1 / 23

Networks for Security Applications

Networks for Security Applications. Defense Security Innovation Quebec City, Nov. 16, 2007 Prof. Howard M. Schwartz. Presentation Outline. Who we are. Research Centre in Technology Innovation (RCTI). Networks for Security Applications. Wireless Sensor Networks.

nantai
Download Presentation

Networks for Security Applications

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Networks for Security Applications Defense Security Innovation Quebec City, Nov. 16, 2007 Prof. Howard M. Schwartz

  2. Presentation Outline • Who we are. • Research Centre in Technology Innovation (RCTI). • Networks for Security Applications. • Wireless Sensor Networks. • Sensors, Circuits and Devices for Security. • Networks and Swarms of Autonomous Vehicles (UAVs). • Network Intelligence and evolution • Simulation • Conclusion

  3. Who is RCTI? • 31 Professors at all levels. • From 6 Departments and 3 Faculties. • Systems and Computer Eng., Electronics, Mechanical Eng., Computer Science, Information Technology and Business. • Advance research and scholarly activity in electrical and systems engineering, computing science, and the development and commercialization of new products • Link R&D carried out by Carleton faculty and graduate students with companies. • Be a valuable source of talent, knowledge, prototypes, and technology to innovative companies. • Member of Technopôle Security and Defense

  4. Networks of things Networks that perceive, understand and take action for security applications. - Border security    - Industrial control and security    - Power grid control and security    - Transportation systems    - Telephone, internet communication systems

  5. Example of a Complex Network (Scenario developed by RUNES project: http://www.ist-runes.org/)

  6. Wireless Ad Hoc Network • Air drop wireless sensors over region. The system establishes its communication topology. Low power, low cost devices that are easily augmented and replaced.

  7. Research For Wireless Networks • Facilitate the collection of sensor data from a collection of resource-constrained sensor systems, connected wirelessly. How should the sensors talk to each other? • Support new applications and the re-tasking of wireless nodes. • Support easy integration of new sensors. • Efficient distribution of the information from the sensors to various interested parties (first responders, airport authorities, etc.). • Combine/fuse data derived from different sites. • Wireless mesh testbed, consisting of 14 custom-build mesh routers and a range of client devices (PDAs, laptops, etc.).

  8. Cyber-infrastructure for Bridge Monitoring • Continuously monitoring bridges in the country is an important goal • Management of Bridge Infrastructure can save life and reduce maintenance cost • Monitoring of large number of bridges, managing and making information available at finger tips, automated health & condition assessments and management, maintenance and emergency response are various facets of this problem • Monitored data can be of various types: sensor data, video data, acoustic, visual inspection etc.

  9. Border Security

  10. The Real Border Fence

  11. Research Directions in Sensors and Vehicles (The Things) • Biosensors and authentication. • Autonomous vehicles (Land, Air and Sea). • Video sensors (Cameras)and video understanding. • Super resolution enhancement.

  12. Bio-sensors • The heart rate and breathing monitor.

  13. Iris Retina Fingerprint Face Voice • Biometrics from biosensors provide some promising solutions to the authentication problems. Cardio-based Finger vein

  14. Military tactical mobile ad hoc networks (MANETs) challenge security design. • As the front line of defence, authentication is the core requirements for integrity and confidentiality in networked centric warfare.

  15. Research into Wireless Bio Sensors. • development and evaluation of biosensor wireless networking and management schemes that take into account wireless communication, power consumption and computational resource requirements, • development and evaluation of biometric-based user authentication and encryption for high security wireless communications,

  16. Autonomous Vehicles

  17. Cooperative robots and intelligence • Robots have own control and navigation algorithms • Robots only know their position and others

  18. Video Processing and Understanding Tracking of video objects

  19. Intelligent Video Object Tracking Tracking, counting and timing of video objects.

  20. Networks of Robots and Sensor Swarms

  21. Swarm Intelligence and Personality Evolution • Game Theory, Coalition formation. • Evolutionary Game Theory. • Learning (fuzzy, adaptive, genetic). • Personality Traits.

  22. Simulation • A rich simulation environment for network development, operator training and visual display.

  23. Conclusions • The Research Centre in Technology innovation is a unique grouping of 31 faculty and 100’s of students. The goal is to work closely with industry to bring new innovative ideas to market. • The research is focused on networks of sensors and devices. • Applications in Security and Defense. • Expertise and research in sensors, wireless systems, autonomous vehicles and computer networks. • Research into network intelligence, swarm intelligence and adaptive and learning systems. • Networks that perceive, understand and take action.

More Related