J. Kaiser University of Ulm Dept. Of Comp. Structures Jörg Kaiser Dept. Of Computer Structures University of Ulm And gets.

Slides:



Advertisements
Similar presentations
Future Internet Assembly: THE REAL WORLD INTERNET Knowledge Café on Device Technologies The knowledge café on Device Technologies addresses the functional.
Advertisements

All rights reserved © 2000, Alcatel 1 CPE-based VPNs Hans De Neve Alcatel Network Strategy Group.
Lecturer: Sebastian Coope Ashton Building, Room G.18 COMP 201 web-page: Lecture.
1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
AAI and universities Roles and functions. The Smart Card Architect Objectives zBuild a secure Authentication and Authorization Infrastructure between.
An Overview of Peer-to-Peer Networking CPSC 441 (with thanks to Sami Rollins, UCSB)
1 Sensor Networks and Networked Societies of Artifacts Jose Rolim University of Geneva.
FYP Project LYU0301: Secure and Reliable PDA-Based Communication System.
Computers © 2005 Prentice-Hall, Inc.Slide 1. Computers Chapter 6 Networks and Networking © 2005 Prentice-Hall, Inc.Slide 2.
Connecting the Invisible Extremes of Computing David Culler U.C. Berkeley Summer Inst. on Invisible Computing July,
CS 441: Charles Durran Kelly.  What are Wireless Sensor Networks?  WSN Challenges  What is a Smartphone Sensor Network?  Why use such a network? 
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 12 Slide 1 Distributed Systems Design 1.
Self-Organizing Adaptive Networks Hari Balakrishnan MIT Laboratory for Computer Science
Large-scale organization of metabolic networks Jeong et al. CS 466 Saurabh Sinha.
CS431 Distributed Systems
Introduction to the Atlas Platform Mobile & Pervasive Computing Laboratory Department of Computer and Information Sciences and Engineering University of.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
® 2007 Solid Information Technology Data Management for Automotive Standardization requirements Franz-Josef Maintz Solid Information Technology
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
CS Dept, City Univ.1 Internet of Things: Doubts and Reality Xiaohua Jia Dept. of Computer Science City University of Hong Kong.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Distributed Computation in MANets Robot swarm developed by James Rice University.
 Protocols used by network systems are not effective to distributed system  Special requirements are needed here.  They are in cases of: Transparency.
Scalable Web Server on Heterogeneous Cluster CHEN Ge.
Copyright John C. Knight SOFTWARE ENGINEERING FOR DEPENDABLE SYSTEMS John C. Knight Department of Computer Science University of Virginia.
Architectural Design lecture 10. Topics covered Architectural design decisions System organisation Control styles Reference architectures.
© 2012 xtUML.org Bill Chown – Mentor Graphics Model Driven Engineering.
Distributed Systems and Algorithms Sukumar Ghosh University of Iowa Spring 2011.
Copyright © 2002 Intel Corporation. Intel Labs Towards Balanced Computing Weaving Peer-to-Peer Technologies into the Fabric of Computing over the Net Presented.
Adapted from the original presentation made by the authors Reputation-based Framework for High Integrity Sensor Networks.
Evoting using collaborative clustering Justin Gray Osama Khaleel Joey LaConte Frank Watson.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
Internetworking Concept and Architectural Model Chapter 3.
Distributed Computing Environment (DCE) Presenter: Zaobo He Instructor: Professor Zhang Advanced Operating System Advanced Operating System.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
1 Ubiquitous Computing Nov. 15, 2006 Ki-Joune Li.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Two trends that will change the Internet
Virtual Machines Created within the Virtualization layer, such as a hypervisor Shares the physical computer's CPU, hard disk, memory, and network interfaces.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Communications and Networks Chapter 9 9-1Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Computer Science and Engineering 1 Mobile Computing and Security.
ICSA 341 Data communications & Computer Networks Switching In the WAN, mesh networks are not practical for geographically spread areas with many nodes.
Modified Onion Routing GYANRANJAN HAZARIKA AND KARAN MIRANI.
What is a distributed system? A network of processes. The nodes are processes, and the edges are communication channels.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 - Essentials of Design an the Design Activities.
Decentralized Access to Medical Images in Research and Enterprise PACS Tomáš Kulhánek, Milan Šárek
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Towards ‘Ubiquitous’ Ubiquitous Computing: an alliance with ‘the Grid’ Oliver Storz, Adrian Friday, and Nigel Davies Computing Department, Lancaster University,
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Security of the Internet of Things: perspectives and challenges
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Network Architecture Characteristics  Explain four characteristics that are addressed by.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Communicating over the Network Network Fundamentals – Chapter 2.
- Richard Bhuleskar “At the end of the day, the goals are simple: safety and security” – Jodi Rell.
IoT R&I on IoT integration and platforms INTERNET OF THINGS
Modified Onion Routing GYANRANJAN HAZARIKA AND KARAN MIRANI.
Wireless M2M System Architecture for Data Acquisition and Control Elmira Dichkova Bachvarova Central Laboratory of Mechatronics and Instrumentation Bulgarian.
Distributed Systems CS
CSE 4340/5349 Mobile Systems Engineering
Chapter 9 Internetworking
A Scalable content-addressable network
Mobile Agents.
Distributed Systems CS
Internet of Things (IoT)
In-network computation
Distributed Systems and Algorithms
Presentation transcript:

J. Kaiser University of Ulm Dept. Of Comp. Structures Jörg Kaiser Dept. Of Computer Structures University of Ulm And gets a lot harder !!! The Computer disappears- The Problem remains ! Challenges in Providing Security in Large Scale Co-Operative Embedded Systems or

J. Kaiser University of Ulm Dept. Of Comp. Structures Sea of SoCs A SoC may encapsulate sensors and/or actuators. A SoC may include hardware/software and mechanical elements (mechatronics). Co-operating Virtual Sensor and Actuator Networks: Large heterogeneous networks of smart sensors and actuators Co-operation of distributed sensors to augment perception of the environement Co-operation of actuators to increase speed, power and quality of actuation High Degree of Interaction and complex mesh of communication System Anonymous, Content-based Communication Models Communication is driven by the active generation of information Messages are routed by content rather than by address Model of a shared information space:

J. Kaiser University of Ulm Dept. Of Comp. Structures interaction structure in co-operative systems: dynamic evolution of interaction topology managebility as: point-to-point connections or client-server structure

J. Kaiser University of Ulm Dept. Of Comp. Structures Network Topology anonymous communication Source of Information is not necessarily known ! How to use its public key? messages may be routed by content rather than by address Routing nodes must read msg content ! Encryption a problem ! producer consumer

J. Kaiser University of Ulm Dept. Of Comp. Structures acceleration speed priority Co-operating vehicles speed position distance direction position warning speed

J. Kaiser University of Ulm Dept. Of Comp. Structures Availability and Integrity of Data become the crucial issues ! How to develop criteria for trusting anonymous information sources ? Based on continuous suspicion ? Authentification of anonymous data ? Certification of anonymous data ? SoCs may provide good conditions to embed security mechanisms ! Can we learn from fault-tolerant computing ? How to develop security in a system where we cannot relate information to individual entities? (in a quickly changing environment)