SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks Radha Poovendran Network Security Lab University of Washington Protocol Exchange.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Security in Sensor Networks By : Rohin Sethi Aranika Mahajan Twisha Patel.
Localization for Mobile Sensor Networks ACM MobiCom 2004 Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
Secure Location Verification with Hidden and Mobile Base Stations -TMC Apr, 2008 Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagalj, Mani Srivastava.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian Perrig Virgil Gligor Carnegie Mellon UniversityUniversity of Maryland.
Fault-Tolerant Target Detection in Sensor Networks Min Ding +, Dechang Chen *, Andrew Thaeler +, and Xiuzhen Cheng + + Department of Computer Science,
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 9: Localization & positioning Holger Karl.
Range-Based and Range-Free Localization Schemes for Sensor Networks
Robust Range-Independent Localization for Wireless Sensor Networks Radha Poovendran Joint work with Loukas Lazos Network Security Lab University of Washington.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
LAAC: A Location-Aware Access Control Protocol YounSun Cho, Lichun Bao and Michael T. Goodrich IWUAC 2006.
A Beacon-Less Location Discovery Scheme for Wireless Sensor Networks Lei Fang (Syracuse) Wenliang (Kevin) Du (Syracuse) Peng Ning (North Carolina State)
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
Thoughts on the Formal Modeling of Security of Sensor Networks Catherine Meadows Center for High Assurance Computer Systems Naval Research Laboratory Washington,
Secure Localization using Dynamic Verifiers Nashad A. Safa Joint Work With S. Sarkar, R. Safavi-Naini and M.Ghaderi.
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 6: Securing neighbor discovery.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 3.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Probability Grid: A Location Estimation Scheme for Wireless Sensor Networks Presented by cychen Date : 3/7 In Secon (Sensor and Ad Hoc Communications and.
LAD: Location Anomaly Detection for Wireless Sensor Networks Wenliang (Kevin) Du (Syracuse Univ.) Lei Fang (Syracuse Univ.) Peng Ning (North Carolina State.
Wireless Sensor Network Security Anuj Nagar CS 590.
The Sybil Attack in Sensor Networks: Analysis & Defenses James Newsome, Elaine Shi, Dawn Song, Adrian Perrig Presenter: Yi Xian.
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks By: Sencun Zhu, Sanjeev Setia, and Sushil Jajodia Presented By: Daryl Lonnon.
Secure Localization: Location Verification and detection of Malicious nodes in WSN Advisor: Dr. Tricia Chigan Presenter: Solomon Ayalew 3/16/20121.
Computer Science Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks Presented by Akshay Lal.
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
A Survey of Secure Location Schemes in Wireless Networks /5/21.
LOCALIZATION in Sensor Networking Hamid Karimi. Wireless sensor networks Wireless sensor node  power supply  sensors  embedded processor  wireless.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 3.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Localization With Mobile Anchor Points in Wireless Sensor Networks
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004.
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
1 Robust Statistical Methods for Securing Wireless Localization in Sensor Networks (IPSN ’05) Zang Li, Wade Trappe Yanyong Zhang, Badri Nath Rutgers University.
The Sybil Attack in Sensor Networks: Analysis & Defenses
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Attacks in Sensor Networks Team Members: Subramanian Madhanagopal Sivasankaran Rahul Poondy Mukundan.
11/25/2015 Wireless Sensor Networks COE 499 Localization Tarek Sheltami KFUPM CCSE COE 1.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Key management for wireless sensor networks Sources: ACM Transactions on Sensor Networks, 2(4), pp , Sources: Computer Communications, 30(9),
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
Cooperative Location- Sensing for Wireless Networks Authors : Haris Fretzagias Maria Papadopouli Presented by cychen IEEE International Conference on Pervasive.
Network/Computer Security Workshop, May 06 The Robustness of Localization Algorithms to Signal Strength Attacks A Comparative Study Yingying Chen, Konstantinos.
An Energy-Efficient Geographic Routing with Location Errors in Wireless Sensor Networks Julien Champ and Clement Saad I-SPAN 2008, Sydney (The international.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
Toward Resilient Security in Wireless Sensor Networks Rob Polak Feb CSE 535.
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Secure positioning in Wireless Networks Srdjan Capkun, Jean-Pierre Hubaux IEEE Journal on Selected area in Communication Jeon, Seung.
Presenter: Yawen Wei Author: Loukas Lazos and Radha Poovendran
A schematic overview of localization in wireless sensor networks
An Overview of Security Issues in Sensor Network
Presentation transcript:

SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks Radha Poovendran Network Security Lab University of Washington Protocol Exchange Meeting Feb 1-2, Naval Postgraduate School Graduate Student: Loukas Lazos

Radha Poovendran Seattle, Washington2 Motivation Secure Localization Problem SeRLoc Threats and defenses Performance Evaluation Conclusions Outline

Radha Poovendran Seattle, Washington3 Why do we need location in WSN? Access Control Location-dependent services Network functions Monitoring Apps

Radha Poovendran Seattle, Washington4 Location-based Access Control username Microphone Database query Access is decided based on the location of the user. Different privileges for various areas.

Radha Poovendran Seattle, Washington5 Geographical Routing A wants to send a message to B. A B Each node forwards the message to the neighbor closest to the destination. s1s1 s5s5 s9s9 s2s2 s4s4 s3s3 s6s6 s7s7 s8s8

Radha Poovendran Seattle, Washington6 Report Monitoring Information Monitor the structural health of the bridge. Sensors associate their location with the reporting data. Accelerometer

Radha Poovendran Seattle, Washington7 Localization Problem Choice of localization algorithm is based on: Resolution required Region of deployment Resource constraints of the devices Localization: Sensor Location Estimation How do sensors become aware of their position under non-deterministic deployment?

Radha Poovendran Seattle, Washington8 Classification of Loc. Schemes Indoors vs. Outdoors: GPS, Centroid (outdoors). RADAR, Active Bat, AhLos (indoors). Infrastructureless (I-L) vs. Infrastructure based (I- B): AhLos, Amorphous, DV-Hop (I-L). RADAR, Active Bat, AVL (I-B). Range-based (R-B) vs. Range-Independent (R-I): RADAR, Ahlos, GPS, Active Bat (R-B). APIT, DV-Hop, Amorphous, Centroid (R-I). Active vs. Passive Dv-hop, APIT (Active). RADAR (Passive).

Radha Poovendran Seattle, Washington9 Localization in un-trusted environment WSN may be deployed in hostile environments. Threats in sensor localization: External Replay attacks. Node Impersonation attacks. Internal Compromise of network entities. False location claims.

Radha Poovendran Seattle, Washington10 Secure Verification of Location Claims [Sastry et al. WISE 2002]. Location Privacy Privacy-aware Location Sensor Networks [Gruteser et al. USENIX 2003]. Secure Localization: Ensure robust location estimation even in the presence of adversaries. SeRLoc: [Lazos and Poovendran, WISE 2004]. S-GPS: [Kuhn 2004]. SPINE: [Capkun & Hubeaux, Infocom 2005]. Secure Location Services

Radha Poovendran Seattle, Washington11 Motivation Problem Description SeRLoc Threats and defense Performance Conclusions Outline

Radha Poovendran Seattle, Washington12 SeRLoc: SEcure Range-independent LOCalization. SeRLoc features Passive Localization. No ranging hardware required. Decentralized Implementation, Scalable. Robust against attacks - Lightweight security. Our Approach: SeRLoc

Radha Poovendran Seattle, Washington13 Locators: Randomly deployed Known Location, Orientation Directional Antennas (X 1, Y 1 ) (X 3, Y 3 ) (X 4, Y 4 ) (X 5, Y 5 ) (X 2, Y 2 ) Network Model Assumptions (1) Two-tier network architecture Sensors: Randomly deployed, unknown location r R Locator range R Beamwidth θ θ Omnidirectional Antennas Sensor range r Locator Sensor

Radha Poovendran Seattle, Washington14 Network Model Assumptions (2) Locator deployment: Homogeneous Poisson point process of rate ρ L (ρ L: Locator density). Sensor deployment: Poisson point process of rate ρ s independent of locator deployment (ρ s : sensor density). Or can be seen as random sampling of the deployment area with rate ρ s (ρ s >> ρ L ). LH s : Locators heard at a sensor s.

Radha Poovendran Seattle, Washington15 LocatorSensor L1L1 L4L4 L3L3 (0, 0) s L3L3 ROI The Idea of SeRLoc Each locator L i transmits information that defines the sector S i, covered by each transmission. Sensor defines the region of intersection (ROI) from all locators it hears.

Radha Poovendran Seattle, Washington16 The Idea of SeRLoc LocatorSensorROI L1L1 L4L4 L3L3 L2L2 Each locator L i transmits information that defines the sector S i, covered by each transmission. Sensor s defines the region of intersection (ROI), from all locators it hears. s

Radha Poovendran Seattle, Washington17 LocatorSensor L1L1 L4L4 L3L3 LocatorsCoordinatesSlopes L1:L1:(X 1, Y 1 )[θ 1,1, θ 1,2 ] L2:L2:(X 2, Y 2 )[θ 2,1, θ 2,2 ] L3:L3:(X 3, Y 3 )[θ 3,1, θ 3,2 ] L4:L4:(X 4, Y 4 )[θ 4,1, θ 4,2 ] The sensor collects information from all the locators that it can hear. SeRLoc – Step 1: Beacon reception (0, 0) L 2: (X 2, Y 2 ) θ2,1θ2,1 θ 2,2 s L4L4

Radha Poovendran Seattle, Washington18 Search Area (X min +R, Y max -R) (X min +R, Y min +R) (X max -R, Y min +R) (X max -R, Y max -R) 2R+X min - X max Sensor places a grid of equally spaced points into the search area. SeRLoc – Step 2: Search area LocatorSensor L1L1 L4L4 L3L3 L2L2 Define : X min = min { X i i  LH s } Y min = min { Y i i  LH s } X max = max { Y i i  LH s } Y max = max { Y i i  LH s } R R R Locators heard by the sensor (X 4, Y 4 ) (X 1, Y 1 ) (X 2, Y 2 ) (X 3, Y 3 ) s

Radha Poovendran Seattle, Washington19 ― Sensor holds a Grid Score Table (GST) initialized at zero. ― For every point in the grid and every sector heard, perform: ― Grid sector test: SeRLoc – Step 3: Grid-sector test LocatorSensor R: Locator’s Range L1L1 g: (x g,y g ) θ 1,2 θ 1,1 R θ ― If test positive increase score value by one.

Radha Poovendran Seattle, Washington20 SeRLoc – Step 4: ROI computation SensorSearch Area … … ROI Majority vote: Points with highest score define the ROI. Error introduction due to discrete computation. Accuracy vs. Complexity tradeoff. GRID Score Table (GST)

Radha Poovendran Seattle, Washington21 Motivation Problem SeRLoc Threats and defense Performance High resolution localization: HiRLoc Conclusions Outline

Radha Poovendran Seattle, Washington22 Threats Attacker aims at displacing the sensors (false info is worse than no info). We do not address DoS attacks. We do not address jamming of the communication medium. [Lazos & Poovendran, IPSN 2005] L1L1 s

Radha Poovendran Seattle, Washington23 How can a sensor be displaced? In SeRLoc: Sensor gets false localization information. A) Replay beacons from a far-away region. B) Impersonate locators and fabricate beacons. How can we protect broadcasted localization information?

Radha Poovendran Seattle, Washington24 SeRLoc - Security mechanisms Message Encryption: Messages encrypted with a symmetric key K 0. Beacon Format: Locator’s coordinatesSlopes of the sector ID authentication Shared symmetric key L i : { (X i, Y i ) || (θ i,1, θ i,2 ) || (H n-j (PW i )), j } K0 Every sensor stores the values H n ( PW i ) for all the locators. A sensor can authenticate all locators that are within its range (one-hop authentication). PW i H 0 (Pw i ) H H 1 (Pw i )H n (Pw i ) HHH one-way hash function Hash chain Synchronization var

Radha Poovendran Seattle, Washington25 SeRLoc – Wormhole Attack L1L1 L4L4 L3L3 L2L2 L5L5 L8L8 L7L7 L6L6 THREAT MODEL The attacker records beacon information at region A No compromise of integrity, authenticity of the communication or crypto protocols. Direct link allows replay of the beacons in a timely fashion. sensorLocatorAttacker Region B Region A Record beacons Wormhole link Tunnels it via the wormhole link at region B, and replays the beacons. Sensor is misled to believe it hears the set of locators LH s : {L 1 - L 8 }.

Radha Poovendran Seattle, Washington26 Wormhole attack detection (1) Accept only single message per locator Multiple messages from the same locator are heard due to: – Multi-path effects; – Imperfect sectorization. – Replay attack. sensorLocator AcAc Wormhole link Attacker obstacle R R R : locator-to-sensor communication range.

Radha Poovendran Seattle, Washington27 Locators heard by a sensor cannot be more than 2 R apart sensorLocator AiAi AjAj Wormhole attack detection (2) Wormhole link Attacker 2R2R LiLi LjLj R : locator-to-sensor communication range. R R

Radha Poovendran Seattle, Washington28 Probability of wormhole detection The events of a locator being within any region A i, A j, A c are inde- pendent (Regions do not overlap). sensorLocator AiAi AjAj AcAc Wormhole attack detection (3) Wormhole link Attacker 2R2R

Radha Poovendran Seattle, Washington29 Wormhole attack detection (4) Probability of wormhole detection L 99.48%

Radha Poovendran Seattle, Washington30 Attach to Closest Locator Algorithm (ACLA) Resolution of location ambiguity L1L1 L4L4 L3L3 L2L2 L5L5 L8L8 L7L7 L6L6 Region B Region A A sensor needs to distinguish the valid set of locators from the replayed ones. Wormhole link 1.Sensor s  : Broadcasts a nonce η. 2.Locator L i  : Reply with a beacon + the nonce η, encrypted with the pair- wise key K s,Li. 3.Sensor s  : Identify the locator L c with the first authentic reply. 4.Sensor s  : A locator L i belongs to the valid set, only if it overlaps with the sector defined by the beacon of L c. Closest Locator

Radha Poovendran Seattle, Washington31 THREAT MODEL The attacker impersonates multiple locators (compromise of the globally shared key K 0 ). SeRLoc – Sybil Attack L1L1 L2L2 L3L3 L4L4 Impersonator Hence, compromise the majority-based scheme, if more than |LH s | locators impersonated. Collect hash values Attacker can fabricate arbitrary beacons.

Radha Poovendran Seattle, Washington32 In a Sybil attack, the sensor hears at least twice the number of locators it would normally hear. Define a threshold L max as the maximum allowable number of locators heard, such that: Sybil Attack detection (1) Probability of false alarmProbability of Sybil attack detection Design goal: Given security requirement δ, minimize false alarm probability ε.

Radha Poovendran Seattle, Washington33 Sybil Attack detection (2) Random locator deployment we can derive the L max value: 26 locators 5% 52 locators 99% Detection probability False alarm Probability

Radha Poovendran Seattle, Washington34 Sybil Attack defense Once a Sybil attack is detected, i.e. More than L max locators are heard: Execute ACLA to attach sensor’s position to the closest locator. Attacker needs to compromise the pairwise key between a locator and the sensor under attack to compromise ACLA. What if a locator is compromised?

Radha Poovendran Seattle, Washington35 SeRLoc – Compromised Locators Compromise of a locator L i  reveals K 0, seed PW i to the hash chain of the locator. Attacker can Impersonate the Closest Locator. Compromise the ACLA algorithm. Displace any sensor that uses ACLA. Need an Enhanced version of ACLA

Radha Poovendran Seattle, Washington36 Enhanced location determination algorithm L2L2 L3L3 L4L4 L5L5 L6L6 L1L1 L7L7 L8L8 L9L9 1. The sensor transmits a nonce with its ID and set LH s 2. Locators within r from the sensor relay the nonce. 3. Locators within R reply with a beacon + the nonce. 4. Sensor accepts first L max replies. Attacker has to compromise more than L max /2 locators, AND Replay before authentic replies arrive at s.

Radha Poovendran Seattle, Washington37 Motivation Secure Localization Problem SeRLoc Threats and defenses Performance Evaluation Conclusions Outline

Radha Poovendran Seattle, Washington38 Simulation setup: ― Random locator distribution with density ρ L. ― Random sensor distribution with density 0.5. Performance evaluation metric: : Sensor location estimation. s i : Sensor actual location. r : Sensor-to-sensor communication range. |S| : Number of sensors. Performance Evaluation

Radha Poovendran Seattle, Washington39 Localization Error vs. Avg. LH M number of antenna sectors. Each locator is equivalent to M reference points. In our simulation set up, SeRLoc outperforms most of the schemes. LH: Locators Heard

Radha Poovendran Seattle, Washington40 Localization error vs. antenna sectors Higher number of directional antennas (narrower sectors) reduces LH. More expensive hardware at each locator. LH: Locators Heard

Radha Poovendran Seattle, Washington41 Localization error vs. sector error Sector error: Fraction of sectors falsely estimated at each sensor. Even when 50% of the sectors are falsely estimated, LE < r for LH  6 SeRLoc is resilient against sector error due to the majority vote scheme.

Radha Poovendran Seattle, Washington42 Localization error vs. GPS error GPS Error ( GPSE ): Error in the locators’ coordinates. For GPSE = 1.8r and LH = 3, LE = 1.1r. DV-hop/Amorphous: LE = 1.1r requires LH = 5 with no GPSE. APIT: LE = 1.1r requires LH = 15 with no GPSE.

Radha Poovendran Seattle, Washington43 Communication Cost Communication cost is independent of the number of sensors. Communication cost increases with the locator density, or number of directional antennas at each locator.

Radha Poovendran Seattle, Washington44 Performance Summary  Increasing number of sectors:  Reduction in error and transmission power, but increased complexity.  Sensitivity to GPSE error:  GPSE=1.8r; Avg. LE=1.1r, requires:  SeRLoc needs LH=3.  Dv-Hop needs LH=5, no GPSE.  APIT needs LH=15, no GPSE.  Communication cost:  APIT requires |S|+|L|.  SeRLoc requires |L|*M. S: Set of sensors, L: Set of locators, M: # of antennas.

Radha Poovendran Seattle, Washington45 Summary and Conclusions  SeRLoc is a two-tier network architecture:  Locators: Known coordinates, sectored antennas, fixed transmission range.  Sensors: Passively determine their position, by intersecting the antenna sectors heard.  Resistance to attacks in WSN using:  Cryptographic primitives (encryption, hashing).  Geometric properties (Range of transmission).  Analytically evaluated level of security via spatial statistics.  Current developments:  Characterize wormhole Problem [UW+NRL; WCNC 2005]  Resistance to jamming attacks, analytical evaluation of error bounds [Lazos & Poovendran; ROPE 2005]

Radha Poovendran Seattle, Washington46 Conclusions  We need to secure location estimation to claim secure location-dependent functions/apps.  SeRLoc: SEcure Range-independent LOCalization  Robustly computes the location even in the presence of attacks.  Better performance than up-to-date range independent localization schemes.  Decentralized implementation, resilient to sources of error.  Current developments  Resistance to jamming attacks.  Analytical evaluation of error bounds.

Radha Poovendran Seattle, Washington47 Workshop on Secure Localization of Wireless Sensor Networks: June 2005, University of Washington. Workshop Announcement