information session for the master-seminar sensor nodes ... · securing communications between...
TRANSCRIPT
Information Session for
the
Master-Seminar
Sensor Nodes:
Operation Modes, Networks and Applications
SS 2011
Prof. Baumgarten, Prof. Carle,
Corinna Schmitt, Alexander Klein, Christoph Söllner
22
•
Administration
–
Responsibilities
–
Appointments and Deadlines
–
Grading
•
Introduction to offered topics
–
Sensor Nodes
–
Network Topologies
–
Operating Systems
–
Middleware Concepts
–
Applications–
Much more …
•
Topic selection
33
•
Administration
–
Responsibilities
–
Appointments and Deadlines
–
Grading
•
Introduction
to offered
topics
•
Topic selection
44
Responsibilities and Appointments
•
Organisation:
Prof. Baumgarten, Prof. Carle, Schmitt, Klein, Söllner
•
Appointment:
Block Seminar –
2 days (9 a.m. -
6 p.m.)
planned for 12.-13.7.2011
•
Formality:–
Diplom
Students: 2 SWS
–
Credits (B.Sc./ M.Sc): 4 ECTS
–
Attendance list exists
–
Each participant will be session chair for one talk (moderation, discussion leader, min. 1 question concerning the talk)
–
Successfully attendance (Talk, Paper, Review)
–
Using department templates on our homepage
–
Language: English or German
•
Registration via Seminar homepage
http://www.net.in.tum.de/de/lehre/ss11/seminare/
55
Appointments and Deadlines
Appointments
Topic selection 06.05.2011
Meeting with advisor as soon
as possible
Upload of paper (1st Version) and talk slides * 28.06.2011
TalksInvited
Guest
Talk: Dr. Achim Hof (Siemens AG)12./13.7.20119:00-18:00 Uhr
Uploads of reviews 11.07.2011
Upload of paper
(2nd Version) 31.07.2011
Publication
of Proceedings t.b.a.
* Slides must be presentable otherwise -0.3 degree in grading.
Slides can be modified after upload after consultation with advisor.
6
Additional Support
•
See homepage: http://www.net.in.tum.de/de/lehre/ss11/seminare/
•
Slides:
–
Talk: How to write a scientific Paper?
–
Talk: How to write a Review?
–
Talk: How to give feedback?
•
Example:
Paper version 1 Review Paper version 2
•
Questions send to [email protected]
•
Advisors offer the opportunity of test talks!
77
Grading
General things:
–
Paper structure (6-8 pages in ACM format)
•
1st Version for Peer-Review process
•
2nd Version (final) for publication in proceedings
–
Talk (20 min, following discussion, receiving feedback)
•
Content counts
•
Talking style is not counted
–
Review about papers from other seminar participants (minimum of 2)
–
Session chair for 1 talk
Please note:
–
Attendance is required at all appointments absence without permission results lower grades
–
Deadlines must be kept
–
Submission of your work through upload form on homepage
–
Papers must be self-written (no plagiarism)
8
99
•
Administration
•
Introduction to offered topics
–
Sensor Nodes
–
Network Topologies
–
Operating Systems
–
Middleware Concepts
–
Applications
–
Much more …
•
Topic selection
1010
What‘s
going
on now?
For each
topic
–
An intoduction,
–
A motivation,
–
A little
more
detailed
view
into
topic,
–
And a detailed
assignment
of tasks
is
given.
111111
Introduction
to Sensor Networks I -
different node
hardware
platforms
Platforms:–
Smart-Its
–
TinyOS
nodes
offered
by
Crossbow
(Mica, TelosB)
–
Scatterweb
Questions:–
What
is
a Wireless Sensor Network
(WSN)?
–
Characterization
of different technologies?
–
Short characterization
of an operating
system
(e.g. Contiki, TinyOS, Btnut, …)
–
Compare
the
different technologies:•
Hardware equipment
•
Wired
and Wireless Communication
•
Limited
factors
(energy, space, environment)
•
Possibilities
for
optimization
•
Areas
of application
Advisors: Baumgarten, Söllner
TelosB
Berliner Motte
Mica 2 Dot
Iris Mote
Vergeben
121212
Introduction
to Sensor Networks II -
Sensor Types
and Bus protocols
General:–
Different sensor
types
on Hardware (light, motion, …)
–
Connected
to central
processing
Unit via different types
of connections
(digital, analogue)
–
Bus systems
have
different capabilities:
•
Noise
•
Achievable
Data rate
•
Number
of addressable
sensor
devices
•
Power consumption
•
Sensitivity
to Environmental
influence
(EMF)
Tasks:–
Describe
sensor
types
(what
do they
measure, in what
form do we
get
the
data, how
fast are
they
typically)
–
Describe
and compare
bus
systems
(criteria
above)
–
Recommend
bus
system
for
given
sensor
type
Advisors: Baumgarten, Söllner
TelosB
Berliner Motte
Mica 2 Dot
Iris Mote
Vergeben
131313
Introduction
to Sensor Networks -
comparison
of operating
systems
Goal:
Introduction
of different operating
systems
Questions:–
What
is
a sensor
node
operating
system?
–
What
are
its
different characteristics?
–
Candidates:•
TinyOS
•
Contiki
•
MANTIS OS
•
…
–
Which
goals
are
important?•
Energy Consumption
•
Adaptation to different hardware
platforms
•
IT security
•
Documentation
available
•
API / Programming
Language
/ Compiler / Tool-Chain
Advisors: Baumgarten, Söllner
Topic can be split!
1414
Data Acquisition
Techniques
to save resources
General:
–
Data acquisition
frequency
depends
on the
application
•
Medical
sensor
networks
•
Long time agricultural
measurements
–
Data acquisition
requires
power resources
Questions:
–
Why
is
does
data
acquisition
require
so much
power?
–
Which
protocols
and techniques
exist
to solve
the
problem?
•
Lakon: A Middle-ground Approach to High-frequency Data Acquisition and In-network Processing in Sensor Networks (IPSN 2010)
•
Adaptive data
collection
strategy
(EWSN 2010)
Advisor: Schmitt
Vergeben
15
Data processing
techniques
Advisor: Schmitt
General:
–
Huch data
amount
is
collected.
–
Sensor data samples and especially their integrity are of
•
significance and
•
once acquired must not be lost.
–
Challenges:
•
data
must
arrive
ordered
•
sensors
are
often
calibrated,
•
sensor
network
deployments
and their
maintenance
are
labor-intensive
and expensive.
Questions:
–
Which
techniques
exist
to face the
challenges?
•
Reconstruction of the Correct Temporal Order of Sensor Network Data (IPSN 2011)
•
PermaDAQ: A scientific
instrument
for
precision
sensing
and data
recovery
in environmental
extremes (IPSN 2009)
–
What
development
exist?
Verified Data
Unfiltered Data
Rejectnon confirming
data
Model-based Testing and
Reconstuction
ApplicationDomain Filtering
Science
1616
Security
in WSNs
-
Key Distribution and Management
General:
–
Security
levels
within
a WSN depend
on
•
Network
size
•
Application
–
Key Distribution and management
schemes
can
be
devided
into
groups:
•
Centralized
Key Schemes
•
Distributed
Key Schemes
•
Probalistic
Key Schemes
Questions:
–
Characterization
and comparison
of special
techniques
–
Attack
possibilities
–
Defence
strategies
Topic can be split !
Student thesis is offered !
Advisor: Schmitt, Söllner
Vergeben
17
Security
in WSNs
-
Node
Replication
Attacks
General:
–
Depending on the application:
•
Hugh network size with hundreds of nodes
•
Exploiting without manual observation
–
With little effort, an adversary may capture nodes, analyze and replicate them, and surreptitiously insert these replicas at strategic locations within the network.
–
Such attacks may have severe consequences:
•
they may allow the adversary to corrupt network data or
•
even disconnect significant parts of the network
Questions:
–
What
is
a node
replication
attack
in detail?
–
What
detection
and defence
mechanisms
exist?
Advisor: Schmitt
Vergeben
18
Watermarking
in Sensor Data Sets
General:
–
Sensor Data must be analysed
in context focus
–
Solution is watermarking techniques
•
Known
from
trade
market
such as bank
notes
•
Different techniques
exist
•
Techniques
offer
among
others
perceptibility, robustness
and capacity
Questions:
–
Characterize
and analyse
the
following
approaches
•
Self-identifying
sensor
data
(IPSN 20110)
•
Multiple watermarking
method
for
privacy
data
protection
in WSN (2011)
•
Selective Forwarding Attack Detection using Watermark in WSNs
(ISECS 2009)
•
An Authentication Method for Self Nodes Based on Watermarking in
Wireless Sensor Networks (2009)
–
Compare
the
approach
to traditional watermarking
strategies
Advisor: Schmitt
Topic can be split !
19
Security
in WSNs
–
Denial
Of Service attacks
General:
–
Depending on the application:
•
Hugh network size with hundreds of nodes
•
Exploiting without manual observation
–
Different attacks on different layers
Questions:
–
What
attacks
are
possible
on a special
layer?
–
Which
consequences
occur?
–
How
can
the
attack
be
detected?
–
Which
defense
mechanisms
exist?
Advisor: Schmitt
Topic can be split!
2020
Aggregation
in WSNs
General:
–
Resources must
be
saved
–
Most energy
is
consumed
during
data
transmission
Data Aggregation
–
Different approaches:•
Cluster-based
Aggregation
•
Tree-based
(hierarchical) Aggregation
•
Single Aggregator
Algorithms
Questions:
–
Why
is
data
aggregation
a solution
for
the
problem?
–
Which
challenges
occur?
–
Characterization
and comparison
of different approaches
Advisor: Schmitt
max(17°,22°)
max(31°,22°)
max(31°,26°)
max(18°,26°)
22°
31°
26°
26°
18° 26° 17° 22°
31°
Aggregator
Topic can be split!
21
Resource-Management-Tools
for
WSNs
General:
–
Resources must
be
saved
–
Most energy
is
consumed
during
data
transmission
Management-Tool
–
Different approaches:
•
Tiny
Network
Manager(TNM) (2010)
•
Peloton
(2009)
•
Collective
Intelligence
(2009)
Questions:
–
What
are
the
challenges
during
the
development
of a management-tool
that
must
be
faced?
–
Characterization
and comparision
of different tools
Advisor: Schmitt 21
22
TLS solutions
for
WSNs
General:
–
Security is very important
–
Common solution is TLS in “normal P2P networks”
–
Is it a solution for WSN?
Questions:
–
Why
is
a TLS solution
interesting
for
WSNs?
–
Introduce, analyse
and compare
the
following
approaches
•
Securing Communications between Multiple Entities Using a Single
TLS Session
(NTMS 2011)
•
Adapting TLS Handshake Protocol for Heterogenous
IP-Based WSN using Identity Based Cryptography (ICWUS 2010)
•
Tiny 3-TLS: A Trust Delegation Protocol for Wireless Sensor Networks (ESAS 2006)
–
What
are
the
challanges
and what
must
be
faced
in the
future?
Advisor: Schmitt
23
Neighbor
Discovery Strategies
in WSNs
General:
–
Networks are usually deployed randomly over the region
–
Process
to identify
a set
of nodes
with
which
a node
can
communicate
–
Process
must
run
without any a priori knowledge
Questions:
–
What
challanges
occur
during
neighbor
discovery
process?
–
Characterize, analyse
and compare
different approaches:
•
Multipacket
Reception Capability and Physical-Layer Signal Processing (2010)
•
An asynchronous neighbor discovery algorithm for wireless sensor
networks (2007)
•
Birthday
protocols
for
low
energy
deployment
and flexible neighbor
discovery
in ad hoc wireless
networks
(MobiHOC 2001)
•
Neighbor Discovery in Wireless Ad Hoc Networks Based on Group Testing (2008)
•
Neighbor discovery in wireless networks and the coupon collector’s problem (MobiCOM 2009)
HelloHello
After n steps
Advisor: Schmitt
2424
Simulation Tools
24
Tossim
Evaluation:
–
Packet Loss
–
End-to-End Delay
–
Jitter
–
Energy Consumption
–
Network Lifetime
–
Application
–
Signal Propagation
–
Mobility
Topic:
–
Introduction and comparison of
OPNET, Avrora
and Tossim
Network Performance
Power Consumption
Advisor: Klein
2525
Energy Consumption
of Sensor Components
Optimizing
Sensor Measurements
and Communication
Advisor: Schmitt, Söllner
Goal:
present
and describe
strategies
of sensor
node
hard-
and software
to minimize
power consumption
for
a given
task
(i.e. humidity
measurement).
Example
strategies
to describe:
–
Interrupt
driven
measurement
–
Dynamic
adaption
of sleep
periods
–
Data aggregation
within
the
network
–
Burst
transmission
of data
–
Dynamic
transceiver
power usage
–
Analoge versus
digital hardware
BA/MA Thesis available:
Energy Consumption in Wireless Sensor Networks (Advisor: Klein)
Topic can be split!
Vergeben
26
Reprogramming
Techniques
for
WSNs
General:
–
Depending on the application field the manual human input is not
possible (e.g. agricultural, building monitoring) Reprogramming “on the fly”
–
Changing values (e.g. measurement intervals) according to the requirements
Questions:
–
What
challanges
can
occur
by
reprogramming
sensor
nodes? (e.g. node
is
lost)
–
What
techniques
exist? Characterize
and compare
them
•
Selective
Reprogramming
in Sensor Networks (NTMS 2011)
•
Trickle
(NSDI 2004)
•
Melete
(SenSys 2006)
•
Deluge
(SenSys 2004)
•
Zephyr (USENIX 2009)
•
Using
Compression
of Executable
Modules
(SECON 2008)
•
MOAP (2003)
•
MNP (2005)
Advisor: Schmitt
Topic can be split!
27
Event Detection
in WSNs
–
Vehical
Tracking
General:
–
Sensor Data must be analysed
in context focus
–
Tracking becomes more and more important
–
Offers also features for grouping
–
Application field: Vehical
Tracking
Questions:
–
Why
is
event
detection
important?
–
Characterize
and analyse
the
following
approaches
•
VigilNet
(2005)
•
SensIT
Project (2004)
–
Compare
the
approaches?
–
Where
are
the
challanges
and problems?
Advisor: Schmitt, Söllner
Source: Lightweight detection and classification for wireless sensor networks in realistic environments
Vergeben
28
WSN Application
–
Neonatal
Monitoring
General:
–
Upcoming application area is health monitoring
–
Important: Hippocratic Oath Save Life
–
“Small”
WSN technology is interesting for “small”
bodys Neonatal Medicine
–
Important: correct data transmission, detection and display
Questions:
–
Why
are
WSNs
so interesting
for
neonatal
medicine?
–
Introduce, analyse
and compare
the
following
approaches
•
Design of Wireless Sensor System for Neonatal Monitoring (NTMS 2011)
•
Wireless Transmission Design for Health Monitoring at Neonatal Intensive Care Units (ISABEL 2009)
–
What
are
the
challanges
and what
must
be
faced
in the
future?
Advisor: Schmitt
2929
WSN Application
–
Cell
Phone as Sensor Node
General:
–
More and more Smartphone among users
–
Smartphones
have increased internet
connection capabilities (“always on”)
–
Different sensor types on hardware
ambient light, gravity, acceleration, gps
–
Different data to be derived from that
Questions:
–
Aquiring
data: progress
versus
privacy?
–
Is
aquired
data
without
user
information
useful
at all for
the
industry?
–
Todays
applications
(mainly
/ microsoft
products)?
Advisor: Söllner
Vergeben
303030
Tasks:
–
Introduction and description of different MAC protocols (LPL, X-
MAC, BPS-MAC)
–
Comparison of the protocols with CSMA / TDMA based protocols in terms of:
•
Interference
•
Utilization/Overhead
•
Packet Loss/Delay
•
Energy Efficiency
•
Fairness
MAC –
Comparison
of preamble-based
MAC protocols
Advisor: Alexander Klein – http://www.net.in.tum.de/de/mitarbeiter/klein/
BA/MA 2 x Theses available:
• Quality of Service Medium Access Control Protocols for Wireless Sensor Networks
• Simulative Performance Comparison of preamble-based MAC protocols
Medium Access Control
Vergeben
3131
Introduction to Sensor Networks –
Dependencies between Protocol Design and used Hardware
General:
–
Different network topologies
–
Different applications
–
Different hardware resources
special protocol design is needed
Questions:
–
What is a Wireless Sensor Network?
–
What is characteristic for the hardware?
–
Which requirements for the operating system exist?
–
How works a protocol stack?
–
Why should be energy efficient networks be developed?
Advisor: Schmitt
Vergeben
323232
Acustic
Communication (UWNs)
Goal: Introduction
and characterisation
of the
communication
workflow
in an
underwater
application.
Questions:
–
Which
technologies
exist?
•
Hardware (ultrasonic, infrasonic)
•
Technologies of modulation
•
Fault tolerance
–
Characterization
of Communication
•
Data rate
•
Range
•
Latency
–
Characterization
of Applications
•
Military Approaches
(„SOSUS“)
•
Civil Approaches
(Tsunami
Warning)
Advisors: Baumgarten, Söllner
Vergeben
3333
Tasks:
–
Description of the RPL protocol
–
Identification of performance limitation factors
–
Comparison with other routing protocols
•
Overhead
•
Routing metric
•
Packet loss
•
Delay
•
Complexity
•
Mobility
Routing -
RPL: IPv6 Routing Protocol for Low power and Lossy
Networks
Advisor: Alexander Klein – http://www.net.in.tum.de/de/mitarbeiter/klein/
BA/MA Thesis available:
Performance Evaluation of RPL in Wireless Sensor Networks
Vergeben
3434
TCP/IP communication
in a WSN
General:
–
TCP/IP are
well known
protocols
–
Important
topics
for
analysis
are
•
Flow
control
•
Addressing
•
Packet fragmentation
are
adapted
in a gateway
that
relays
Questions:
–
How
is
TCP/IP adapted
to WSNs?
–
Which
challenges
must
be
faced?
–
Characterisation
of the
workflow
(e.g. appllication
multimedia
WSN)
–
How
important
is
link quality
and how
can
it
be
estimated?
Advisor: Schmitt
Vergeben
3535
Tasks:
–
Short introduction to Tiny OS
–
Description of the CTP protocol including the LEEP algorithm
–
Comparison with other routing protocols
•
Overhead
•
Routing metric
•
Packet loss
•
Delay
•
Complexity
Routing
-
Collection
Tree
Protocol
(CTP)
Advisor: Alexander Klein – http://www.net.in.tum.de/de/mitarbeiter/klein/
BA/MA Thesis available:
Simulative Performance Evaluation of the Collection Tree Protocol (CTP)
Vergeben
3636
Tasks:
–
Discussion of necessity and challenges of IP communication in WSNs
–
Introduction and description of different IP stacks (μIP / BLIP)
–
Comparison of the IP stacks•
Memory
•
Reliability
•
Overhead
IP-based
Communication
in Wireless Sensor Network
Advisor: Alexander Klein – http://www.net.in.tum.de/de/mitarbeiter/klein/
BA/MA Thesis available:
IP-based Communication in Wireless Sensor Network
Vergeben
37
3838
•
Administration
•
Intoduction
to offered
topics
•
Topic selection
3939
Topic Selection
(I)
Author Title Advisor
Andreas Heider Introduction to Sensor Networks –
Dependencies between Protocol Design and used Hardware
Schmitt
Andrè
Freitag Data Acquisition
Techniques
to save resources
Schmitt
More
topics
possible
Sebastian Bendeich
Security
in WSNs
-Key Distribution and Management
Random
Key Distribution Schemes
in WSNs
-
Comparison
of different probalistic
approaches
Schmitt, Söllner
Schmitt
Dominik Weber Introduction
to Sensor Networks II –
Sensor Types
and Bus ProtocolsSöllner
Dominik Wetzel Intorduction
to Sensor Networks I
-
Different node
hardware
platforms
Söllner
4040
Topic Selection
(II)
Author Title Advisor
Johannes Ziegltrum Energy Consumption of Sensor Components -
Optimizing Sensor Measurements and Communication
Söllner, Schmitt
Resource-Management-Tools
for
WSNs Schmitt
Tsvetko
Tsvetkov Routing -
RPL: IPv6 Routing Protocol for Low power and Lossy
NetworksKlein
Christian Dietz Routing
-
Collection
Tree
Protocol
(CTP) Klein
Christian Fuchs IP-based
Communication
in Wireless Sensor Network
Klein
Markus Grimm Acustic
Communication
(UWNs) Söllner
Joseph Wessner MAC –
Comparison
of preamble-based
MAC protocolsKlein
4141
Topic Selection
(III)
Author Title Advisor
Data processing
techniques Schmitt
Johannes Schlicker Security in WSNs
-
Node Replication Attacks
Schmitt
Security in WSNs
–
Denial Of Service attacks
Schmitt
Simulation Tools Klein
Oliver Gasser TCP/IP communication
in a WSN Schmitt
TLS solutions
for
WSNs Schmitt
Aggregation
in WSNs Schmitt
Michael Stuber Event Detection
in WSNs
–
Vehical
TrackingSchmitt, Söllner
42
Topic Selection
(IV)
Author Title Advisor
WSN Application
–
Neonatal
Monitoring Schmitt
Reprogramming
Techniques
for
WSNs Schmitt
Neighbor
Discovery Strategies
in WSNs Schmitt
Michael Schmitt WSN Application
–
Cell
Phone as Sensor Node
Söllner
Watermarking
in Sensor Data Sets Schmitt
Markus Dauberschmidt
More
topics
possible
Introduction
to Sensor Networks -
Comparison
of Operating
SystemsBaumgarten, Söllner
43