Nov 1 - 2 2005: Review MeetingACCLIMATE Security, Privacy, and Sensor Networks Marci Meingast Shankar Sastry UC Berkeley.

Slides:



Advertisements
Similar presentations
Security Architectures for Controlled Digital Information Dissemination Laboratory for Information Security Technology (LIST)
Advertisements

CLOSED CIRCUIT TELEVISION (CCTV) SURVEILLANCE SYSTEMS
A new Network Concept for transporting and storing digital video…………
Borough of Verona 2014 Using axis technology. Two Types of Day and Night Vision Technologies Wide dynamic range (WDR) describes an attribute of an imaging.
August Privacy & Big Data An Introductory Overview Lecture.
Privacy Forum: Think Big? Privacy in the Age of Big Data Wellington, New Zealand, 2 May 2012 Smart CCTV and the Evolution of Public Space CCTV Systems.
EMI Systems Limited specializes in CCTV surveillance systems that ranges from stand-alone cameras to fully integrated security control centers and to the.
HD WDR IP Camera.
MOTOROLA and the Stylized M Logo are registered in the US Patent and Trademark Office. All other product or service names are the property of their respective.
COMMMONWEALTH OF AUSTRALIA Do not remove this notice.
IBM TJ Watson Research Center © 2010 IBM Corporation – All Rights Reserved AFRL 2010 Anand Ranganathan Role of Stream Processing in Ad-Hoc Networks Where.
Robotics Simulator Intelligent Systems Lab. What is it ? Software framework - Simulating Robotics Algorithms.
February 21, 2008 Center for Hybrid and Embedded Software Systems Organization Board of Directors Edward A. Lee, UC Berkeley.
Pursuit Evasion Games (PEGs) Using a Sensor Network Luca Schenato, Bruno Sinopoli Robotics and Intelligent Machines Laboratory UC Berkeley
Dr. Shankar Sastry, Chair Electrical Engineering & Computer Sciences University of California, Berkeley.
Nov : Review MeetingACCLIMATE Instrumenting Wireless Sensor Networks for Real-Time Surveillance Songhwai Oh Advisor: Shankar Sastry EECS UC Berkeley.
SUPERB-IT Center For Hybrid & Embedded Software Systems COLLEGE OF ENGINEERING, UC BERKELEY July 29, 2005 SUPERB-IT.
Calling all cars: cell phone networks and the future of traffic Presentation by Scott Corey Article written by Haomiao Huang.
Bulk Sending . What we'll look at... Why is important The main features and benefits of the Engaging Networks tool Technology overview.
MCTS: Pass one of 24 exams (a few require more). Multiple counters are and You can also choose.
 At the end of this class, students are able to  Describe definition of input devices clearly  List out the examples of input devices  Describe.
Routing Algorithm for Large Data Sensor Networks Raghul Gunasekaran Group Meeting Spring 2006.
Learning Micro-Behaviors In Support of Cognitive Assistance AlarmNet is a wireless sensor network (WSN) system for smart health-care that opens up new.
Open Sesame Proposal Presentation Denise Garcia Ka Hin Lee Veronica Martinez Jane McGuinness Angela Savela.
TOUCHLESS TOUCH SCREEN
Introduction to Edmodo Train-the-Trainer. Another Testimonial… From: Thomas, Natasha R. Sent: Thursday, November 29, :59 AM To: Charters, Maria.
Sensor Coordination using Role- based Programming Steven Cheung NSF NeTS NOSS Informational Meeting October 18, 2005.
2 Private versus public. 2 Lesson objectives By the end of the session, you will: understand how you might unintentionally disclose personal data; define.
Component 4: Introduction to Information and Computer Science Unit 10: Future of Computing Lecture 2 This material was developed by Oregon Health & Science.
11 Games and Content Session 4.1. Session Overview  Show how games are made up of program code and content  Find out about the content management system.
K E Y : SW Service Use Big Data Information Flow SW Tools and Algorithms Transfer Application Provider Visualization Access Analytics Curation Collection.
Sluzek 142/MAPLD Development of a Reconfigurable Sensor Network for Intrusion Detection Andrzej Sluzek & Palaniappan Annamalai Intelligent Systems.
Component 4: Introduction to Information and Computer Science Unit 10b: Future of Computing.
Shop The internet is an excellent way to communicate and make new friends List the various ways of ‘talking’ through the use of technology: News.
DexterNet Katherine Gilani (UT Dallas) Philip Kuryloski (Cornell) Posu Yan (UC Berkeley) An Open Platform for Heterogeneous Body Sensor Networks and Its.
TRUST NSF Site Visit, Berkeley, March, 2007 Sensor Networks: Technology Transfer Stephen Wicker – Cornell University.
“SIComP” Broward County Communications Upgrade Florida Department of Transportation District 4 November 21, 2005.
The OMG Mobile Agent System Interoperability Facility.
Risk Management. What we offer? We provide IP video monitoring solutions for safety and security through our systems integration capabilities.
Intel Machine Design Lab (EEL5666C) PRESENTATION #2 ROHAN PRAKASH.
1 LOW CURRENT  FIRE & SAFETY………………………………. 1) Fire Alarm ( EDWARDS ) Smoke, Heat and GAS detectors connected to audible and visual devices to convey the.
Eagle Grid: Update voor de Zorg BallanceIT 31 October 2013.
FIRMA April 2010 SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
1 Scope of Internet of Things China Communications Standards Association Heyuan Xu 21th meeting CJK UNIOT-WG Jun , 2011.
 Designed to monitor the movement of people in given area.  Used video cameras to transmit a signal to a specific place on a limited set of monitors.
K E Y : SW Service Use Big Data Information Flow SW Tools and Algorithms Transfer Transformation Provider Visualization Access Analytics Curation Collection.
Enabling the Future Service-Oriented Internet (EFSOI 2008) Supporting end-to-end resource virtualization for Web 2.0 applications using Service Oriented.
Internet Safety Presentation by Diahn Hess. Overview Internet Safety Private and personal information Meeting people online Safe interactions Cyberbullying.
Ad Hoc Network.
1.Research Motivation 2.Existing Techniques 3.Proposed Technique 4.Limitations 5.Conclusion.
Telecommunication Networks Group Technische Universität Berlin Towards Cooperating Objects: Communication for Cooperation Prof. Dr.-Ing. Adam Wolisz with.
Multimedia Systems and Communication Research Multimedia Systems and Communication Research Department of Electrical and Computer Engineering Multimedia.
Maximizing Angle Coverage in Visual Sensor Networks Kit-Yee Chow, King-Shan Lui and Edmund Y. Lam Department of Electrical and Electronic Engineering The.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
Embedded, Real-Time and Wireless Systems Professor Jack Stankovic Department of Computer Science University of Virginia June 2, 2005.
Overview Objective Track an unknown number of targets using a wireless sensor network of binary sensors for real-time surveillance Issues Real-time operation.
Problem Description: One line explanation of the problem to be solved Problem Description: One line explanation of the problem to be solved Proposed Solution:
K E Y : DATA SW Service Use Big Data Information Flow SW Tools and Algorithms Transfer Hardware (Storage, Networking, etc.) Big Data Framework Scalable.
Efficient Opportunistic Sensing using Mobile Collaborative Platform MOSDEN.
Digital-watchdog.com DWC-MF10M36TIR DWC-MF10M8TIR DWC-MF10M28T Presenter’s Name Title | Rev : 04/15 Product Overview 720P Network.
It is Your mobile is now much more than just a communication device - more like a remote control for your life. You still call it a "mobile" from.
February 11, 2016 Center for Hybrid and Embedded Software Systems Organization Faculty Edward A. Lee, EECS Alberto Sangiovanni-Vincentelli,
February 14, 2013 Center for Hybrid and Embedded Software Systems Organization Faculty Edward A. Lee, EECS Alberto Sangiovanni-Vincentelli,
TrueView People Counter
Electronic Records Management Program
Limited time promotion expires December 31, 2009
William Claycomb and Dongwan Shin
Distributed Control Applications Within Sensor Networks
An overview of the CHESS Center
Outline Kulkarni, P., Ganesan, D., Shenoy, P., and Lu, Q. SensEye: a multi-tier camera sensor network. In Proceedings of the 13th Annual ACM international.
Presentation transcript:

Nov : Review MeetingACCLIMATE Security, Privacy, and Sensor Networks Marci Meingast Shankar Sastry UC Berkeley

Nov : Review MeetingACCLIMATE Camera Networks Goal: To track objects and obtain beneficial data from a network of cameras Setup: –Heterogeneous Cameras Fixed and Mobile Cameras Different Platforms Different External and Internal Properties –How can the different qualities from the different types of cameras be used to maximize results?

Nov : Review MeetingACCLIMATE Items of Interest How can camera types be used to maximize security benefits? How to use mobile cameras for object location and tracking –Cell phone –WebCam –Motes with Cameras

Nov : Review MeetingACCLIMATE Privacy Interests What expectations do people have in this place? What level of security is necessary to promote privacy and confidentiality? When is necessary access private information in order to provide better security? Issues: –Camera click notice –Privacy Zone (Barak Obama) –ECPA (Electronic Communications) Example: Sproul Plaza Network –Limit on zoom capabilities –Limited pan –Rules governing storage of images

Nov : Review MeetingACCLIMATE Security Interests MLS (Multiple Levels of Security) –Who is allowed to see what? –Dynamic Coalition Issue Data Privacy –Background image transfer –Document/Object communication –Storage of transferred data Machine Intelligence –Making sure it transfers appropriate message

Nov : Review MeetingACCLIMATE Incorporation of Other Sensors Low power, Low level infrared sensors –Detect object movement and location –Can trigger higher level sensors –Can provide redundant data Current work –Heirarchical reputation systems Built on top of MCMCDA tracking –Incorporation of low level data with high level visual data