TRUST Research on Physical Infrastructure Control, Monitoring, and Security Prof. Stephen Wicker Cornell University.

Slides:



Advertisements
Similar presentations
2009 Transition Dynamics Enterprises, Inc. Used with permission. What You Need to Know about the Green Economy Add your name here.
Advertisements

“Challenges and Methodologies
IT Infrastructure for Energy Efficiency in Future Cities: From the Smart Home to the Smart Grid Chief Investigators: CS&IT: Prof. Zahir Tari, Dr Caspar.
Security Issues in Wireless Sensor Networks -Ninad Naik.
TRUST Fall Meeting November , 2010 │Stanford, California A Privacy-Aware Architecture For Demand Response Systems Steve Wicker, Bob Thomas School.
Game theoretic analysis of Advanced Metering Infrastructure adoption Dipayan Ghosh Cornell University with Stephen Wicker, Dawn Schrader, William Schulze.
Main ISSUES of reFINE’s R&I Roadmap
C LOUD C OMPUTING Presented by Ye Chen. What is cloud computing? Cloud computing is a model for enabling ubiquitous, convenient, on- demand network access.
Illinois Security Lab Critical Infrastructure Protection for Power Carl A. Gunter University of Illinois.
1 Workshop on Research Directions for Security and Networking in Critical Real-Time and Embedded Systems Organizers: NC State University & UNC Chapel Hill.
Digital Systems Emphasis for Electrical Engineering Students Digital Systems skills are very valuable for electrical engineers Digital systems are the.
Prepared By: Kopila Sharma  Enables communication between two or more system.  Uses standard network protocols for communication.  Do.
Thoughts on Sensing Systems and Workshop Overview Stephen B. Wicker.
Infrastructure Management H. Scott Matthews January 15, 2003.
1 EE249 Discussion System Architecture Directions for Networked Sensors (J. Hill, et al) Presented By: Sarah Bergbreiter EE249 Discussion Section October.
Lecture 1.
© Copyright IBM Corporation 2008 Smart Grid Overview US Chamber of Commerce Kieran McLoughlin Smart Grid Solution Leader Global Energy & Utility Industry.
A Survey of Mobile Phone Sensing Michael Ruffing CS 495.
Energy Saving In Sensor Network Using Specialized Nodes Shahab Salehi EE 695.
INTERNET OF THINGS SUBBAIYA VASU UDAYARAJAN UOTTAWA CSI 5169 WIRELESS NETWORKS AND MOBILE COMPUTING SUBMITTED TO: PROFESSOR STOJMENOVIC.
Chapter 1- Introduction
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Chapter 1- Introduction Lecture 1 Ready, fire, aim (the fast approach to software development). Ready, aim, aim, aim, aim... (the slow approach to software.
Presentation title SUB TITLE HERE Intelligent 21st Century Strategies for Broadband and Cyber Infrastructures Security By Dr. Emmanuel Hooper, PhD, PhD,
TRUST, Washington, D.C. Meeting January 9–10, 2006 Securing Public Spaces with Sensor Networks: Science, Technology, and Privacy Stephen Wicker Cornell.
REAL-TIME SOFTWARE SYSTEMS DEVELOPMENT Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
“Assuring Reliable and Secure IT Services”. IT Redundancy: Its Value How much reliability to buy? Customer Service impacted as a result of 15 minutes.
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
TRUST, Spring Conference, April 2-3, 2008 Taking Advantage of Data Correlation to Control the Topology of Wireless Sensor Networks Sergio Bermudez and.
Network of Excellence in Internet Science Network of Excellence in Internet Science (EINS) Joint Workshop and 4 th Plenary Meeting Bologna June 13, 2014.
Frankfurt (Germany), 6-9 June 2011 IT COMPLIANCE IN SMART GRIDS Martin Schaefer – Sweden – Session 6 – 0210.
NSF Critical Infrastructures Workshop Nov , 2006 Kannan Ramchandran University of California at Berkeley Current research interests related to workshop.
BY IBRAHIM ABUALHAWA What does the department of transportation do. .. The Department includes agencies like the Federal Aviation Administration and.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
TRUST NSF Site Visit, Berkeley, March, 2007 Sensor Networks: Technology Transfer Stephen Wicker – Cornell University.
Steve Wicker Cornell University 1 TRUST Autumn 2011 Conference.
1 XYZ: A Motion-Enabled, Power Aware Sensor Node Platform for Distributed Sensor Network Applications Presenter: James D. Lymberopoulos, A. Savvides.
Computer Science and Engineering 1 Information Assurance Research Department of Computer Science and Engineering University of South Carolina, Columbia.
Kyushu University Koji Inoue ICECS'061 Supporting A Dynamic Program Signature: An Intrusion Detection Framework for Microprocessors Koji Inoue Department.
Issues Autonomic operation (fault tolerance) Minimize interference to applications Hardware support for new operating systems Resource management (global.
REAL-TIME SOFTWARE SYSTEMS DEVELOPMENT Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
Networked Embedded and Control Systems WP ICT Call 2 Objective ICT ICT National Contact Points Mercè Griera i Fisa Brussels, 23 May 2007.
Routing Requirements for Urban Sensor Networks draft-ietf-roll-urban-routing-reqs-01.txt D. Barthel G. Chegaray M. Dohler (Ed.) C. Jacquenet G. Madhusudan.
Forum on Internet of Things: Empowering the New Urban Agenda Geneva, Switzerland, 19 October 2015 The Role of Regulators and Governments in realizing the.
Living Earth Platform = FuturICT Knowledge Accelerator Flagship Infrastructures Innovative Management Other Projects and Programs Policy Partnerships Business.
 2009 Transition Dynamics Enterprises, Inc. Used with permission. What You Need to Know about the Green Economy Add your name here.
Real-Time Systems, Events, Triggers. Real-Time Systems A system that has operational deadlines from event to system response A system whose correctness.
Andrea Ricci - ISIS Brussels, 12 April 2012 Policy conclusions and way forward.
1 © A. Kwasinski, 2015 Cyber Physical Power Systems Fall 2015 Security.
Security Snapshot Assessment Maximizing Return on Security Investment What assets do we have? What is running on those assets? What is our risk level?
Chapter 1- Introduction Lecture 1. Topics covered  Professional software development  What is meant by software engineering.  Software engineering.
Smart Sleeping Policies for Wireless Sensor Networks Venu Veeravalli ECE Department & Coordinated Science Lab University of Illinois at Urbana-Champaign.
ARTEMIS SRA 2016 Trust, Security, Robustness, and Dependability Dr. Daniel Watzenig ARTEMIS Spring Event, Vienna April 13, 2016.
AUTONOMIC COMPUTING B.Akhila Priya 06211A0504. Present-day IT environments are complex, heterogeneous in terms of software and hardware from multiple.
CS220:INTRODUCTION TO SOFTWARE ENGINEERING CH1 : INTRODUCTION 1.
Wireless Sensor Networks Wake-up Receivers
THE CURRENT GLOBAL ICT ENVIRONMENT
INTRODUCTION The economies of ALL developed nations are dependent on software. More and more systems are software controlled Software engineering is concerned.
Chapter 1- Introduction
Chapter 1- Introduction
Circular Economy Closing the loop – An EU Action Plan for the Circular Economy Maria Rincon Lievana European Commission.
TRUST:Team for Research in Ubiquitous Secure Technologies
On Using Semantic Complex Event Processing for Dynamic Demand Response
Broad Emerging Themes in CPS/IoT
EER Work Programme 2011 – electricity
الجزء الثالث دراسة السوق.
PLANNING A SECURE BASELINE INSTALLATION
Next-generation Internet architecture
Internet of Things (IoT)
Presentation transcript:

TRUST Research on Physical Infrastructure Control, Monitoring, and Security Prof. Stephen Wicker Cornell University

Physical Infrastructure Power Grid, Telecom Infrastructure, Water Transport System, Interstate Highways ◦ Immense Investment  Financial: Sunk costs and ongoing development and maintenance  Human: Established development, maintenance, and regulatory organizations at state and federal level ◦ Critical to National Economy  National modes of production depend on functionality of critical infrastructures with embedded sensing and control  Multiple positive externalities have created secondary and tertiary dependencies (e.g. air traffic control dependence on power and telecom infrastructure) Increasing complexity and 21st century security requirements demand new approaches to control, security, and long-term maintenance.

TRUST Infrastructure Research Science and Technology ◦ Low-power processors ◦ Self-configuration algorithms ◦ Taxonomy of network attacks ◦ Information theory of privacy Testbeds ◦ Sensor networking and privacy ◦ SCADA/plant security Policy ◦ Smart meters and privacy intrusion ◦ Privacy-aware design

Nugget: TRUST Sensor Platform Technologies CU Asynchronous Processor – Event-driven execution is ideal for sensor platforms – Low power consumption useful for large-scale and/or long-term deploment Clockless logic – Spurious signal transitions (wasted power) eliminated – Hardware only active if it is used for the computation MIPS: high-performance – 24pJ/ins and V ProcessorBusYearE/opOps/sec Atmel8200?1-4 nJ4 MIPS StrongARM32200?1.9 nJ130 MIPS MiniMIPS nJ*22 MIPS Amulet3i nJ*80 MIPS 80C51 (P) nJ**4 MIPS Lutonium pJ4 MIPS SNAP pJ28 MIPS

Nugget: Smart Metering Provides Data Equivalent to a Search Algorithm Performs well in determining presence and sleep cycles. Over 90% of total interval length was correctly classified. Power consumption data falls within the ambit of EU Directive 2002/58/EC concerning the processing of personal data.