TRUST, Washington, D.C. Meeting January 9–10, 2006 Securing Public Spaces with Sensor Networks: Science, Technology, and Privacy Stephen Wicker Cornell.

Slides:



Advertisements
Similar presentations
DS-01 Disaster Risk Reduction and Early Warning Definition
Advertisements

Applying the Human Views for MODAF to the conception of energy-saving work solutions Dr Anne Bruseberg Systems Engineering & Assessment Ltd, UK on behalf.
Introduction to Cyber Physical Systems Yuping Dong Sep. 21, 2009.
OASIS Reference Model for Service Oriented Architecture 1.0
On Privacy-aware Information Lifecycle Management (ILM) in Enterprises: Setting the Context Marco Casassa Mont Hewlett-Packard.
1 Sensor Networks and Networked Societies of Artifacts Jose Rolim University of Geneva.
Unified Logs and Reporting for Hybrid Centralized Management
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
MS DB Proposal Scott Canaan B. Thomas Golisano College of Computing & Information Sciences.
Thoughts on Sensing Systems and Workshop Overview Stephen B. Wicker.
March 13, 2004Securing Privacy Conference1 SENSOR NETWORKS & PRIVACY Pamela Samuelson, UC Berkeley, Securing Privacy Conference, March 13, 2004.
Grids and Grid Technologies for Wide-Area Distributed Computing Mark Baker, Rajkumar Buyya and Domenico Laforenza.
CS Dept, City Univ.1 Research Issues in Wireless Sensor Networks Prof. Xiaohua Jia Dept. of Computer Science City University of Hong Kong.
Cloud Usability Framework
Smart Integrated Infrastructure The Progression of Smart Grid Presentation to National League of Cities Martin G. Travers – President, Telecommunications.
Don Von Dollen Senior Program Manager, Data Integration & Communications Grid Interop December 4, 2012 A Utility Standards and Technology Adoption Framework.
Distributed Real-Time Systems for the Intelligent Power Grid Prof. Vincenzo Liberatore.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 12 Slide 1 Distributed Systems Architectures.
Univ. Notre Dame, September 25, 2003 Support for Run-Time Adaptation in RAPIDware Philip K. McKinley Software Engineering and Networking Systems Laboratory.
APC InfraStruxure TM Central Smart Plug-In for HP Operations Manager Manage Power, Cooling, Security, Environment, Rack Access and Physical Layer Infrastructure.
B.Ramamurthy9/19/20151 Operating Systems u Bina Ramamurthy CS421.
College of Engineering Non-uniform Grid- based Coordinated Routing Priyanka Kadiyala Major Advisor: Dr. Robert Akl Department of Computer Science and Engineering.
Active Monitoring in GRID environments using Mobile Agent technology Orazio Tomarchio Andrea Calvagna Dipartimento di Ingegneria Informatica e delle Telecomunicazioni.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
USDOT, RITA RITA: Oversight of USDOT’s R&D programs  University Transportation Centers $100M  UTC Consortia $80M  UTC Multimodal R&D $40M  Intelligent.
Wireless Networks Breakout Session Summary September 21, 2012.
Planning for Arctic GIS and Geographic Information Infrastructure Sponsored by the Arctic Research Support and Logistics Program 30 October 2003 Seattle,
IoT, Big Data and Emerging Technologies
TRUST NSF Site Visit, Berkeley, March, 2007 Sensor Networks: Technology Transfer Stephen Wicker – Cornell University.
An Overview of the Smart Grid David K. Owens Chair, AABE Legislative Issues and Public Policy Committee AABE Smart Grid Working Group Webinar September.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Overview Privacy Management Reference Model and Methodology (PMRM) John Sabo Co-Chair, PMRM TC.
Environmental Management System Definitions
Objectives Functionalities and services Architecture and software technologies Potential Applications –Link to research problems.
MOBILE AGENTS What is a software agent ? Definition of an Agent (End-User point of view): An agent is a program that assists people and acts on their behalf.
1 4/23/2007 Introduction to Grid computing Sunil Avutu Graduate Student Dept.of Computer Science.
Responding to the Unexpected Yigal Arens Paul Rosenbloom Information Sciences Institute University of Southern California.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
Issues Autonomic operation (fault tolerance) Minimize interference to applications Hardware support for new operating systems Resource management (global.
October 7, 1999Reactive Sensor Network1 Workshop - RSN Update Richard R. Brooks Head Distributed Intelligent Systems Dept. Applied Research Laboratory.
Networked Embedded and Control Systems WP ICT Call 2 Objective ICT ICT National Contact Points Mercè Griera i Fisa Brussels, 23 May 2007.
Department of Electronic Engineering Challenges & Proposals INFSO Information Day e-Infrastructure Grid Initiatives 26/27 May.
10/03/05 Johan Muskens ( TU/e Computer Science, System Architecture and Networking.
Information Systems for Water, Land & Ecosystems Towards evidence-based decision making for sustainable agricultural intensification Ecosystem Health –
1 BBN Technologies Quality Objects (QuO): Adaptive Management and Control Middleware for End-to-End QoS Craig Rodrigues, Joseph P. Loyall, Richard E. Schantz.
Programming Sensor Networks Andrew Chien CSE291 Spring 2003 May 6, 2003.
Distributed Data Analysis & Dissemination System (D-DADS ) Special Interest Group on Data Integration June 2000.
© 2014 IBM Corporation Does your Cloud have a Silver Lining ? The adoption of Cloud in Grid Operations of Electric Distribution Utilities Kieran McLoughlin.
Sustainability Science in North America: towards ICSS 2012 ”Knowledge to Action for Sustainability” James Buizer Science Policy Advisor to the President,
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Wireless Sensor Networks
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #25 Dependable Data Management.
TRUST Research on Physical Infrastructure Control, Monitoring, and Security Prof. Stephen Wicker Cornell University.
TRUST Self-Organizing Systems Emin G ü n Sirer, Cornell University.
Alex Ezrakhovich Process Approach for an Integrated Management System Change driven.
Cyberinfrastructure Overview of Demos Townsville, AU 28 – 31 March 2006 CREON/GLEON.
Business Challenges in the evolution of HOME AUTOMATION (IoT)
A Layered Solution to Cybersecurity Dr. Erfan Ibrahim Cyber-Physical Systems Security & Resilience Center National Renewable Energy Laboratory.
MANAGEMENT OF CORPORATE SOCIAL RESPONSIBILITY. PLAN 1. The institute of the civilized business: the essence and functions 2. The standards of CSR management.
Delivering Global Goals in human settlements and city regions by 2030 with data partnerships #roadmap rd May 2016 WMO, Geneva Stephen Passmore Head.
Innovative ICT Building a Better Smart City. Agenda 1. Why focus on Smart City 2. What is a Smart City 3. References.
Understanding The Cloud
Europe’s Environment Assessment of Assessments EE-AoA 2011
TRUST:Team for Research in Ubiquitous Secure Technologies
Carl Data Solutions Collects Utility Sensor and Meter Data to Provide Advanced Reporting, Alarming, and Analytics with Microsoft Azure MICROSOFT AZURE.
Distributed Control Applications Within Sensor Networks
Service Oriented Architectures (SOA): What Users Need to Know.
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

TRUST, Washington, D.C. Meeting January 9–10, 2006 Securing Public Spaces with Sensor Networks: Science, Technology, and Privacy Stephen Wicker Cornell University

TRUST, Washington, D.C. Meeting January 9–10, 2006 TRUST Activity TRUST is engaged in the development of embedded secure sensor networks – Integrated center R&D at all levels Sensor Technology Networks Applications Policy/Legal Issues Activity at several members schools and Oak Ridge is being merged into capstone projects – Goal: Demonstration technologies and implemented policies

TRUST, Washington, D.C. Meeting January 9–10, 2006 Sensor Technology - The Mote

TRUST, Washington, D.C. Meeting January 9–10, 2006 Sensors for Bio-Defense Bi-layer lipid membrane used to create designer bio- sensors – When target analyte binds to protein, ion channel conductivity increases. Currently considering use in water supply protection. Sensor performance statistics used to define networking requirements. Outside Player: NY Dept of Health/ Wadsworth Laboratories

TRUST, Washington, D.C. Meeting January 9–10, 2006 Long-Term Power Sources for Embedded Sensors Radiation-powered batteries for embedded sensor platforms – Radio-isotopes have the possibility of a 50 year life with a continuous power density of ma/cm 3. SiC based beta-voltaic cell has been developed and tested. Best measured power density for Ni-63 source 5.6nW/cm 2 with 4.4% efficiency. Best measured power density for tritium source ~1uW/cm 2 with 10% efficiency.

TRUST, Washington, D.C. Meeting January 9–10, 2006 Sensor Platform Technologies CU Asynchronous Processor – Event-driven execution is ideal for sensor platforms Clockless logic – Spurious signal transitions (wasted power) eliminated – Hardware only active if it is used for the computation MIPS: high- performance – 24pJ/ins and V ProcessorBusYearE/opOps/sec Atmel8200?1-4 nJ4 MIPS StrongARM32200?1.9 nJ130 MIPS MiniMIPS nJ*22 MIPS Amulet3i nJ*80 MIPS 80C51 (P) nJ**4 MIPS Lutonium pJ4 MIPS SNAP pJ28 MIPS

TRUST, Washington, D.C. Meeting January 9–10, 2006 Designer OS for Sensor Networks Tiny OS – Large, active open source community: – 500 research groups worldwide – OEP for DARPA Network Embedded Systems Technology – Thousands of active implementations - the world’s largest (distributed)sensor testbed MagnetOS: Provide a unifying single- system image abstraction – The entire network looks like a single Java virtual machine – MagnetOS performs automatic partitioning Converts applications into distributed components that communicate over a network – MagnetOS provides transparent component migration Moves application components within the network to improve performance metrics MagnetOS Rewriter

TRUST, Washington, D.C. Meeting January 9–10, 2006 Sextant: Node Localization Use of large numbers of randomly distributed nodes creates need to discover geographic location – GPS is bulky, expensive, power-hungry Set up a set of geographic constraints and solve it in a distributed fashion – Aggressively extract constraints – Use just a few landmarks (e.g. GPS nodes) to anchor the constraints Can determine node location with good accuracy, without GPS or other dedicated hardware

TRUST, Washington, D.C. Meeting January 9–10, 2006 SHARP: Hybrid Routing Protocol Two extremes in routing – Proactive: disseminate routes regardless of need – Reactive: discover routes when necessary Neither are optimal for dynamic sensor networks SHARP adaptively finds the balance point between reactive and proactive routing – Enables multiple nodes in the network to optimize the routing layer for different metrics – Outperforms purely reactive and proactive approaches across a range of network conditions

TRUST, Washington, D.C. Meeting January 9–10, 2006 Self-Configuration at all Levels Motivations for Game Theory/Mechanism Design – Efficiency: ability of market-based distributed control mechanisms to move complex networks toward optimal operating points. – Scalability:distributed decision-making inherent in market settings. Interaction and decisions are local, obviating the need for a global perspective (which is both memory- and computationally-intensive). Critical Tools: Equilibrium concepts, utility-based decision making, and bargaining. ECE, CS, and Economics at several schools

TRUST, Washington, D.C. Meeting January 9–10, 2006 Securing the Sensor Network Key Thrust at CMU – Secure building blocks Secure key distribution Secure node-to-node and broadcast communication Secure routing Secure information aggregation – Real-time aspects and security – Secure middleware – Secure information processing – Sensing biometrics – Sensor database processing – Internet-scale sensor networks

TRUST, Washington, D.C. Meeting January 9–10, 2006 Application: Security in Public Spaces July 2005 London bombings highlights need for sensors in public places – Also the extent of ongoing surveillance – See also Tokyo gas attacks, etc. More modern infrastructure in most US urban settings creates opportunities.

TRUST, Washington, D.C. Meeting January 9–10, 2006 Sensor Networks in Public Places Protecting Infrastructure – Opportunities for embedding sensor networks Transportation Storage and Delivery of Water and Fuel Power Grid – TRUST is emphasizing development of supporting technology for randomly distributed sensors Buildings – Combine surveillance with energy control – Integrate into building materials Open Spaces (parks, plazas, etc.) – Combine surveillance with environmental monitoring – Line-of-sight surveillance technologies

TRUST, Washington, D.C. Meeting January 9–10, 2006 Oak Ridge/SensorNet Network Services Single Domain Multiple Domains Regional Level National Warning and Alert System

TRUST, Washington, D.C. Meeting January 9–10, 2006 Transportation Based Threat Assessment Demonstration Trucks can by-pass Mobile system under development Rapidly Deployable Low profile Integrated into Law Enforcement Establish truck RAD profile Predict manifest RAD profile Fuse external data sources Compare with past scans Determine if acceptable

TRUST, Washington, D.C. Meeting January 9–10, 2006 Privacy Issues Arise*… Technology leaves policy behind – Internet-controllable cameras in Berkeley plaza – Kyllo case Many sensor networks collect personally identifiable information (PII) – (Intended) Monitoring activities of the elderly so they can safely live at home – Network of highway monitors that can sense FastTRAK transponders in automobiles – (Unintended) - Sensing persons in buildings as part of embedded sensing for disaster preparedness or light savings Comprehensive information privacy regulations in EU and other countries, but not in US *Thanks to P. Samuelson, D. Mulligan, Bolt School of Law

TRUST, Washington, D.C. Meeting January 9–10, 2006 Constitutional Boundaries? US v. Miller: persons have no protectable privacy interest in data about them held by third parties – e.g., images of personal checks held by banking institutions – sensor network data will be in hands of others Kyllo v. US: use of heat-sensing technology violated 4 th A. (5-4 decision) – "[w]here, as here, the Government uses a device that is not in general public use, to explore details of the home that would previously have been unknowable without physical intrusion, the surveillance is a 'search' and is presumptively unreasonable without a warrant.” Justice Scalia – "observations were made with a fairly primitive thermal imager that gathered data exposed on the outside of [Kyllo's] home but did not invade any constitutionally protected interest in privacy," and were, thus, "information in the public domain.” Justice Stevens, in dissent

TRUST, Washington, D.C. Meeting January 9–10, 2006 Policy Development Extend Fair Information Practices – Limitations on collection of data (only get what you need); destroy data after need is fulfilled – Right to collect data for specific purpose only (if want to reuse for other purpose, you have to get new permission) – Notice of data collection/purpose and consent – Obligations to keep data accurate, secure – Subject has right of access to check data accuracy, insist on changes – Accountability if data is incorrect or disclosed

TRUST, Washington, D.C. Meeting January 9–10, 2006 TRUST Capstone Projects Integrate Science, Technology, and Policy – Oak Ridge SensorNet Project Balancing security against privacy Issues: Limiting acuity to meet security needs only – Remote Sensing/Medical Portal Project Remote monitoring of cardiac patients Issues: Privacy-aware transport, variable levels of access – Museum Project Expressive AI projects using sensors to monitor patrons at public demonstrations Issues: Minimization of acuity, single-use, notification Policy Development – Cross-cutting effort to refine best practices in light of new and future sensor technologies.

TRUST, Washington, D.C. Meeting January 9–10, 2006 Security Thrusts Develop Taxonomy of Attacks – Attacks with and without defined defenses – Generic basis on which to evaluate new networks Characterizing Worst-Case Results – Statistical learning proposed as a means for determining what can be inferred from data – One basis for evaluating privacy concerns Ties into privacy road map

TRUST, Washington, D.C. Meeting January 9–10, 2006 Privacy Thrusts Noted that policy instruments lag technology development Proposed development of Privacy Road Map that will frontload policy development – Map sensor capabilities and network mission into deployment and data use rules – Key near-term: RFIDs, broad-based visual surveillance – Raises issue of impact of network configuration and heterogeneity on road map Approach: Extend fair information practices to cover sensor nets at regulatory or legislative level – Consent enablement is an important issue