overview of research at unl-tdu

31
Overview of Research at UNL-TDU October 16, 2003 Yoshito Tobe Ubiquitous Networking Laboratory Tokyo Denki University

Upload: maree

Post on 01-Feb-2016

47 views

Category:

Documents


0 download

DESCRIPTION

Overview of Research at UNL-TDU. October 16, 2003 Yoshito Tobe Ubiquitous Networking Laboratory Tokyo Denki University. Goal. To establish the most suitable networking technology for ubiquitous computing - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Overview of Research at UNL-TDU

Overview of Researchat UNL-TDU

October 16, 2003Yoshito Tobe

Ubiquitous Networking LaboratoryTokyo Denki University

Page 2: Overview of Research at UNL-TDU

Goal

To establish the most suitable networking technology for ubiquitous computing

To establish a unified view and discipline of networking (particles, devices, people, society etc.)

Core: NETWORK-ING

Page 3: Overview of Research at UNL-TDU

History Apr. 1, 2002. Bootstrapping Dec. 2002 First students. Welcome! Dec. 20, 2003. First Event: Visiting SONY CSL Feb. 25, 2003. Visiting Todai-STONE Mar. 17, 2003.   Visiting Tokuda-lab Apr. 1, 2003. One-year anniversary Apr. 26, 2003. Sight-seeing with Al Krohn May 31, 2003. Joint workshop with Todai, Keio, UEC Aug. 4, 2003. Visiting Taki-lab, TDU Aug. 25- Sep. 5, 2003. ACM SIGCOMM etc. Sep. 26, 3003. Visiting TRL. IBM [Planned] Nov. 4-9 Los Angeles Tour

Page 4: Overview of Research at UNL-TDU

Members

Faculty members   2 Bachelor's students 3 Joint Researchers 4 Total 5 (9 in a wider sense)

Page 5: Overview of Research at UNL-TDU

Faculty members

Yoshito Tobe (Sensor Maps)

Hiroki Saito (HTTP/TCP Analysis)

へ のへのもへ

Page 6: Overview of Research at UNL-TDU

Bachelor's Students

Kazunori Makimura (Net Mgt for Sensor Networks)

Ken'ichiro Kanehana (Computing Resource Mgt. considering Physical Env.)

Yasufumi Yamauchi (Service Cooperation Using Multi-hop Wireless Networks)

Page 7: Overview of Research at UNL-TDU

Joint Researchers (1)

Koichi Katayama (Sasaki Lab) Intrusion Detection

Niwat Thepvilojanapong (Univ. of Tokyo) Robust and Secure Multicast ?

Page 8: Overview of Research at UNL-TDU

Joint Researchers (2)

Hiroto (Keio Tokuda Lab.) Group Management of Wireless Nodes

Makoto Takizawa (Keio Tokuda Lab.)

Member of RT project

Page 9: Overview of Research at UNL-TDU

Research Topics

Network Management for Sensor Networks

Public-Private Association Human-Assisted Ad hoc

Networks

Page 10: Overview of Research at UNL-TDU

Network Management for Distributed Sensors

1

Page 11: Overview of Research at UNL-TDU

Problems on Sensor-Network Management

??"Which sensor ?"

Sensors

Sensors

Sensors

1. Specifying nodes is difficult.

2. Performance such as delay is unpredictable because network is self-configured.

3. When failures occur, identification of the failed nodes is difficult.

4. Replacing batteries is required before they run out.

Page 12: Overview of Research at UNL-TDU

Why is conventional network management not sufficient ?

3

Simple Network Management Protocol (SNMP)

Manager

Agents

Sensor-specific failures arenot handled.Physical connections are notutilized.

Page 13: Overview of Research at UNL-TDU

SNAC Objectives Notification of Sensor-Specific Failures Utilization of Physical Views Identification of Constructed Topology Statistical Management

4

Page 14: Overview of Research at UNL-TDU

Early Notification

5

Noderemaining amount of

battery

Alive Node above threshold

Weakened Node below threshold

Depleted Node none

It is desirable to replace the battery of the sensor nodebefore it is depleted . Each node is equipped with battery, and NMN(Network-Management Node) is warned when the amount of the battery at a node falls below a certain threshold.

An event is transmitted to NMN to notify that a node becomesweakened. In some case, nodes surrounding a weakened nodesend events to NMN.

Page 15: Overview of Research at UNL-TDU

Geographical Management

6

(0, 0)

Area-cast : specified in some range in geographical area.

Y1

Alive Node

Weakened Node

Depleted Node

Healthiness of an area is obtained using area-cast.

Area-cast is independent of the underlyingrouting protocol. However, if the routing protocol supports geographical information, the area-cast utilizes the information.

1

0

10

(0, 1)

(1, 0)

(1, 1)

10

1

0

(1, 11)(1, 01)

(1, 00) (1, 10)

… (1, 11)

… (1, 111)

Location addr

Page 16: Overview of Research at UNL-TDU

Performance Management

7

Sensor network is self-configured. Therefore, a route that is undesirable in terms of delay could be created. To diagnosesuch performance, NMN can identify a route between nodes.NMN can indicate to reconfigure a routedepending on the reported performance.

A1

A2A3

A4

NMN

?

×Route is recorded.

Page 17: Overview of Research at UNL-TDU

Visual Enhancement

8

Nodes can be equipped with indicators such as LEDs. Network management can be enhanced with the aid of suchindicators.Commands: show-route-to-node show-congested-nodes

Example: find weakened nodes

Weakened NodeThe route from NMNto a target node is indicatedwith LEDs.

Alive Node

<green>LEDs blinks.

<Red>LEDs blinks

Page 18: Overview of Research at UNL-TDU

SNAC Prototype20 MICA Motes

Implementation built on TinyOS

Commands: (1) Show-route-to-node

(2) Light-all-alive-nodes

Event Notification

weakened node

9

Page 19: Overview of Research at UNL-TDU

SAPEA: Secure Management of Public-Private-Device Association

Page 20: Overview of Research at UNL-TDU

Background Personal Computing Devices are

equipped with short-distance radio functionality. Short-distance radio technology

IrDA IEEE802.11 Bluetooth

The increase of Hot Spot that can use a public computer equipment is forecast.

Page 21: Overview of Research at UNL-TDU

Problem when public equipment is used

Secret information protect when equipment is used When communicating with the equipment is not

information stolen? Does the secret information remain in the use

equipment, and do not it leak? Is not information transmitted to the equipment not

intended when there are two or more equipment? Are not you peeped at from the outsider?

The access control using physical space information is done between a public equipment and personal device.

SAPEA: Secure Ad-hoc Personalization Alliance

Page 22: Overview of Research at UNL-TDU

SAPEA: Secure Ad-hoc Personalization Alliance

Want to use the equipment secure in not only on the network but also the real world. Neither information nor signs remain in the

equipment after used. Use limitation only within the district zone. The secret information protect from outsider

whom does not want to be known. Grouping

Page 23: Overview of Research at UNL-TDU

Approach Secure use of public equipment by limitatio

n of using authority by distance from equipment, and grouping. Distance judgment by radio devices such

as RFID and Bluetooth. Grouping and communication by Bluetooth. Authentication and encryption communication by

SSL. Level of Accessible Zone (AZ) is divide.

Page 24: Overview of Research at UNL-TDU

Related WorksThe Resurrecting Duckling [1]

Computer equipment

Association

Ad-hoc Filesystem [2]

Personal DevicePersonal Device

Personal Device

Trust for Ubiquitous, Transparent Collaboration [3]

Personal Device Personal Device Personal Device

Phone Number

Recommendation+

Phone Number

Recommendation’+

Personal Device

Page 25: Overview of Research at UNL-TDU

SAPEA: System Architecture

Personal DevicePersonal Device Access StationAccess Station

SSL

Wireless Device

AssociationManager

User Interface DeviceManager

AreaManager

AssociationManager

SSL

Wireless Device

LocationDetector

Device #1

Device #2

Device #3

Page 26: Overview of Research at UNL-TDU

AZ2 AZ1

Only the user Can be detected and inquired

Can be used

User and Associate Can be detected and inquired

Can be used

User, Associate and Outsider

Can be detected and inquired

Not can be used

AZ

Group

Page 27: Overview of Research at UNL-TDU

SAPEA : Basic action

Distancejudgment

Cannot use

Demand

State inquiry

Outside of AZ Inside of AZ2

Inside of AZ1

Use state

Others are usingNo others

Notifies the user

Groupjudgment

Only the same group

Other groups are detected

Notifies all

Use or Stop

Can be used Stop

Do not useUseDistancejudgment

Page 28: Overview of Research at UNL-TDU

Distance judgment

AZ2: AS is detectable

AZ1: AScan be used

AccessStation

Accessible ZoneAccessible Zone

Page 29: Overview of Research at UNL-TDU

Grouping

A

A

A

AZ1

A

A

A

B

AccessStation

AccessStation

101 110001010

101

!?

Z

A

Page 30: Overview of Research at UNL-TDU

Implementation Implement environment

Access Station IBM Think Pad X30

socket Bluetooth Connection Kit Red Hat Linux kernel-2.4.18

bluez-kernel-2.3 OpenSSL 0.97b

Personal Device SHARP Zaurus SL-C700

socket Bluetooth Connection Kit bluez-kernel-2.3

RFID Printer

Page 31: Overview of Research at UNL-TDU

Concluding Remarks:

Networking Technologies are evolving.