Networks for Security Applications Defense Security Innovation Quebec City, Nov. 16, 2007 Prof. Howard M. Schwartz.

Slides:



Advertisements
Similar presentations
Wireless Sensor Networks Studies and experiences at ISMB Torino, Italy Edoardo Calia Human Factors and the Digital Home Workshop ETSI, Sophia.
Advertisements

“Challenges and Methodologies
CWE, EC – ESA joint activities on e-collaboration Brussels, 13 April 2005 IST Call 5 Preparatory workshop.
A Mobile Ad hoc Biosensor Network Muzammil KP S7,ECE Govt. Engg. College, Wayanad.
Electrical & Computer Engineering Department Ryerson University EDP Topics of Xavier Fernando
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
1 Computer Engineering Department College of Computer Sciences and Engineering Tuesday 18 November 2008 King Fahd University of Petroleum & Minerals.
1 Sensor Networks and Networked Societies of Artifacts Jose Rolim University of Geneva.
Prepared By: Kopila Sharma  Enables communication between two or more system.  Uses standard network protocols for communication.  Do.
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada Multimedia Streaming in Dynamic Peer-to-Peer Systems and Mobile Wireless.
Mobile Online Intelligent Decision Support System Rick Smith, Dr. Stacey Lyle and Dr. Patrick Michaud-Division of Nearshore Research Conrad Blucher Institute.
Dimitrios Hatzinakos, Ph.D., P.Eng Professor, ECE Dept., UofT Bell Canada Chair in Multimedia Director, Identity, Privacy and Security Initiative (IPSI)
University of Zilina Slovakia. Brief history The University of Zilina was established on October 1, 1953 as the University of Railway Transport in Prague.
Satellite Communications Systems and Emergency Communications Dr. Joseph S. Bravman Omnisat, LLC December 12, 2005.
Secure Group Communications in Wireless Sensor Networks December 8, 2003 CS 526 Advance Internet and Web Systems Patrick D. Cook.
Supporting Classroom Interaction with Networked Tablet PCs Richard Anderson Professor of Computer Science and Engineering University of Washington.
Wireless Sensor Network for Tracking the Traffic in INTERNET Network Routers Supervisor: Mark Shifrin Students: Yuriy Kipnis Nir Bar-Or Networked Software.
Smart Home Technologies CSE 4392 / CSE 5392 Spring 2006 Manfred Huber
Jadavpur University Centre for Mobile Computing & Communication Implementation of Ad-Hoc Mesh Network Presentation by: Sudipto Das Rajesh Roy.
Mobile Computing: Wireless Mesh and Sensor Networks Thomas Kunz Professor and Director Technology Innovation Management Program Carleton University.
Smart Cities & Smart Utility
CU-Boulder Timothy X Brown Interdisciplinary Telecommunications Electrical and Computer Engineering University of Colorado Presented at the RECUV Workshop.
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
FACULTY OF COMPUTER SCIENCE & INFORMATION TECHNOLOGY.
Networks of Autonomous Unmanned Vehicles Prof. Schwartz Presentation to Dr. Ponsford of Raytheon May 20, 2008.
Multiple Autonomous Ground/Air Robot Coordination Exploration of AI techniques for implementing incremental learning. Development of a robot controller.
Intelligent Mobile Robotics Czech Technical University in Prague Libor Přeučil
4G-LTE: Enhancing Efficiency in Organizations. Factors Impacting Digitization Processes and Systems January Powerful Platforms and Devices Storage.
COLUMBIA UNIVERSITY Department of Electrical Engineering The Fu Foundation School of Engineering and Applied Science IN THE CITY OF NEW YORK Networking.
Research Projects in the Mobile Computing and Networking (MCN) Lab Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University.
Distributed Computation in MANets Robot swarm developed by James Rice University.
NC-BSI 2.3: Smart Border Systems for Localization and Tracking Problem Statement/Objectives Develop methods which will allow accurately, robustly and ubiquitously.
Seung-Hoon Lee, Sewook Jung, Alexander Chang, Dea-Ki Cho, and Mario Gerla Network Research Lab Department of Computer Science University of California,
Linked-data and the Internet of Things Payam Barnaghi Centre for Communication Systems Research University of Surrey March 2012.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY. THE AUTHORS Phd, Information Systems from New York University Management information systems, University.
1 Wireless Networks and Services 10 Years Down the Road Ross Murch Professor, Electronic and Computer Engineering Director, Centre for Wireless Information.
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
Introduction Infrastructure for pervasive computing has many challenges: 1)pervasive computing is a large aspect which includes hardware side (mobile phones,portable.
Event Management System. The system provides a solution during routine, emergency situations and unusual events It can provide the latest information.
AD-HOC NETWORK SUBMITTED BY:- MIHIR GARG A B.TECH(E&T)/SEC-A.
5 PR Praktikum aus Informatik Gabriele Kotsis Summer Term 2009.
Networked Embedded and Control Systems WP ICT Call 2 Objective ICT ICT National Contact Points Mercè Griera i Fisa Brussels, 23 May 2007.
SMUCSE 8394 BTS – Communication Technologies. SMUCSE 8394 Objectives To establish and maintain a unifying exchange and sharing framework for different.
REU 2004 Computer Science and Engineering Department The University of Texas at Arlington Research Experiences for Undergraduates in Distributed Rational.
1 Structure of Aalborg University Welcome to Aalborg University.
Marv Adams Chief Information Officer November 29, 2001.
Networks of Autonomous Unmanned Vehicles Prof. Schwartz Prof. Esfandiari Prof. P. Liu Prof. P. Staznicky.
Wireless Ad Hoc Networks
Computer Science and Engineering Department The University of Texas at Arlington MavHome: An Intelligent Home Environment.
PROWIND (Positioning Relay over Wirelessly Networked Devices) Team Members: Mark Buising, Douglas Chow, Nazeni Mkrtchyan, Jesus Rodriguez, Jennifer Webb.
Telematics derived from the Greek words “Tele” and “matos”, Tele means (far away) and matos means (derivative of Greek word machinari), Combinedly telematics.
Security of the Internet of Things: perspectives and challenges
1 New trends and opportunities in the Netherlands Gaming/Simulation - Sofos Consultancy - ict for development, government and learning Different projects:
GIS From the back office to the enterprise Ciaran Kirk Technical Director, IMGS.
Innovative ICT Building a Better Smart City. Agenda 1. Why focus on Smart City 2. What is a Smart City 3. References.
Presented by Edith Ngai MPhil Term 3 Presentation
EE5900 Cyber-Physical Systems
UKSG Introduction to Journals and E-Resources
Connected Vehicle Technology
SMART BUILDING WITH INDOOR NAVIGATION SYSTEM -using iot
Traditionally innovative
Wireless Ad-Hoc Networking
Mobile ad hoc networking: imperatives and challenges
Networks of Autonomous Unmanned Vehicles
Wireless Ad Hoc Networks
HUMAN AND SYSTEMS ENGINEERING:
Collaborative Smart House Environment Computer Science Department University of Cyprus Contact: Christodoulou Eleni.
5G as a Social Infrastructure Chaesub LEE, Director, ITU
Presentation transcript:

Networks for Security Applications Defense Security Innovation Quebec City, Nov. 16, 2007 Prof. Howard M. Schwartz

Slide Name 2 Presentation Outline,Who we are. –Research Centre in Technology Innovation (RCTI).,Networks for Security Applications.,Wireless Sensor Networks.,Sensors, Circuits and Devices for Security.,Networks and Swarms of Autonomous Vehicles (UAVs).,Network Intelligence and evolution,Simulation,Conclusion

Slide Name Who is RCTI?,31 Professors at all levels.,From 6 Departments and 3 Faculties. –Systems and Computer Eng., Electronics, Mechanical Eng., Computer Science, Information Technology and Business.,Advance research and scholarly activity in electrical and systems engineering, computing science, and the development and commercialization of new products,Link R&D carried out by Carleton faculty and graduate students with companies.,Be a valuable source of talent, knowledge, prototypes, and technology to innovative companies.,Member of Technopôle Security and Defense

Slide Name Networks of things Networks that perceive, understand and take action for security applications. - Border security - Industrial control and security - Power grid control and security - Transportation systems - Telephone, internet communication systems

Slide Name Example of a Complex Network (Scenario developed by RUNES project:

Slide Name Wireless Ad Hoc Network,Air drop wireless sensors over region. The system establishes its communication topology. Low power, low cost devices that are easily augmented and replaced.

Slide Name Research For Wireless Networks –Facilitate the collection of sensor data from a collection of resource-constrained sensor systems, connected wirelessly. How should the sensors talk to each other? –Support new applications and the re-tasking of wireless nodes. –Support easy integration of new sensors. –Efficient distribution of the information from the sensors to various interested parties (first responders, airport authorities, etc.). –Combine/fuse data derived from different sites. –Wireless mesh testbed, consisting of 14 custom-build mesh routers and a range of client devices (PDAs, laptops, etc.).

Slide Name Cyber-infrastructure for Bridge Monitoring  Continuously monitoring bridges in the country is an important goal  Management of Bridge Infrastructure can save life and reduce maintenance cost  Monitoring of large number of bridges, managing and making information available at finger tips, automated health & condition assessments and management, maintenance and emergency response are various facets of this problem  Monitored data can be of various types: sensor data, video data, acoustic, visual inspection etc.

Slide Name Border Security

Slide Name The Real Border Fence

Slide Name Research Directions in Sensors and Vehicles (The Things),Biosensors and authentication.,Autonomous vehicles (Land, Air and Sea).,Video sensors (Cameras)and video understanding. –Super resolution enhancement.

Slide Name Bio-sensors,The heart rate and breathing monitor.

Slide Name,Biometrics from biosensors provide some promising solutions to the authentication problems. FingerprintFace IrisRetina Voice Finger vein Cardio-based

Slide Name,Military tactical mobile ad hoc networks (MANETs) challenge security design.,As the front line of defence, authentication is the core requirements for integrity and confidentiality in networked centric warfare.

Slide Name Research into Wireless Bio Sensors. –development and evaluation of biosensor wireless networking and management schemes that take into account wireless communication, power consumption and computational resource requirements, –development and evaluation of biometric-based user authentication and encryption for high security wireless communications,

Slide Name Autonomous Vehicles

Slide Name Cooperative robots and intelligence Robots have own control and navigation algorithms Robots only know their position and others

Slide Name Video Processing and Understanding Tracking of video objects

Slide Name Intelligent Video Object Tracking Tracking, counting and timing of video objects.

Slide Name Networks of Robots and Sensor Swarms

Slide Name Swarm Intelligence and Personality Evolution,Game Theory, Coalition formation.,Evolutionary Game Theory.,Learning (fuzzy, adaptive, genetic).,Personality Traits.

Slide Name Simulation,A rich simulation environment for network development, operator training and visual display.

Slide Name Conclusions,The Research Centre in Technology innovation is a unique grouping of 31 faculty and 100’s of students. The goal is to work closely with industry to bring new innovative ideas to market.,The research is focused on networks of sensors and devices.,Applications in Security and Defense.,Expertise and research in sensors, wireless systems, autonomous vehicles and computer networks.,Research into network intelligence, swarm intelligence and adaptive and learning systems.,Networks that perceive, understand and take action.