Research Projects in the Mobile Computing and Networking (MCN) Lab

Similar documents
INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET-

The Optimal Methods of IVC Routing Protocol for VANET

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)

Technical Document on Vehicular Networks

Real-Time Communication in IEEE Wireless Mesh Networks: A Prospective Study

Vehicular Cloud. Fan Zhang

The Vision of Vehicle Infrastructure Integration (VII)

communication over wireless link handling mobile user who changes point of attachment to network

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Security Threats in Mobile Ad Hoc Networks

Securing MANET Using Diffie Hellman Digital Signature Scheme

Design of Simple and Efficient Revocation List Distribution in Urban areas for VANET s

EPL 657 Wireless Networks

Chapter 12 Homework CIT J001/02/04/06. Name: Date: Course: Test:

Intelligent Transportation System for Vehicular Ad-Hoc Networks

CHAPTER 1 1 INTRODUCTION

Securing Wireless Access for Vehicular Environments (WAVE)

How To Write A Transport Layer Protocol For Wireless Networks

Some Security Trends over Wireless Sensor Networks

Security in Ad Hoc Network

Propsim enabled Mobile Ad-hoc Network Testing

Cognitive radio for vehicular ad hoc networks (CR-VANETs): approaches and challenges

COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES

Demystifying Wireless for Real-World Measurement Applications

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

Denial of Service in Sensor Networks

The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center

Automotive Communication via Mobile Broadband Networks

The Future of the Automobile Vehicle Safety Communications. Stanford University ME302 Luca Delgrossi, Ph.D. April 1, 2014

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

DoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks

COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES. Gene Robinson E.A.Robinsson Consulting

Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks

Humayun Bakht School of Computing and Mathematical Sciences Liverpool John Moores University

A Catechistic Method for Traffic Pattern Discovery in MANET

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS

ECE/CS 372 introduction to computer networks. Lecture 13

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Introduction Chapter 1. Uses of Computer Networks

Energy Optimal Routing Protocol for a Wireless Data Network

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin,

Multi-Channel Wireless Networks: Capacity, Protocols, and Experimentation (with Net-X) Nitin Vaidya

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Portable Wireless Mesh Networks: Competitive Differentiation

An Extended AODV Protocol to Support Mobility in Hybrid Networks

Wireless LAN Concepts

BSc (Hons.) Computer Science with Network Security. Examinations for 2011/ Semester 2

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

Tactical Service Bus: The flexibility of service oriented architectures in constrained theater environments

other. A B AP wired network

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

Performance Evaluation of VANETs with Multiple Car Crashes in Different Traffic Conditions

Towards Efficient Routing in Vehicular Ad Hoc Networks

Wave Relay System and General Project Details

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

Best Practices for Outdoor Wireless Security

Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA

Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY

Multihop Wireless Networks

An Overview of ZigBee Networks

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks

Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture

ZIGBEE ECGR-6185 Advanced Embedded Systems. Charlotte. University of North Carolina-Charlotte. Chaitanya Misal Vamsee Krishna

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

SBSCET, Firozpur (Punjab), India

Secure Routing in Wireless Sensor Networks


September 8th 8:30 AM 10:00 AM PL1: Reinventing Policy to Support the New ITS

Security in Wireless Local Area Network

Network Architecture and Topology

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

Introduction to Wireless Sensor Network Security

Car-to-Car Communication

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

Transcription:

Research Projects in the Mobile Computing and Networking (MCN) Lab Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University http://www.cse.psu.edu/~gcao

Mobile Computing and Networking (MCN) Lab MCN lab conducts research in many areas of wireless networks and mobile computing, emphasis on designing and evaluating mobile systems, protocols, and applications. Current Projects: wireless sensor networks, vehicular networks, wireless network security, data dissemination/access in wireless P2P networks, resource management in wireless networks. Support: NSF (CAREER, ITR, NeTS, NOSS, CT, CNS), Army Research Office, DoD/Muri, PDG/TTC and member companies Cisco, Narus, Telcordia, IBM and 3ETI. Current students: 10 PhD, 2 MS, and 2 honor BS students Alumni: 6 PhD, including faculty members at Iowa State University, Florida International University, Frostburg State University, and students in Motorola, Cisco, Microsoft. 10 MS students went to various companies

Current Research Projects Collaborative Data Access in Wireless P2P Networks (with C. Das) Data Dissemination in Vehicular Ad Hoc Networks Controllable Node Mobility for Mission-Oriented Sensor Networks (with La Porta, Kesidis, Das) ARSENAL: A Cross Layer Architecture for Secure and Resilient Tactical Mobile ad hoc Networks (with La Porta) A Framework for Defending Against Node Compromises in Distributed Sensor Networks (with Zhu) Security and Privacy support for data centric sensor networks (with Zhu)

Wireless P2P Networks Wireless P2P networks can be mobile ad hoc networks, vehicular networks, sensor networks, mesh networks. Although there are differences (e.g., data transmission speed, link and physical layer characteristics) among these networks, they are some common features: Wireless communication (interference issues), and the packets are transmitted through multi-hop relay Applications in these networks are typically peer-to-peer rather than client-server. 3

Data Access in wireless P2P Networks Most of the previous researches in wireless P2P networks focus on routing or MAC issues. Data access is also very important, since the ultimate goal of using the networks is to provide information access to mobile nodes. In Battlefield, after a soldier obtains enemy information (e.g., battlefield map, enemy distribution) from the commander (data center), it is very likely that nearly soldiers also need the same information. Bandwidth and power can be saved if these data access are served by the soldier with the cached data instead of the data center which may be far away. Other examples: emergency rescue, file sharing in residential area, or infostation. 4

Cooperative Cache CachePath: Cache the data path. Suppose N 1 has requested a data item from N 11. N 3 knows that N 1 has the data. Later if N 2 requests for the data, it forwards the request to N 1 instead of N 11. CacheData: Cache the data In the above example, N 3 caches the data, and forwards the data to N 2 directly. Many technical issues not shown here. 5

6

Vehicular Ad Hoc Networks (VANET) Ad hoc networks composed of vehicles and roadside units Vehicle to vehicle communication Vehicle to roadside communication Roadside to roadside communication FCC assigns Dedicated Short Range Communications (DSRC), 75MHz radio spectrum (at 5.9 GHz). IEEE 802.11p

VANET Applications Safety Fact: 6 Million crashes, 43,000 fatalities in U.S. per year Example: propagate emergency warning to drivers behind a vehicle (or incident) to avoid multi-car collisions. Traffic Control Congestion: 3.5 Billion hours delay, 5.7 Billion gal. wasted fuel per year in U.S. Example: Alert drivers to potential traffic jams, providing increased convenience and efficiency. Travelers and business entities Obtain location based information E-Advertisement 8

Data Access/Dissemination in VANET Data dissemination in sparsely connected networks Infrastructure-assisted data dissemination Data pouring with intersection buffering Scheduling of data access in RSU Improving performance with relay

Data Dissemination in Sparsely Connected Network Task: to deliver a message from mobile vehicle to the fixed site several miles away. A driver may want to find out the sale information in a store, the room availability in a hotel. Challenges: There may be network partitions due to mobility or traffic condition End-to-end connection through multi-hop is hard to set up. Most existing ad hoc routing protocols such as DSR/AODV may not work well. Mobility creates opportunities Buffer and carry the packet when no routes Forward the packet to the nodes moves into the vicinity which can help packet delivery Possible to deliver the packet without an end-to-end connection Different from existing store-carry forward protocols, we make use of the predictable traffic pattern and vehicle mobility to assist data delivery. 10

Vehicle-Assisted Data Delivery (VADD) Key issue Select a forwarding path with smallest packet delivery delay Why not GPSR? Guidelines Make the best use of the wireless transmission Forward the packet via high density area Use intersection as a opportunity to switch the forwarding direction and optimize the forwarding path Geographically shortest path Fast speed wireless communication 11

SVATS: A Sensor-network-based Vehicle Anti-Theft System Current vehicle anti-theft systems have some limitations. Lock devices, car alarm system, tracking system Solution: use sensor nodes and let vehicles monitor other vehicles. Sensors in the vehicles that are parked within the same parking area first form a sensor network, then monitor and identify possible vehicle thefts by detecting unauthorized vehicle movement. When an unauthorized movement is detected, an alert will be reported. Sensors inside the vehicle can be used for tracking the stolen vehicle. 12

SVATS: A Sensor-network-based Vehicle Anti-Theft System 13

Vehicle Tracking Sensors in the stolen vehicle send signals to other vehicles, or APs on the road to track the stolen vehicle. Since the sensor is attached to the vehicle power, its position is known and may be destroyed by the thief, and then cannot report problems for tracking. We also add slave sensors, which can be put at several hidden places inside the vehicle so that the thief cannot locate them in a short time. Slave sensors are used to monitor the master sensor, and to report vehicle theft when master sensor is destroyed. Research issues: Network topology management, vehicle theft detection, intra-vehicle networking, vehicle tracking. 14

Secure Sensor Networks It is a big challenge to secure wireless sensor networks because of the network scale, the highly constrained system resource, and the fact that sensor networks are often deployed in unattended and hostile environments. We propose to develop a framework for defending against node compromises in unattended sensor networks. The framework consists of a suite of security mechanisms spanning three phases: prevention detection reaction This research will provide fundamental security services covering key management, authentication, compromise detection, and revocation. 15

A Framework for Defending Against Node Compromises in Distributed Sensor Networks 16