cs 6910 – pervasive computing section 0.b: opportunistic networks: specialized ad hoc networks for...

43
CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe Lab (Wireless Sensornet Laboratory) http://www.cs.wmich.edu/wsn Department of Computer Science Western Michigan University Slides are © 2007 by Leszek T. Lilien Requests to use original slides for non-profit purposes will be gladly granted upon a written request.

Post on 21-Dec-2015

224 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

CS 6910 – Pervasive Computing

Section 0.B:

Opportunistic Networks:Specialized Ad Hoc Networks

for Emergency Response ApplicationsDr. Leszek Lilien

WiSe Lab (Wireless Sensornet Laboratory)http://www.cs.wmich.edu/wsn

Department of Computer ScienceWestern Michigan University

Slides are © 2007 by Leszek T. LilienRequests to use original slides for non-profit purposes will be gladly granted upon a written

request.

Page 2: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

Outline

Part 1. Motivation for Specialized Ad Hoc Networks

Part 2. Analogy to a Human Emergency Response Team

Part 3. Opportunistic Networks: A New Type of Specialized Ad Hoc Networks

Part 4. Related Research and Research Challenges

Part 5. Conclusions

Part 6. Current and Future Work

2

Page 3: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

Part 1.Motivation for Specialized Ad Hoc

Networks Homeland Security

One of the crucial challenges facing the USA today

Among its 6 mission areas is Emergency Preparedness and Response (EPR)

EPR deals with: Natural disasters Man-made disasters (incl. accidents, terrorist

attacks)[Natl. Strategy for Homeland Security, July 2002]

Mobile ad hoc networks (MANETs) proposed for EPR [Haas, 1999]

3

Page 4: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

Motivation for Specialized Ad Hoc Networks (2)

MANETS are not quite a natural match for EPR E.g., human rescue teams can find and

mobilize as their helpers local firemen, police, National Guard or even regular citizens

No analogous capability of MANETs to find and “mobilize” devices/networks

Let’s find or define a specialization (a subclass) of ad hoc networks more suitable for EPR applications A new paradigm and a new technology to

improve effectiveness & efficiency of EPR

4

Page 5: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

5

This page left blank intentionally.

Page 6: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

Part 2. Analogy toa Human Emergency Response Team Important characteristics of a human rescue

team Starts as a seed team (a small group of people) The seed team grows opportunistically during

its operationsa) Some people can always be ordered to join

Police, firemen, National Guard or Army Reserve personnel

b) Anybody can be ordered to join only in life-or-death situations Legally required to help saving lives or critical

resourcesc) Anybody can be asked to join in other

situations6

Page 7: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

Analogy to a Human Emergency Response Team (2)

Who is ordered or invited to join? In some situations any extra pair of hands

can help In others only highly qualified people (e.g.,

doctors and nurses) are ordered/asked to join Human helper types

Highly prepared E.g., National Guard, Army Reserve or state militias

Signed up for service Undergo training in preparation for duty (even

unforeseen) Somewhat prepared

E.g., people that volunteer for first aid courses Become pretty valuable helpers in emergencies

Not prepared at all

7

Page 8: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

Benefits of the opportunistic growth of the rescue team Opportunistic leveraging of all kinds of skills

and resources that new helpers can bring Obtaining a lot of help effectively and efficiently

– even for free

8

Analogy to a Human Emergency Response Team (3)

Page 9: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

Analogous critical requirements for ad hoc network specialized for EPR in the priority order:

1) Minimal starting configuration – a pre-configured seed for EPR operationsAnalogy to the seed rescue team

2) High interoperability in terms of communication of diverse devices or networks (Wired/WiFi, Bluetooth, satellite, ham radios, WiMAX, ...)

Analogy to a rescue team’s ability to contact different people, individually or via organizations

3) Highly heterogeneous software (& hardware)Analogy to heterogeneity of rescue teams in terms of members’ skills, communication and other equipment, and other resources

4) Harvesting of diverse resources as neededAnalogy to finding people with different skills, equipment, and other resources

5) Persistent connectivity once it is establishedAnalogy to being able to contact (maybe via a chain of others) members of the

expanded team, including all helpers 9

Analogy to a Human Emergency Response Team (4)

Page 10: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

If there is no specialized ad hoc network (AHN) matching the requirements, then: Define a new specialized AHN paradigm Invent a new specialized AHN technology

No known specialized AHN matches the requirementsConsidered AHNs: Mobile ad hoc networks (MANETs) Mesh networks P2P systems Sensor networks Spontaneous networks (in the narrow sense, cf. [Feeney et al.

2001])

=> Need:- a new specialized AHN paradigm- a new specialized AHN technology

Note: Other (than oppnets) specialized AHNs for emergencies

are Incident Area Networks (IANs) 10

Analogy to a Human Emergency Response Team (5)

Page 11: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

11

This page left blank intentionally.

Page 12: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

Part 3. Opportunistic Networks:A New Type of Specialized Ad Hoc

Networks Paradigm of opportunistic networks (oppnets)

Based on the analogy to operations of human rescue teams

Goals of oppnets: Opportunistic growth Opportunistic leveraging of resources

aiming at (among others): Bridging diverse communication media Offloading computations to additional

platforms Integrating independent sensing systems

(enhancing their sensing capabilities)

12

Page 13: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

Startup: Seed Oppnet

13

Oppnet deployed as a seed oppnet

Seed oppnet localizes its nodes & self-configures

Seed NodeSeed Nodess

Link toLink tothe the WorldWorld

Controller Controller (distributed)(distributed)

Page 14: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

Growth: Expanded Oppnet

14

Seed NodeSeed Nodess

Link toLink tothe the WorldWorld

Controller Controller (distributed)(distributed)

ApplianceAppliance(refrigerator)(refrigerator)

Computer NetworkComputer Network

WiMAXWiMAXOverturneOverturne

ddVehicleVehicle

(w(with ith OnStarOnStar, , VANVAN))

CellphonCellphonee

TowerTower

SatellitSatellitee

Seed oppnet grows into an expanded oppnet by: Finding candidate helpers Selecting candidates - they are ordered/asked to join

Add communication, computing, sensing, storage, other resources

14

Page 15: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

Summary of Oppnet Activities Discovering & identifying candidate helpers Contacting selected candidates Inviting or ordering candidates to join Admitting & integrating helpers that join oppnet Offloading tasks to helpers

Determining useful colaborative functionalities Managing offloaded tasks

Cleaning up & releasing each helper when no longer needed

> Need research for each of theses activities < Think which is most interesting to you as a topic for your

CS6910 Team Project15

Page 16: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

Oppnet Reserve A challenge in oppnet growth

Must discover candidate helpers, then contact selected ones

Difficult without facilities provided by candidates or infrastructure

A solution: oppnet reserve — facilitating discovery/contacting Analogy to Army / Navy / Air Force Reserve, etc. Volunteer helpers sign up for oppnet reserve

Maybe for some incentives (moral, financial, etc.)

Volunteers „trained” for active duty Install facilities that make them easier to detect

and contact by oppnets E.g., install (future) standard oppnet protocols

Matched to their capabilities: heavy-, medium- and lightweight

Available for active oppnet duty whenever must/can help 16

Page 17: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

Oppnet Reserve (2)

Oppnet reserve is analogous to having highly prepared human helpers

(Recall the classification of human helpers into: highly prepared, somewhat prepared, unprepared)

Oppnet reserve is not required but very helpful Having highly prepared human helpers is not required either

17

Page 18: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

Oppnet is … … a specialized (application-specific or application-

class-specific) ad hoc network … an opportunistic growth network … an opportunistic use of resources network /

an opportunistic use of services network Spectrum, connectivity, services, …

… a privacy-preserving & secure technology Oppnet is not …

… a “generic” ad hoc network … a mesh network … a grid computing system … a peer-to-peer (P2P) system … a hybrid network …

18

What Oppnet Is … / What Oppnet Is Not …

(this slide added after lecture)

Page 19: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

Basic Oppnet Categories 2 major oppnet categories:

Benevolent oppnets Malevolent oppnets

Corresponding oppnets scenarios: Benevolent oppnet scenario:

„Citizens Called to Arms”

Malevolent oppnet scenario: „Bad Guys Gang Up”

19

Page 20: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

Benevolent OppnetScenario: „Citizens Called to Arms” (1) Seed oppnet deployed

after an earthquake (un-predictable emergency) Seed is ad hoc wireless network with very

powerful nodes More energy, computing and communication resources

Seed tries to detect candidate helpers For help in damage assessment and disaster

recovery Uses any available detection method — including:

Cellphone- or radio-based detection Including Software Defined Radio (SDR) & Cognitive Radio

Searching for nodes using the IP address range for the affected geographic area

AI-based visual detection (next slide)20

20

Page 21: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

Benevolent OppnetScenario: „Citizens Called to Arms” (2) Example:

Helper 1 (supervisor ofsecurity cameras) monito-ring a surveillance net views an overturned car

Helper 2 (pattern recognition specialist) detects an overturned car

Helper 3 (image analysis specialist) asked to recognize car’s license plate

Helper 4 (DB manager) finds that the car has OnStar link

Helper 5 (OnStar agent) contacts VAN (Vehicle Area Network) and BANs (Body Area Networks) on or within bodies of car occupants via OnStar infrastructure

Helper 6 (vital sign evaluator) evaluates obtained info Helper 7 (rescue dispatcher) decides if/when rescuers

should be dispatched21

21

Page 22: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

Benevolent OppnetScenario: „Citizens Called to Arms” (3)

Oppnet selects optimal subset of detected nodes Inviting devices, clusters & entire networks Helpers for communicating, sensing, computing

Using „hidden” capabilities, e.g. for sensing: Desktop can „sense” presence of a potential

victim at its keyboard Cellphones can „sense” location

Even ones w/o GPS can be triangulated

22

22

Page 23: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

Using „hidden”emergency functionalities Oppnet contacts 2 independent sensornets

(SNs): water infrastructure control SN / public space surveillance SN

SNs ordered to abandon normal functions & help in rescue & recovery operations

Water infrastructure SN (with multisensor capabilities, under road surfaces) — ordered to sense vehicular movement and traffic jams

Public space surveillance SN — ordered to search for images of human victims

23

Benevolent OppnetScenario: „Citizens Called to Arms” (4)

23

Page 24: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

24

Malevolent OppnetScenario: „Bad Guys Gang Up” (1) Scenario 1 — Terrorists

create apparently harmless weather monito-ring sensornet (SN): SN becomes a seed of a malevolent

opportunistic SN SN exploits other nodes from many other

networks (w/o revealing its true goals) “Critical mass” of the opportunistic SN is reached (in

terms of geographical spread and sensing capabilities)

SN waits for wind patterns that can speed up spread of poisonous chemicals

Collected data used to decide when to start chemical attack

24

Page 25: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

25

Malevolent Oppnet Scenario:„Bad Guys Gang Up” (2)

Scenario 2 — network at home starts spying on you: Becomes a seed oppnet Exploits other devices/nets to collect all info on you:

From your fridge (& RFID-equipped food packaging): what/when you eat

From your computer: keylogs your passwords, sensitive data From your cellphone: who you call & when From your networked camera: what photos you take From your home security surveillance system: your private

images Cyberfly with camera eyes and microphone ears ...

Huge privacy problem! / Huge security problem! Controls to counteract malevolent oppnets badly needed

Page 26: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

26

NOTE:The following slides not required for

exam.

(Provided as a potential help for projectselection and project work.)

Page 27: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

Part 4. Related Research& Research Challenges

Examples of Related Research Interoperability

Among wireless networks - active research area Among WANs, MANs, LANs, PANs (Personal Area Networks), etc.

Among wired & wireless nets - much less research Ambient Networks (big European Union project, next-generation Internet

—for 2015/2020, smaller networks able to compose themselves into bigger ones)

Localization & self-organization MANETs / Sensornets

Network growth P2P systems – search for peers in unstructured systems Trojan Horses - agents spreading in search for helpers

Integrating and managing heterogeneous systems, incl. data integration & aggregation

Grid systems / MANETs / Sensornets Other

… 27

Page 28: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

Research Challenges in Basic Operations

Challenges in seed oppnet deployment E.g., localization, self-configuration, adaptability

Challenges in detecting helper systems E.g., define primitives to detect candidates, identify

and categorize them, evaluate and classify them (e.g., based on dependability and usefulness)

Challenges in inviting & admitting candidate helpers E.g., select candidates to invite, develop protocols

for candidates to accept or reject invitation, devise primitives /methods to manage expanded oppnets

Etc., etc. for remaining oppnet primitives

More:Leszek Lilien, Z. Huma Kamal, and Ajay Gupta, "Opportunistic Networks: Research Challenges in Specializing the P2P Paradigm,” Proc. 3rd International Workshop on P2P Data Management, Security and Trust (PDMST’06), Kraków, Poland, September 2006.

28

Page 29: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

Research Challenges in Privacy & Security (1)

1) Privacy challenges in oppnets Privacy is critical

Oppnets are pervasive systems Must face all critical privacy challenges

inherent to pervasive computing Privacy is a „make it or break it” issue for

pervasive computing => Privacy is a „make it or break it” issue for oppnets

Basic privacy protection goals in oppnets Protect helper resources from the host oppnet Protect oppnet from its helpers Protect environment from privacy violations by

oppnet Also from malevolent oppnets

29

Page 30: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

Research Challenges in Privacy & Security (2)

2) Security challenges in oppnets Many have privacy aspects/components

More:

L. Lilien, Z. H. Kamal, V. Bhuse, and A. Gupta, "Opportunistic Networks: The Concept and Research Challenges in Privacy and Security," book chapter in: "Mobile and Wireless Network Security and Privacy," ed. by K. Makki et al., Springer Science+Business Media, Norwell, Massachusetts, 2007 (to appear)

– pre-publication version available upon request

30

Page 31: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

31

This page left blank intentionally.

Page 32: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

High-payoff potential for the oppnet initiative1) Social and economic benefits

Including reduction of human suffering & loss of life

2) Technological benefits3) Research benefits4) Educational benefits

-- Details below --

32

Part 5. Conclusions

Page 33: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

1) Social & Economic Impacts Impacts on Emergency Preparedness and

Response operations in Homeland Security (HS) — current app focus Tremendous leveraging potential in emergencies

A wealth of freely available resources Reduction of human suffering & loss of life Increasing safety & efficiency of the first responders

Impacts on other applications both in HS and outside HS

[SKIP:] Economic impacts Technology transfer & commercialization Benefits for the computer industry

Production of software / networking equipment Benefits for other industries

Enhancing many products with standard oppnet interfaces E.g., the auto industry: cars and trucks as oppnet

platforms

33

Part 5. Conclusions – cont.2

Page 34: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

Advancing the network and pervasive computing know-how Development of the innovative oppnet technology Enhancing network/pervasive applications by use

of oppnet technologies Enabling new network/pervasive application niches

we can not even foresee

Advancing other areas of technology (not only computing) A side effect of oppnet developments

[SKIP:] Technology impacts speeded up & enhanced by the planned technology transfer plus commercialization activities

34

2) Impacts on TechnologyPart 5. Conclusions – cont.3

Page 35: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

35

[SKIP:] 3) Impacts on Research

[SKIP:] 4) Impacts on Education

Part 5. Conclusions – cont.4

Page 36: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

36

This page left blank intentionally.

Page 37: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

>> Search for good uses for oppnets in all kinds of application areas <<

Search for applications that ... ... can start with a seed ... need/have high interoperability ... need/have highly heterogeneous

software ... can benefit from leveraging diverse

resources of helpers ... can maintain persistent connectivity

once it is established ...

37

Part 6. Current and Future Work

Page 38: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

Part 6. Current and Future Work – cont.

Building an oppnet prototype Goal: Proof of concept

To demonstrate technical prowess & economic benefits

Designing oppnet architecture With its associated components:

Methods, protocols, and algorithms

Oppnet prototype implementation For stimulation and feedback

Necessary for fine-tuning oppnet design

38

Page 39: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

Publications, Etc. Selected Publications

(cf. http://www.cs.wmich.edu/wsn/project_oppnet.html)L. Lilien, A. Gupta, and Z. Yang, "Opportunistic Networks for Emergency Applications and Their Standard Implementation Framework," Proc. The First International Workshop on Next Generation Networks for First Responders and Critical Infrastructure (NetCri07), New Orleans, Louisiana, April 11-13, 2007 (to appear)

L. Lilien, Z. H. Kamal, V. Bhuse, and A. Gupta, "Opportunistic Networks: The Concept and Research Challenges in Privacy and Security," book chapter in: "Mobile and Wireless Network Security and Privacy," ed. by K. Makki et al., Springer Science+Business Media, Norwell, Massachusetts, 2007 (extended version of the WSPWN 2006 paper; to appear)

L. Lilien, Z. H. Kamal and A. Gupta, "Opportunistic Networks: Research Challenges in Specializing the P2P Paradigm," Proc. 3rd International Workshop on P2P Data Management, Security and Trust (PDMST'06), Kraków, Poland, September 4-8, 2006, pp. 722-726.

L. Lilien, Z. H. Kamal, V. Bhuse and A. Gupta, "Opportunistic Networks: The Concept and Research Challenges in Privacy and Security," Proc. International Workshop on Research Challenges in Security and Privacy for Mobile and Wireless Networks (WSPWN 2006), Miami, Florida, March 2006, pp. 134-147.

B. Bhargava, L. Lilien, A. Rosenthal and M. Winslett, "Pervasive Trust," IEEE Intelligent Systems, vol. 19(5), Sep./Oct.2004, pp. 74-77 (just the first brief mention of the oppnet idea, in the form of malevolent opportunistic sensor networks).

39

Page 40: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

Publications, Etc. – cont. 1 Selected Presentations

L. Lilien, "Opportunistic Networks: Research Challenges in Specializing the P2P Paradigm," 3rd International Workshop on P2P Data Management, Security and Trust (PDMST'06), Kraków, Poland, September 4-8, 2006

L. Lilien, "Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications," presented for Distributed Systems Research Group, Department of Computer Science, AGH University of Science and Technology, Krakow, Poland, May 22, 2006

L. Lilien, "Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications," presented for Section of Information Technology, Institute of Telecomputing, Cracow University of Technology, Kraków, Poland, May 23, 2006

L. Lilien, "Developing Specialized Ad Hoc Networks: The Case of Opportunistic Networks," Workshop on Distributed Systems and Networks (in conjunction with WWIC’06), Bern, Switzerland, May 9, 2006

L. Lilien, "Opportunistic Networks: The Concept and Research Challenges in Privacy and Security," International Workshop on Research Challenges in Security and Privacy for Mobile and Wireless Networks (WSPWN 2006), Miami, Florida, March 15-16, 2006

L. Lilien, Z.H. Kamal and A. Gupta (in cooperation with V. Bhuse and Z Yang), "Opportunistic Networks: The Concept and Research Challenges," Department of Computer Science, Western Michigan University, Kalamazoo, Michigan, February 9, 2006

40

Page 41: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

Selected Posters

Leszek Lilien, Zille Huma Kamal, A. Gupta, V. Bhuse and Z. Yang, "Opportunistic Networks," 3rd International Conference on Networked Sensing Systems, Chicago, IL, May 31 - June 2 2006.

Leszek Lilien, Zille Huma Kamal, Vijay Bhuse and Ajay Gupta, "Opportunistic Networks and Their Privacy and Security Challenges," The Seventh Annual CERIAS Information Security Symposium - "Negotiating Trust: Security, Privacy, Risk," CERIAS, Purdue University, West Lafayette, IN, March 21, 2006.

Leszek Lilien and Ajay Gupta, "Opportunistic Networks for Emergency Preparedness and Response," 4th Annual e-Enterprise Conference, PHSI/RCHE, Purdue University, West Lafayette, IN, March 20, 2006.

41

Publications, Etc. – cont. 2

Page 42: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

WiSe Lab Experience in Ad Hoc Networks – Selected Projects Since 1/03

Designing of WiSe Security Protocols: DSPS Location Tracker Using Motes (*) RHS: Remote Home Surveillance (*) Directed Diffusion: Attacks & Countermeasures Improving the Accuracy of Mote Measurements

by Using Neural Networks SOMS: Smart Occupancy Monitoring System Using Motes (*) Comparative Study of Network Simulators Collaborative Image Processing (*) DENSe: a Development Environment for Networked Sensors Incorporating Mobile-ware in Distributed Computations / Grids

(*) Extending the ns-2 Simulator to Satellite and WCN Simulations Smart Antennas for WCNs Energy Efficient MAC Protocols for IEEE 802.11x A Wireless Security Testing System (*) Mobile and Self-Calibrating Irrigation System Collective Communications for Sensornets (*)

* Results directly useful for oppnets42

Page 43: CS 6910 – Pervasive Computing Section 0.B: Opportunistic Networks: Specialized Ad Hoc Networks for Emergency Response Applications Dr. Leszek Lilien WiSe

43

This page left blank intentionally.