Download presentation
Presentation is loading. Please wait.
Published byOliver Booth Modified over 8 years ago
1
Misc Project Slides 2005 - projects
2
PLANNING, EXECUTION AND CONTROL LINKAGES IN MANUFACTURING ENTERPRISE
3
Common Plant Information Tool (IndustrialSQL) Plant Historian Unified Data Storage Process Control & Monitoring (InTouch) Plant-wide Manufacturing Decisions (InTrack) Engineering CAD, CAE, CAPP Parts storage And AGV control Cell control Cell control Cell control Assembly control Measuring Control Finished goods storage AGV Manufacturing Production Dispatching Schedule Execution WIP & Resource Tracking Data Collection Resource Management Quality Management Operations Sequencing Working Instructions Labor Instruction Maintenance Plant Floor System Wonderware SuiteVoyager Internet
4
The intelligent nodes are connected to a server where data is digitized and stored Readers Controller Card Reader Proximity Readers Biometric Gateway Fingerprint Reader Camera (Pan Tilt Zoom) Intelligent Node LAN External Monitoring Station Secure Internet Central rules-engine and data warehouse Cameras, alarms, analog devices, card readers and others are connected and controlled via distributed intelligent nodes
5
Self-Organizing Wireless Networks
6
Active, wearable RF transmitters Dedicated receiver / sensors Centralized data server Multiple client terminals Real Time Location Systems (RTLS) Receiver / Sensors Location Receiver WherePort Transmitters Wrist-Worn Asset Data Severs / Client Terminals Wireless PDA Clients Servers & Remote Clients RTLS Fills the Gap between RFID and GPS An Ideal Radio Channel for Large Sensor Networks RTLS = Active RFID + Receiver Network + Software
7
Application Issues around deployment Self organization – nodes must self- organize into useable network Node adaptation to other nodes’ planned/unplanned changes to operating and environmental conditions Cost and reliability of sensors Data security and integrity Systems integration
8
Related Research work Sokwood Rhee at Millennial Net [an MIT spin-off] Olariu, Wadaa, Wilson and Jones (NASA, Langley) of ODU MIT Auto ID laboratory RFID tag and sensor vendors
9
An generic sensor network [Olariu, Wadaa, Wilson – ODU] Sink End user Satellite Internet Event
10
Sensor networks Wireless sensor network – massive collection of tiny sensors linked by a wireless medium :Main goal: global info from local data Must integrate sensing, data fusion and low-power communication Must work unattended Amorphous self-organized Massive fault tolerance An inherently distributed platform
11
Ubiquitous WSNs/ Temporary Infrastructures Agile multi-service sensor network system self-organized to serve a rescue
12
Sensors Each sensor packs: –micro-sensor technology –low power signal processing –low power computation –low power networking capabilities Non-renewable energy budget Anonymity: no fabrication-time identity Sleep as much as possible - conserve energy Sense and compute freely – limit communication- conserve energy
13
Security goals addressed Availability: ensure the survivability of network services despite denial-of-service (DoS) attacks Confidentiality: ensure that information is not disclosed to unauthorized entities – Integrity: guarantee that a message being transferred is not corrupted – Authentication: enable a node to ensure the identity of the peer node – Anonymity: hide the identity of sources, destinations, and routes – Tamper Proofing: Ensure that nodes cannot be physically forced to divulge secrets
14
NSA—Tamper proofing, authentication After deployment each sensor transmits on a specified sets of frequenciesAfter deployment each sensor transmits on a specified sets of frequencies Each sensor collects an array of signal strengths from the sensors in its localeEach sensor collects an array of signal strengths from the sensors in its locale NSA – the Neighborhood Signature ArrayNSA – the Neighborhood Signature Array Removal from deployment area changes in the NSARemoval from deployment area changes in the NSA
15
Security techniques in a nutshell Initialize sensors with secrets and synchronize clocks Deploy sensors over the desired area FH communications only NSA Resynchronize clocks periodically Train the sensors to provide temporary virtual infrastructure Assign tasks to the trained network Randomly vary sources, destinations and communication paths Partition the network into color sets - concurrent tasking Lightweight data encryption available
16
Conclusions [Olariu, et. al.] Contributions: Virtual infrastructure leveraged for security Physical level encoding via FH, very light weight and highly effective – DoS, Confidentiality, Integrity Physical level encoding via FH, very light weight and highly effective – DoS, Confidentiality, Integrity NSA – Authentication, Tamper Proofing Software NSA – Authentication, Tamper Proofing Software Random routing - Anonymity Random routing - Anonymity Current Situation: Wireless sensor network research is still in its infancy Securing sensor networks – a subject for active research Securing sensor networks – a subject for active research
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.