Dynamic Networking and Smart Sensing Enable Next-Generation Landmines William M. Merrill, Lewis Girod, Brian Schiffer, Dustin McIntire, Guillaume Rava,

Slides:



Advertisements
Similar presentations
Yang Yang, Miao Jin, Hongyi Wu Presenter: Buri Ban The Center for Advanced Computer Studies (CACS) University of Louisiana at Lafayette 3D Surface Localization.
Advertisements

SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Energy-Efficient Computing for Wildlife Tracking: Design Tradeoffs and Early Experiences with ZebraNet Presented by Eric Arnaud Makita
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
SUBJECTIVE LOGIC BASED PROBABILISTIC KEY MANAGEMENT FOR MANETS Mahdieh Ahmadi Performance and Dependability Laboratory Sharif University of Technology.
WINS NG 2.0 Current Status and Network Assembly Sensoria Corporation Internetworking the Physical World Santa Fe, NM January 16, 2002.
Luca De Nardis Ranging and positioning in UWB ad- hoc networks Problem definition.
Sniper Tracking With Wireless Sensor Networks
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
A Survey on Wireless Mesh Networks Sih-Han Chen 陳思翰 Department of Computer Science and Information Engineering National Taipei University of Technology.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
1 Design of a Low-Power Wireless Structural Monitoring System for Collaborative Computational Algorithms Yang Wang, Prof. Kincho H. Law Department of Civil.
C 4 I for the Objective Force 2800 Powder Mill Rd Adelphi, MD Direct Fire Function Infantry Carrier Function Indirect.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
1 TTS: A Two-Tiered Scheduling Algorithm for Effective Energy Conservation in Wireless Sensor Networks Nurcan Tezcan & Wenye Wang Department of Electrical.
1 Autonomous Controller Design for Unmanned Aerial Vehicles using Multi-objective Genetic Programming Gregory J. Barlow North Carolina State University.
The Design Space of Wireless Sensor Networks Xin-Xian Liu
DCL Concepts STL Concepts ContainerIteratorAlgorithmFunctorAdaptor What New Concepts are Needed for a “DCL”? (Distributed Computing Library) Distributed.
Distributed System Concepts and Architectures Summary By Srujana Gorge.
Cross Strait Quad-Regional Radio Science and Wireless Technology Conference, Vol. 2, p.p. 980 – 984, July 2011 Cross Strait Quad-Regional Radio Science.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
Critical Emerging Network-Centric Applications Tele-control/tele-presence Defense Tele-medicine Remote plane/vehicle/robot control Distance learning Real-time.
Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 1 Carlos Cordeiro Philips Research North America Briarcliff Manor,
Presentation title SUB TITLE HERE Intelligent 21st Century Strategies for Broadband and Cyber Infrastructures Security By Dr. Emmanuel Hooper, PhD, PhD,
1 CIS 6930: Workshop III Encounter-based Networks Presenter: Sapon Tanachaiwiwat Instructor: Dr. Helmy 2/5/2007.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
Nuttapon Boonpinon Advisor Dr. Attawith Sudsang Department of Computer Engineering,Chulalongkorn University Pattern Formation for Heterogeneous.
CS450 Network Embedded Sensing Systems Week 11: Time Synchronization and Reconstruction Jayant Gupchup.
© 2009, Shared Spectrum Company National Broadband Plan Staff Workshop Technology: Wireless Broadband Panel 2: Rural Broadband Thursday, August 13, 2009.
INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION.
HPC use in Testing Ad Hoc Wireless Sensor Networks
FY2011 Harris Corporation Overview Page 1 Harris Corporation Overview.
Department of Computer Science City University of Hong Kong Department of Computer Science City University of Hong Kong 1 Continuous Residual Energy Monitoring.
Space-Based Network Centric Operations Research. Secure Autonomous Integrated Controller for Distributed Sensor Webs Objective Develop architectures and.
Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks” IEEE Communications.
SECURITY SCHEMES FOR AMI Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845 Jincheol Kim, Seongji Ahn, Youngeok Kim Jongman.
Department of Computer Science Southern Illinois University Edwardsville Fall, 2013 Dr. Hiroshi Fujinoki MANET (Mobile Ad-hoc.
College of Engineering Grid-based Coordinated Routing in Wireless Sensor Networks Uttara Sawant Major Advisor : Dr. Robert Akl Department of Computer Science.
October 7, 1999Reactive Sensor Network1 Workshop - RSN Update Richard R. Brooks Head Distributed Intelligent Systems Dept. Applied Research Laboratory.
Network UAV C3 Stage 1 Final Briefing Timothy X Brown University of Colorado at Boulder Interdisciplinary Telecommunications Program Electrical and Computer.
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
Calibration in Sensor Systems based on Statistical Error Models Computer Science Dept. University of California, Los Angeles Jessica Feng, Gang Qu*, and.
MANET: Introduction Reference: “Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations”; S. Corson and J.
Ad Hoc Network.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Acoustic localization for real-life wireless sensor network applications Michael Allen Cogent Computing ARC in collaboration with: Centre for Embedded.
1 Trustworthy Operation within Infrastructure-less Networked Embedded Systems William M. Merrill Sensoria Corporation Control-Theoretic Approaches for.
Overview of Wireless Networks: Cellular Mobile Ad hoc Sensor.
Wireless Sensor Networks
Mobile Node for Wireless Sensor Network to Detect Landmines Presented by : Jameela Hassan.
Euro-Par, HASTE: An Adaptive Middleware for Supporting Time-Critical Event Handling in Distributed Environments ICAC 2008 Conference June 2 nd,
Sensor Networks Jason Turbyfill 16 February 2005.
MIT Lincoln Laboratory Dynamic Declarative Networking Exploiting Declarative Knowledge To Enable Energy Efficient Collaborative Sensing Daniel J. Van Hook.
Flocks of Robots Coordinated Multi-robot Systems Dylan A. Shell Distributed AI Robotics Lab Department of Computer Science & Engineering Texas A&M University.
PROWIND (Positioning Relay over Wirelessly Networked Devices) Team Members: Mark Buising, Douglas Chow, Nazeni Mkrtchyan, Jesus Rodriguez, Jennifer Webb.
CRESST ONR/NETC Meetings, July July, 2003 ONR Advanced Distributed Learning Bill Kaiser UCLA/SEAS Wireless Networked Sensors for Assessment.
Wireless Sensor Network: A Promising Approach for Distributed Sensing Tasks.
1 Wireless Networks Lecture 31 Wireless Mesh Networks Dr. Ghalib A. Shah.
Wireless Sensor Networks: A Survey I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci.
Lecture 8: Wireless Sensor Networks By: Dr. Najla Al-Nabhan.
RTLAB Real-Time Systems Lab. Kyungpook National University School of Electrical Engineering and Computer Science Sung Ho Park Message Ferrying: Proactive.
Overview of Wireless Networks:
Supporting Mobile Collaboration with Service-Oriented Mobile Units
Distributed Algorithms for Mobile Sensor Networks
Presented by Bijendra Vishal
Presentation transcript:

Dynamic Networking and Smart Sensing Enable Next-Generation Landmines William M. Merrill, Lewis Girod, Brian Schiffer, Dustin McIntire, Guillaume Rava, Katayoun Sohrabi, Fredric Newberg, Jeremy Elson, William Kaiser IEEE Pervasive Computing October-December 2004 Presenter : Tim

Outline History of Landmine Self-Healing Minefield SHM Operation SHM Hardware SHM Software SHM Performance Future Work Conclusion

History of Landmines 15 th century American Civil War wider use World War I antipersonnel mines, antitank mines World War II new deployment methods Recent landmine systems detonation by remote operator

Future Landmines System Current landmine systems are not good enough. Should include Networked communication Embedded processing Operating without external infrastructure Graceful degrading

Self-Healing Minefield (SHM) A DARPA (Defense Advanced Research Projects Agency ) Applied Technology Office program Dr. Thomas W. Altshuler is the Program Manager Three teams are engaged in research and development. Alliant Techsystems, Inc. Sandia National Laboratories Science Applications International Corporation Sensoria Corporation—Design, construction, and testing of the communications; ad hoc, multihop, self-assembling network; and the acoustic ranging subsystem. The program is completed and system technology is transited to the U.S. Army.

SHM Operation The graphs are from

SHM Objectives Autonomously identify and respond to an enemy attack within 10 seconds of a breach attempt or vulnerability in the minefield. Move an individual 2 kg prototype mine 10 meters in response to the breach Assure mine mobility in all environmental conditions and terrain where enemy tanks can operate. Rapidly assemble a scalable communication network and self-geolocate in 5-15 minutes. Provide robust mine-to-mine communication resistant to enemy countermeasures.

SHM Objectives (con.) Have a Non-GPS based geolocation with 1 meter location accuracy. Expand number for prototype mines to at least 50 and demonstrate tactically significant minefield behavioral response to an enemy breach. Maintain or reduce overall volume as compared to currently fielded scatterable antivehicle mines.

SHM

SHM Hardware This figure is borrowed from “Dynamic Networking and Smart Sensing Enable Next-Generation Landmines”

SHM Software This figure is borrowed from “Dynamic Networking and Smart Sensing Enable Next-Generation Landmines”

Testing 50 to 95 SHM nodes In a field 35-m deep by up to 190-m across (for 95 nodes) Obtain the results through Ethernet connections to a fraction of the nodes

SHM Performance The lack of correlation of test size and network formation time results from the parallel formation of the SHM dual-cluster topology and from the scalability of the developed network assembly algorithm. This figure is borrowed from “Dynamic Networking and Smart Sensing Enable Next-Generation Landmines”

SHM Performance (con.) J. Elson, L.Girod, and D. Estrin, “Fine-Grained Network Time Synchronization Using Reference Broadcasts,“ Proc. Fifth Sump. Operating Systems Design and Implementation (OSDI 2002) This figure is borrowed from “Dynamic Networking and Smart Sensing Enable Next-Generation Landmines”

SHM Performance (con.) 85 percent of range measurements within 1 m of ground truth and 70 percent of angle measurements within 20° of ground truth W. Merrill et al., ‘Autonomous Position Location in Distributed, Embedded, Wireless Systems,” Proc. IEEE CAS Workshop Wireless Communications and Networking, IEEE Press, 2002, pp. 1-8 This figure is borrowed from “Dynamic Networking and Smart Sensing Enable Next- Generation Landmines”

Future Work Include extend the system’s lifetime warhead communication security reduce size But.. The program is completed and system technology was transited to the U.S. Army.

Conclusion Some of the SHM technologies are under consideration and support of other weapon systems. Peace! No war!!