1 / 15

Security:

Security:. Zero-Interaction Authentication (best paper award), Univ of Michigan, Ann Arbor Loss/theft of mobile devices exposes sensitive files Authentication token worn by user which continuously authenticates to the laptop

lynley
Download Presentation

Security:

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security: Zero-Interaction Authentication (best paper award), Univ of Michigan, Ann Arbor Loss/theft of mobile devices exposes sensitive files Authentication token worn by user which continuously authenticates to the laptop Ariadne: A secure on-demand routing protocol for Ad hoc networks, Carnegie Mellon University DSR combined with TESLA

  2. Media Access Control for Ad Hoc Networks Opportunistic Media Access for Multirate Ad Hoc Networks, Rice University Opportunistically send multiple back-to-back data packets A Power Control MAC protocol for Ad Hoc Networks, Texas A&M, UIUC RTS/CTS higher power level than DATA/ACK Varies transmit power level on a per-packet level (190us, 20us)

  3. Cont… • Transmission Scheduling in Ad Hoc Networks with Directional Antennas, University of California, Santa Cruz • Distributed scheduling protocol • Determines number of links for activation using two-hop topology information • Using Directional Antennas for Medium Access Control in Ad Hoc Networks, UIUC • Directional antennas allow simultaneous communications increasing spatial reuse • Multi-hop RTSs to establish links, single hop data/ack

  4. Transport Layer Issues • TCP/IP Performance over 3G wireless links with Rate and Delay Variation, Bell Labs • Retransmissions => increased delay • Channel state based scheduling => variable rate • ACK Regulator • Transport Layer Approach to Achieving Aggregate Bandwidths on Multi-homed Mobile Hosts, Georgia Institute of Technology • pTCP • Reliable Network Connections, University of Wisconsin – Madison • ROCKS/RACKS provide transparent network connectivity • Enhancement Detection Protocol

  5. Wireless Local Area Networks • Analysis of Campus-wide Wireless Networks, Darthmouth College • 11weeks, 2000 users, campus-wide network of 476 access points,161 buildings • Minimizing Energy for Wireless Web Access with Bounded Slowdown, MIT • Interaction of TCP with PSM • Minimizes energy while guaranteeing RTT does not increase by more than a given percentage • Link Layer Assisted Mobile IP Fast Handoff Method over Wireless LAN Networks, KDDI R&D • A MAC bridge is used to divert traffic while MIP registration takes place

  6. Sensor Networks • On the Interdependence of Routing & Data Compression in Multi-Hop Sensor Networks, Cornell • Samples of a random field are collected at each node, goal is to estimate the entire field within a prescribed distortion value • Tight coupling between routing & source coding • A Two-tier Data Dissemination Model for Large-scale Wireless Sensor Networks, UCLA • Sensor nodes stationary, sinks mobile • A grid is constructed which allows sinks to gather data by flooding queries within a local cell

  7. Poster Session • Mining a World of Smart Sensors, Intel Research, Pittsburgh • TCP – XMPT (UIUC) • Video over multi-path in ad hoc, Polytechnic University • Source coding • Application QoS mapping to Hardware Settings (UAMPS, MIT, rmin@mtl.mit.edu) • Misbehavior detection in 802.11, UIUC • AP tells the node the amount to back off & checks to see if it obeys • Qos 802.11 distributed fashion, University of Pittsburgh • DRR, IFS depends on deficit • Secure Spaces, UMCP – MIND lab • Authentication based on Location

  8. Energy Efficient Systems • Wake on Wireless: An Event Driven Energy Saving Strategy for Battery Operated Devices, MIT, Microsoft • To reduce idle power, the device is shut down • Second channel is used for wakeup • Implementation • Minimum Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues, EPFL Switzerland • Given a source node, find pairs of relay nodes, transmission power levels so that all nodes get the message with least energy expended • Formal proof that power optimal broadcast is NP complete • Approximation algorithm and its distributed implementation

  9. Cont… • Investigating Upper Bounds on Network Lifetime …., Georgia Tech • Analyze lifetime/density tradeoff (cooperative cell based strategies) • Assumptions: nodes uniformly distributed, traffic evenly distributed across nodes

  10. Resource Control and QoS in Wireless Systems • Resource Control for Elastic Traffic in CDMA Networks, ICS Greece • Net utility maximization problem can be decomposed into • Selection of optimal signal quality • Selection of optimal transmission rate • Capacity of Multi-service Cellular Networks with Transmission-Rate Control: A Queuing Analysis, INRIA France • Calculate uplink capacity for best-effort traffic • Slowing transmission rate increases capacity • Blocking probability can be made very small

  11. Cont… • Efficient Integration of Multi-Hop Wireless and Wired Networks with QoS Constraints, Bell Labs • Design low cost infrastructure • Polynomial time approximation algorithm

  12. System Issues • Robotics-Based Location Sensing using Wireless Ethernet, Rice University • Design, implementation and analysis for determining position from measured RF signal strengths • Control theory • On Balancing between Transcoding Overhead and Spatial Consumption in Content Adaptation, University of Hong Kong • Optimal tradeoff between transcoding cost (CPU) and storage cost (I/O) • Prove bounds on optimality of alg • Implementation – PDF document

  13. Cont… • Rajicon: Remote PC GUI Operations via Constricted Mobile Interfaces, UCB, Osaka University • Easy to use interface to remotely operate a PC’s GUI operating system via a cellular phone • Image based navigation, keyboard shortcuts

  14. Challenges • Environmental Design for Pervasive Computing Systems, Telcordia • Reduce environmental impact of pervasive computing • New architectures, design methodologies, metrics, operating system, algorithms • Physical waste, energy consumption • Integrating Mobile Wireless Devices into Computational Grid, UCLA • Identify research challenges • Proxy-based clustered system architecture

  15. Cont… • Recombinant Computing and the Speakeasy Approach, Palo Alto Research Center • Interoperability among group of devices, applications and services • Limited a priori knowledge of one another

More Related