victim and first respondersresponders Solution: Solution: Use mutliple, heterogenous routes between victim Use mutliple, heterogenous routes between victim
and the center forredundant messageand the center forredundant message
Packet droppingPacket dropping: : e.g., e.g., malicious device dropmalicious device dropss some some packets between packets between a victima victim and the and the centercenter Solution: Solution: As above As above (will(will work if no adversary on at work if no adversary on at ≥ ≥ one one
route)route)
DoS attacksDoS attacks: : e.g., flooding emergency center with e.g., flooding emergency center with ffalse requests for helpalse requests for help SolutionSolution: L: Limit number of requests any device can generate.imit number of requests any device can generate.
„Call back” „Call back” the the victimvictim to confirm to confirm herher emergency request. emergency request.
OtherOther: : DoS attacks on weak linksDoS attacks on weak links,, ID spoofing ID spoofing, ..., ... 23
Identifying Identifying and Preventing Mand Preventing MostostDDangerous angerous AAttacksttacks - - Examples Examples
March 15-16, 2006
MotivationMotivation – Why needed? – Why needed?
When prevention failsWhen prevention fails Lack of initial authentication mechanismLack of initial authentication mechanism
ChallengesChallenges:: Securely distributing informationSecurely distributing information about about
malicious entities in the presence of malicious entities in the presence of other other (unknown) (unknown) malicious entitiesmalicious entities
AAvoiding voiding maliciousmalicious entities while maintaining entities while maintaining connectivityconnectivity
Real-time Real-time iintrusion detectionntrusion detection and response and response more more difficultdifficult than in other networks than in other networks typestypes Bec. Bec. highly heterogeneoushighly heterogeneous 24
Intrusion Intrusion DDetectionetection (1) (1)
March 15-16, 2006
Possible intrusion detection approach: Possible intrusion detection approach: [Zamboni, 2001][Zamboni, 2001]
Internal „Internal „software sensorssoftware sensors” used as embedded ” used as embedded detectorsdetectors
IIntrusion detection performntrusion detection performed by aed by autonomous utonomous agents using agents using embedded detectorsembedded detectors
BenefitsBenefits of e of embedded detectorsmbedded detectors:: MMore resistant to tampering or disabling, because ore resistant to tampering or disabling, because
they are a part of the program they monitor. they are a part of the program they monitor. VVery low CPU overheadery low CPU overhead ( (not executing continuouslynot executing continuously)) PPerform direct monitoring have access to the erform direct monitoring have access to the
internal data of programs they monitorinternal data of programs they monitor)) Detection dDetection data ata is safer—is safer—does not travel through an does not travel through an
external path external path (a log file, for example)(a log file, for example) between its between its generation and its usegeneration and its use
25
Intrusion Intrusion DDetectionetection (2) (2)
March 15-16, 2006
ConclusionsConclusions
Oppnets are a Oppnets are a new wide category of networksnew wide category of networks Leverage resources Leverage resources they can detect in the vicinitythey can detect in the vicinity
SSensing ensing / / monitoringmonitoring / / computingcomputing / / communication communication / etc. / etc. resourcesresources
Particularly well suited to Particularly well suited to emergency operationsemergency operations Starts with a buildup of communications infrastructureStarts with a buildup of communications infrastructure Applicable for Applicable for non-emergency non-emergency situations as well situations as well
High-payoff High-payoff potentialpotential for this paradigm/technology for this paradigm/technology RReduction of human suffering & loss of lifeeduction of human suffering & loss of life EEconomic conomic benefitsbenefits Technological, educational & research benefitsTechnological, educational & research benefits
26
March 15-16, 2006
Future WorkFuture Work
IInvestigatinvestigating ng oppnetoppnet fundamentalfundamentalss
DDesigning oppnet esigning oppnet architecturearchitecture With itsWith its associated components associated components
MMethods, protocols, and algorithmsethods, protocols, and algorithms
Building a Building a prototypeprototype For sFor stimulation and timulation and feedbackfeedback
NNecessary for fine-tuning ecessary for fine-tuning oppnet designoppnet design Proof of conceptProof of concept: : technical prowess & economic technical prowess & economic
benefitsbenefits
27
March 15-16, 2006
Thank you very muchThank you very muchfor your time and attention!for your time and attention!
28
March 15-16, 2006
Selected WiSe Lab Publications onSelected WiSe Lab Publications onSensornets, Oppnets & Pervasive ComputingSensornets, Oppnets & Pervasive Computing
* Directly related to oppnets* Directly related to oppnets
1.1. L. Lilien and A. Gupta, ” Opportunistic Networks L. Lilien and A. Gupta, ” Opportunistic Networks for Emergency Preparadness and Response” (for Emergency Preparadness and Response” (submisubmitted).tted). (*)(*)
2.2. V. Bhuse, A. Gupta, and L. Lilien, "Research challenges in lightweight intrusion detection for sensornets" V. Bhuse, A. Gupta, and L. Lilien, "Research challenges in lightweight intrusion detection for sensornets" ((submisubmitted).tted).
3.3. L. Lilien and B. Bhargava, ”A Scheme for Privacy-preserving Data Dissemination,” L. Lilien and B. Bhargava, ”A Scheme for Privacy-preserving Data Dissemination,” IEEE Transactions on Systems, Man and IEEE Transactions on Systems, Man and CyberneticsCybernetics (to appear). (to appear).
4.4. L. Lilien, Z. Kamal, V. Bhuse and A. Gupta, "Opportunistic Networks: The Concept and Research ChallengesL. Lilien, Z. Kamal, V. Bhuse and A. Gupta, "Opportunistic Networks: The Concept and Research Challenges in Privacy and in Privacy and Security,” Security,” International Workshop on Research Challenges in Security and Privacy for Mobile and Wireless NetworksInternational Workshop on Research Challenges in Security and Privacy for Mobile and Wireless Networks ( (WSPWNWSPWN 20200606), Miami, Florida, March 2006), Miami, Florida, March 2006. (*). (*)
5.5. T. Canli, M. Terwilliger, A. Gupta and A. Khokhar, "Power Efficient Algorithms for Computing Fast Fourier Transform over T. Canli, M. Terwilliger, A. Gupta and A. Khokhar, "Power Efficient Algorithms for Computing Fast Fourier Transform over Wireless Sensor NetworksWireless Sensor Networks,," " The Fourth ACS/IEEE Conference on Computer Systems and ApplicationsThe Fourth ACS/IEEE Conference on Computer Systems and Applications, Dubai, UAE, March 2006. , Dubai, UAE, March 2006.
6.6. V. Bhuse, A. Gupta and L. Lilien, "DPDSN: Detection of packet-dropping attacks for wireless sensor networksV. Bhuse, A. Gupta and L. Lilien, "DPDSN: Detection of packet-dropping attacks for wireless sensor networks,," " Proceedings of Proceedings of the the 4th4th International Trusted Internet Workshop (TIW) International Trusted Internet Workshop (TIW), , International Conference on High Performance ComputingInternational Conference on High Performance Computing, Goa, India, , Goa, India, December 2005. December 2005.
7.7. A. Gupta and V. Bhuse, "Anamoly Intrusion Detection in Wireless Sensor NetworksA. Gupta and V. Bhuse, "Anamoly Intrusion Detection in Wireless Sensor Networks,," " Journal of High Speed NetworksJournal of High Speed Networks, vol. 15, , vol. 15, issue 1, January-March 2006. issue 1, January-March 2006.
8.8. M. Terwilliger, A. Gupta, A. Khokhar and G. Greenwood,M. Terwilliger, A. Gupta, A. Khokhar and G. Greenwood, "Localization using Evolution Strategies in Sensornets"Localization using Evolution Strategies in Sensornets,," " Proceedings of Proceedings of the IEEE Congress on Evolutionary Computationthe IEEE Congress on Evolutionary Computation, Edinburgh, UK, Edinburgh, UK,, September 2005. September 2005.
9.9. V. Bhuse, A. Gupta, M. Terwilliger, Z. Yang and Z. Kamal, "Using Routing Data for Information Authentication in Sensor V. Bhuse, A. Gupta, M. Terwilliger, Z. Yang and Z. Kamal, "Using Routing Data for Information Authentication in Sensor NetworksNetworks,," " Proceedings of the 3rd International Trusted Internet Workshop (TIW)Proceedings of the 3rd International Trusted Internet Workshop (TIW), , International Conference on High International Conference on High Performance ComputingPerformance Computing, Bangalore, India, December 2004. , Bangalore, India, December 2004.
10.10. T. Canli, M. Terwilliger, A. Gupta and A. Khokhar, "Power-Time Efficient Algorithm for Computing FFT in Sensor NetworksT. Canli, M. Terwilliger, A. Gupta and A. Khokhar, "Power-Time Efficient Algorithm for Computing FFT in Sensor Networks,," " (E(Extended Abstractxtended Abstract)). . Proceedings of the Second ACM Conference on Embedded Networked Sensor SystemsProceedings of the Second ACM Conference on Embedded Networked Sensor Systems ( (SenSysSenSys), ), Baltimore, Maryland, November 2004.Baltimore, Maryland, November 2004.
11.11. B. Bhargava, L. Lilien, A. Rosenthal, and M. Winslett, “PervasiveTrust,” B. Bhargava, L. Lilien, A. Rosenthal, and M. Winslett, “PervasiveTrust,” IEEE Intelligent SystemsIEEE Intelligent Systems, vol. 19(5), Sep./Oct.2004, pp. , vol. 19(5), Sep./Oct.2004, pp. 74-77. 74-77. (*)(*)
12.12. B. Bhargava and L. Lilien, “Private and Trusted Collaborations,” B. Bhargava and L. Lilien, “Private and Trusted Collaborations,” Proc. Secure Knowledge Management (SKM 2004): A WorkshopProc. Secure Knowledge Management (SKM 2004): A Workshop, , Amherst, NY, Sep. 2004.Amherst, NY, Sep. 2004.
13.13. M. Jenamani, L. Lilien, and B. Bhargava, “Anonymizing Web Services Through a Club Mechanism with Economic Incentives,” M. Jenamani, L. Lilien, and B. Bhargava, “Anonymizing Web Services Through a Club Mechanism with Economic Incentives,” Proc. International Conference on Web Services (ICWS 2004)Proc. International Conference on Web Services (ICWS 2004), San Diego, California, July 2004, pp. 792-795., San Diego, California, July 2004, pp. 792-795.
14.14. Z. Kamal, M. Salahuddin, A. Gupta, M. Terwilliger, V. Bhuse and B. Beckmann, "Analytical Analysis of Data and Decision Fusion Z. Kamal, M. Salahuddin, A. Gupta, M. Terwilliger, V. Bhuse and B. Beckmann, "Analytical Analysis of Data and Decision Fusion in Sensor Networksin Sensor Networks,," " TThe 2004 International Conference on Embedded Systems and Applicationshe 2004 International Conference on Embedded Systems and Applications. Las Vegas, June 2004.. Las Vegas, June 2004.
15.15. M. Terwilliger, A. Gupta, V. Bhuse, Z. Kamal, and M. Salahuddin, "A Localization System M. Terwilliger, A. Gupta, V. Bhuse, Z. Kamal, and M. Salahuddin, "A Localization System UUsing Wireless Sensor Networks: A sing Wireless Sensor Networks: A Comparison of Two TechniquesComparison of Two Techniques,," " Proceedings of the 2004 Workshop on Positioning, Navigation and CommunicationProceedings of the 2004 Workshop on Positioning, Navigation and Communication, Hanover, , Hanover, Germany, March 2004 , Germany, March 2004 , pp.pp. 95-100. 95-100.
16.16. V. Bhuse, A. Gupta and R. Pidva, "A Distributed Approach to Security in SensornetsV. Bhuse, A. Gupta and R. Pidva, "A Distributed Approach to Security in Sensornets,," " The 58th IEEE Semiannual Vehicular The 58th IEEE Semiannual Vehicular Technology ConferenceTechnology Conference, Orlando, Florida, USA, Orlando, Florida, USA, , October 2003.October 2003.
17.17. L. Lilien, “Developing Pervasive Trust Paradigm for Authentication and Authorization,” L. Lilien, “Developing Pervasive Trust Paradigm for Authentication and Authorization,” Proc. Third Cracow Grid Workshop Proc. Third Cracow Grid Workshop (CGW’03)(CGW’03), Kraków (Cracow), Poland, October 2003, pp. 42-49 (invited paper)., Kraków (Cracow), Poland, October 2003, pp. 42-49 (invited paper).
29
March 15-16, 2006
WiSe Lab Experience in Sensornets WiSe Lab Experience in Sensornets – Selected Projects Since 1/03– Selected Projects Since 1/03
* Results useful for oppnets* Results useful for oppnets
DesignDesigninging of of WiSe WiSe Security Protocols: DSPSSecurity Protocols: DSPS Location Tracker Location Tracker UUsing Motessing Motes (*) (*) RHS: RHS: Remote Home SurveillanceRemote Home Surveillance (*) (*) Directed Diffusion: Attacks & CountermeasuresDirected Diffusion: Attacks & Countermeasures Improving the Accuracy of Improving the Accuracy of Mote Mote MeasurementsMeasurements
by by UUsingsing Neural NetNeural Networkworkss SOMS: SOMS: Smart Occupancy Monitoring System Smart Occupancy Monitoring System UUsing Motessing Motes (*) (*) Comparative Study of Network SimulatorsComparative Study of Network Simulators CollaborativeCollaborative Image Processing Image Processing (*) (*) DENSe: a Development Environment for Networked SensorsDENSe: a Development Environment for Networked Sensors Incorporating Incorporating MMobile-ware in obile-ware in DDistributed istributed CComputations / omputations / GGridrids s
(*)(*) ExtendExtendinging the the ns-2 ns-2 Simulator Simulator to to SSatellite and WCN atellite and WCN SSimulationimulationss Smart Smart AAntennas for WCNsntennas for WCNs Energy Energy EEfficient MAC fficient MAC PProtocols for IEEE 802.11xrotocols for IEEE 802.11x A Wireless Security Testing SystemA Wireless Security Testing System (*) (*) Mobile and Self-Mobile and Self-CCalibrating Irrigation Systemalibrating Irrigation System Collective Collective CCommunications for ommunications for SSensornetsensornets (*) (*) 30