Cooperative Robotics and Sensor Networks Isaac Rieksts My web site

Slides:



Advertisements
Similar presentations
J. Kaiser University of Ulm Dept. Of Comp. Structures Jörg Kaiser Dept. Of Computer Structures University of Ulm And gets.
Advertisements

Avionics Panel Go For Luna Landing! Graham ONeil United Space Alliance March 2008.
1 Denial of Service in Sensor Networks Authors: Anthony D. Wood, John A. Stankovic Presented by: Aiyaz Amin Paniwala.
Security Issues in Wireless Sensor Networks -Ninad Naik.
Computing Studies Is it for me? Click here to find out…
 IPv6 Has built in security via IPsec (Internet Protocol Security). ◦ IPsec Operates at OSI layer 3 or internet layer of the Internet Protocol Suite.
Electrical & Computer Engineering Department Ryerson University EDP Topics of Xavier Fernando
Secure Real Time Embedded Systems Sherif Khattab and Daniel Mossé University of Pittsburgh Computer Science Department.
MOSQUITO BREEDING ATTACK: Spread of bots using Peer To Peer INSTRUCTOR: Dr.Cliff Zou PRESENTED BY : BHARAT SOUNDARARAJAN & AMIT SHRIVATSAVA.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir.
More information Examination (date: 19 december) Written exam based on: - Reader (without paper 12 by Marsland and Campbell) - Awari paper (available from.
P. Albertos* & A. Crespo + Universidad Politécnica de Valencia * Dept. of Systems Engineering and Control, + Dept. of Computer Engineering POB E
1 PUNCH PUNCH (Purdue University Network Computing Hubs) is a distributed network-computing infrastructure that allows geographically dispersed users to.
Architecture and Real Time Systems Lab University of Massachusetts, Amherst An Application Driven Reliability Measures and Evaluation Tool for Fault Tolerant.
Secure Group Communications in Wireless Sensor Networks December 8, 2003 CS 526 Advance Internet and Web Systems Patrick D. Cook.
Distributed System Concepts and Architectures Summary By Srujana Gorge.
Operating Systems: Principles and Practice
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks DAOJING HE, YI GAO, SAMMY CHAN, CHUN CHEN, JIAJUN BU Ad Hoc & Sensor Wireless.
Information Literacy in the workplace: implications for trainers By Dr. Mark Hepworth Department of Information Science Loughborough University.
Computer Networks All you need to know. What is a computer network? Two or more computers connected together so that they can communicate with each other.
SMUCSE 8344 Term Paper Topics (Always Incomplete).
Wireless Security: A Search for Public and Secure Wireless networks Kory Kirk.
Protecting Web 2.0 Services from Botnet Exploitations Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second Nguyen H Vo, Josef Pieprzyk Department.
Accuracy-Aware Aquatic Diffusion Process Profiling Using Robotic Sensor Networks Yu Wang, Rui Tan, Guoliang Xing, Jianxun Wang, Xiaobo Tan Michigan State.
KAIST CS710 컴퓨터구조 특강 무선 센서네트워크 응용 및 보안 Syllabus Network & Security Lab.
Distributed Computation in MANets Robot swarm developed by James Rice University.
A Design for Secure and Survivable Wireless Sensor Networks Yi Qian, Kejie Lu, David Tipper Presented by: William Newton University of Maryland, Baltimore.
1Of 25. 2Of 25  Definition  Advantages & Disadvantages  Types  Level of interaction  Honeyd project: A Virtual honeypot framework  Honeynet project:
DOS Attacks in Wireless Sensor Networks By Eric Bartocci & Justin Matthews.
Mid-term Progress Report Isaac Rieksts My web site
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Adapted from the original presentation made by the authors Reputation-based Framework for High Integrity Sensor Networks.
Research Interest overview and future directions Mina Guirguis Computer Science Department Texas State University – San Marcos CS5300 9/16/2011.
Robotics. What is a robot? Have you seen a robot? Where? – In a photo? – Video? – In real life?
Server Performance, Scaling, Reliability and Configuration Norman White.
Test Your Smartitude Computer Safety. Pick a box, any box… RulesVocabularySafe or Not Safe
My Cool Robot Is: Robot Name Here Your Name Here Class Period.
High-integrity Sensor Networks Mani Srivastava UCLA.
Distributed Algorithms for Multi-Robot Observation of Multiple Moving Targets Lynne E. Parker Autonomous Robots, 2002 Yousuf Ahmad Distributed Information.
Student Experience It’s your education Type the web site address into the browser given to you by your junior high or high school Select “I am a student”
Mobile Agent Security Presented By Sayuri Yonekawa October 17, 2000.
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks Donggang Liu and Peng Ning Department of Computer.
Multi-channel Wireless Sensor Network MAC protocol based on dynamic route.
CSCE790: Security and Privacy for Emerging Ubiquitous Communication system Wenyuan Xu Department of Computer Science and Engineering University of South.
Technology and Engineering ● 701 Principles of Technology - ½ year ● 710 Technology and Engineering – Full year ● 707 Building/Repairing Computers - ½.
1 New Algorithms and Protocols: Development and Testing at HPGC Research Lab PATH: measures Bottleneck Bandwidth PATH: measures Bottleneck Bandwidth Testing.
PRIVATE INFORMATION EXPOSURE IN ONLINE SOCIAL NETWORKS WITH IOS, ANDROID AND SYMBIAN MOBILE DEVICES Security and Cooperation in Wireless Networks Laboratory.
Virtualization One computer can do the job of multiple computers, by sharing the resources of a single computer across multiple environments. Turning hardware.
CS 351/ IT 351 Modeling and Simulation Technologies HPC Architectures Dr. Jim Holten.
Networking: Applications and Services Antonia Ghiselli, INFN Stu Loken, LBNL Chairs.
Introduction to Networking
Eisenberg/Robinson © 2007 Super 3 Introduction for students!
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
EE-194WIR Projects J2ME-based Mobile Phone Game Application TinyOS Implementation Project Team: David Louie Greg Truhlar.
Juan Alapin Alon Shahaf Traditional WSN “Sensor Clould” Other stuff??!?
SLC – You tell me Web design – Using software design a website.
Security of the Internet of Things: perspectives and challenges
Computer Networks and Operating Systems Operating Systems Introduction.
Shopping online tips Presented by: Wala Al-Zahrani
FAULT TOLERANT TECHNIQUES FOR WIRELESS AD HOC SENSOR NETWORKS
A Robot mapping a series of hallways
Physics-based simulation for visual computing applications
Background Perception Animation - principles Animation - history
788.11J Presentation “Robot Navigation using a Sensor Network ”
Personal Projects Kihwan Lee
USN Introduction Computer Engineering Sejin Oh.
World-Leading Research with Real-World Impact!
P2P: Unique Design Challenges in Accountability and Security
Presentation transcript:

Cooperative Robotics and Sensor Networks Isaac Rieksts My web site

How a sensor network works  What you need for a sensor network computer Base Motes  How this works together  Problems to solve

Basics of motes, base and computer

An example of a base

Security  Why we need security Denial of service attack  Jamming Node capture Privacy  Key sharing

How robots use the network  Without communication robots would allocate tasks inefficiently  How a robot uses the network

Fault Tolerant Robots  What we mean by fault tolerant  A look at the ALLIANCE program

Our simulators  OS for these simulators is Linux  Player  Stage  Gazebo

Example of Stage Web site for stage

Example of simulated spill

A look to the future  Sampling for Research  Rescue missions  Put a robot(s) in a place where it is not safe for people

Conclusion  We need to address security  Privacy could be a problem very soon  Still a lot of work to be done in my project