Download Pervasive Computing - Winlab

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Net neutrality law wikipedia , lookup

Net bias wikipedia , lookup

Wireless USB wikipedia , lookup

Computer network wikipedia , lookup

Computer security wikipedia , lookup

Network tap wikipedia , lookup

Wi-Fi wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Airborne Networking wikipedia , lookup

Policies promoting wireless broadband in the United States wikipedia , lookup

Wireless security wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Transcript
Future Wireless Systems:
Mobile Networks, Pervasive
Computing, Testbeds, and
Security
Rutgers, The State University of New Jersey
www.winlab.rutgers.edu
1
Introduction: IT & Telecom Evolution (1)
Telecom
Analog
Telephone
(~1880)
Cellular Systems
(~1985)
Digital
Telephone
(ESS)
(~1965)
Broadband Switching
(~1990)
Information Tech
Papyrus
Scroll
(B.C.)
Cell Phones
Everywhere
(~2000)
Paper
Files
(until ~1950)
Mainframe
Computing
(~1950)
Time-sharing
(~1970)
PC/local area network
(~1985)
Global
Internet
(~2000)
2
Introduction: IT & Telecom Evolution (2)
Wireless Sensor Nets
Telecom
Internet + Telecom
Cell Phones
Everywhere
(~2000)
The Virtual World
Global
Internet
(~2000)
virtualized via sensors & actuators
The Physical World
Information Tech
Digital
Media
Convergence
(2000-2010)
control
data
Global Internet for
data & telecom
Pervasive
Computing
(2015-)
3
Introduction: IT & Telecom Evolution (3)

Some observations:






The first wave of telecom connected places/devices rather than people
Cellular phones changed the paradigm to connecting people anytime-anywhere
Consumers demonstrate a strong preference for cellular over wired services –
cellular long-distance call minutes now >> wired telephones
The Internet connected people to the “virtual world” of information (books,
documents, tickets, money,…)
Ongoing convergence of the telecom network with the Internet will provide
anytime-anywhere access to people and information  the Mobile Internet
The technology challenge is that of migrating from today’s separate Internet +
mobile networks (GSM, CDMA, etc.) to a unified Mobile Internet


Core technologies (high-speed radio, wireless data, VOIP, etc.)
Network architectures (3G, mobile IP, 4G, …)
4
Introduction: IT & Telecom Evolution (4)

Observations (contd.):

The next major IT wave will be about expanding the Internet to process and
manage information from the physical world (objects, events, places…)
 This will facilitate tighter integration of computing and communication with
people’s daily lives….
 Smart environments with embedded intelligence, access to location- and contextsensitive information in real-time, increased control of the physical world

The technology challenge is that of creating sensor nets and pervasive
computing environments that permit integration of physical & virtual worlds



Core technologies (sensors, embedded wireless, low-power circuits,..)
Network & software architectures (ad-hoc sensor nets, pervasive systems)
Even a modest ~5% gain in physical world efficiency would result in a huge cost
savings for the economy.... potential productivity impact of 100’s of B$ per year
5
WINLAB
and
Future Wireless
Networks
6
Wireless Information Network
Laboratory






Cooperative industry-university research center at Rutgers
University, focused on wireless technology
In operation since 1989, with a strong track record of research
contributions to wireless data networking
Research program a mix of core R&D, focus projects and
industry collaboration
~15-20 Industry sponsors, NSF, NJCST, …
~20 faculty/staff + ~40-50 students
Starting in Fall 2001, WINLAB has executed a strategic
growth plan that has significantly increased research
scope/activity and taken the center into new areas such as
sensor technology and ad-hoc networking…
7
WINLAB Activity Model
Sponsor Fees,
RU &
Government
research funds
Additional
Project
Support
Core Research Areas
New system concepts, IPR, …
DARPA
Projects
(e.g.
Infostations)
Major NSF
Projects
(e.g. ORBIT)
NJCST
Project
(NJ Center
for Wireless
Comm)
Tech Reports,
Sponsor meetings,
Software tools,
etc.
Focus
Project(s)
with Sponsor
Companies
Pre-commercial technology
RU, NJCST..
(TBD)
Tech Transfer Center (Planned)
8
WINLAB Overview: Industry Sponsors
*
Panasonic
Aruba Networks *
*Research Partners
9
WINLAB Prototypes: Medical Sensor
with 802.11 WLAN

First system-level MUSE
prototype completed 11/03




New ECG interface board
CerfCube platform with 802.11b (off-the
shelf components)
WINLAB drivers & networking software
Next steps



Make this prototype available to
BioMed and UMDNJ collaborators
Integrate with ZnO devices
Continue work towards MUSE sensor
SoP/SoC with low-power 802.11b
10
Future Wireless: “4G” Network Scenario
MSC
Internet (IP-based)
Public Switched Network
(PSTN)
Custom
Mobile
Infrastructure
(e.g. GSM, 3G)
BSC
Increasing use of fast, low-cost
short-range radios
Heterogeneous systems with multiple
radio standards (3G, 4G, WLAN, UWB..)
Uniform IP core network
Self-organizing ad-hoc access networks
New broadband services
New embedded devices (sensors)
Wide range of applications (
“pervasive computing systems”
Generic mobile infrastructure
GGSN,
etc.
BTS
BTS
WLAN
Access
Point
Infostation
cache
WLAN
Hot-Spot
High-speed
data & VOIP
Relay node
CDMA, GSM
or 3G radio
access network
Voice
(legacy)
High-speed
data & VOIP
Broadband Media cluster
(e.g. UWB or MIMO)
Today
Future
Ad-hoc
network
extension
VOIP
(multi-mode)
Low-tier clusters
(e.g. low power 802.11 sensor)
11
WINLAB Testbeds:
ORBIT
Ivan Seskar
12
ORBIT: Project Rationale






Shared multi-user facility for stimulating experimental
wireless networking research across entire community
Platform for reproducible evaluation of future wireless
network protocols
Facilitate large-scale wireless system experiments not
feasible via simulation or case-by-case prototyping
Gain experimental experience and skills in building large
scale wireless/mobile networks with open API, etc.
Progress on system emulation, modeling, measurements
Research advances in future wireless network protocols
via experimental projects & collaboration…
13
WINLAB Prototypes: ORBIT Testbed



Open-access next-generation wireless network testbed being developed at
Rutgers for NSF network research testbeds (NRT) program
Large scale “radio grid emulator” for evaluating new concepts for future
wireless networks, e.g. ad-hoc sensor nets, pervasive systems...
Also, outdoor “field trial network” covering RU Busch & NB campuses for
real-world application work
Research
User of
Testbed
ns-2+ scripts
&
code
downloads
Static radio
node
Global Internet
Emulator
Mapping
Firewall
Mobility
Server
“Open”
API
3G BTS
High
Speed
Net
Wired
routers
Dual-mode
Radio
device
Radio link
emulation
Mobile node
(robotic control)
1. Radio Grid for Lab Emulation
“Open”
API
Access
Point
(802.11b)
3G
access
link
Ad-hoc
link
End-user devices
2. Field Trial Network
14
ORBIT: Testbed Facilities

Simulation (Cluster)

Compute facility to run simulations (NS)
 Extensions to ns-2 PHY modules for improved realism and cross-layer

Emulation Grid

802.11a radio nodes (~25x25 @ 1m spacing)
 Mapping of various “typical” wireless net scenarios
 Open API for complete flexibility of OS/protocol software; Linux libraries

Field Trial System

Outdoor system for greater realism in protocol testing & for application
development, live demos, etc.
 3G base station with IP interface
 ~50 open API 802.11a AP’s covering RU NB campus, some downtown areas…
 Mobile AP’s on buses, etc.
15
ORBIT Testbed: Radio Grid
VPN Gateway to
Wide-Area Testbed
Front-end
Servers
Gigabit backbone
80 ft ( 20 nodes )
70 ft ( 20 nodes )
Data
switch
Application Servers
(User applications/
Delay nodes/
Mobility Controllers
/ Mobile Nodes)
Control switch
SA1
SA2
SAP
RF/Spectrum Measurements
IS1
IS2
ISQ
Interference Sources
Back-end servers
Internet VPN Gateway /
Firewall
16
ORBIT Radio Node
ORBIT Radio Node
with integrated Chassis Manager
Non-Grid Node
Chassis Manager
17
Experiment Patterns
Peer to peer
Access Point
WAN Retrieval
Multiple Radios
Multiple Access Points
WAN Communication
18
ORBIT: Physical Facilities
•~12,000 sq ft (Grid + Lab. space + Offices)
•Rt 1 South @ Technology Center of NJ
•“Move in” Fall/Winter 2004
19
ORBIT Testbed: Field Trial System
20
Lucent Technologies
Bell Labs Innovations
ORBIT: UMTS Base Station
Router (BSR)
Courtesy of Sanjoy Paul,
Bell Labs
21
Pervasive
Computing
Yanyong Zhang
22
Future Wireless: Pervasive Systems
Compute & Storage
Servers
Pervasive
Application
Agents
User interfaces for
information & control
Mobile Internet (IP-based)
Overlay Pervasive Network Services
3G/4G
BTS
Sensor net/IP gateway
GW
Relay Node
Ad-Hoc Sensor Net A
Sensor/
Actuator
Ad-Hoc Sensor Net B
Virtualized Physical World
Object or Event
23
Future Wireless: Pervasive Applications

(Frictionless Capitalism)**2

Find goods and services on your PDA as you walk through town
 Walk into your dept store and pick up what you need (no cashier!)

“Smart” Transportation systems

get routed around traffic jams in real-time
 receive collision avoidance feedback, augmented reality displays
 be guided to an open parking spot in a busy garage

Airport logistics and security

Walk on to your plane (except for physical security check)
 Find your (lost) bags via RFID sensors
 Airport authorities can screen passenger flows and check for unusual patterns

Smart office or home

Search for physical objects, documents, books
 Migrate your electronic media and documents between devices
 Maintain a “lifelog” that stores a history of events by location
 know where your co-workers and family members are
24
Future Wireless: Key Technologies for
Pervasive Systems

Sensors

Tiny, low-power, integrated wireless sensors (hardware)
 Embedded OS and networking capabilities (software)

Ad-hoc wireless networks

Self-organizing sensor networks
 Scalable, capable of organic growth
 Interface to existing 3G/4G cellular and WLAN
 Power efficient operation

new type of wireless network without
planning or central control
Pervasive computing software

Dynamic binding of application agents and sensors
 Real-time orchestration of sensor net resources
 Robust, secure and failsafe systems

emerging computer hardware
category, optimized for size/power
fundamentally different software model
- not TCP/IP Windows or Unix!!
Augmented reality, new displays, robotics, control, information processing...
...beyond the scope of this talk
25
Pervasive Computing: Software Model

Ubiquitous or pervasive computing scenarios require a
fundamentally new software model (…not TCP/IP or web!!):




Large number of context-dependent sources/sensors with unknown IP address
Content-driven networking (…not like TCP/IP client-server!)
Distributed, collaborative computing between “sensor clusters”
Varying wireless connectivity and resource levels
Pervasive Computing Application
Agent 2
Agent 3
Agent 1
Pervasive/Ubiquitous
Computing Software
Model
Overlay Network for
Dynamic Agent <-> Sensor
Association
Sensor
Cluster B
Sensor
Cluster A
Resource
Discovery
Ad-hoc
Routing
Run-time
Environment
(network OS)
OS/Process
Scheduling
26
Pervasive Computing: System Model
Affinity
Groups
Autonomous Agents
Content Network
Hierarchical
Ad-Hoc Data Network
Sensors & Actuators
Courtesy of Prof. Max Ott
27
Pervasive Computing: Process Orchestration

Programming ad hoc control systems – Coordinated Flows


Dynamic binding of application with sensors & actuators
Orchestration of computing and network resources in real-time
Allocate closest
available space
Look for parking space subscribe
(plate-num, car-type, student)
Parking Center
Data Center
Monitor
incoming car
Check parking
space availability
Check registration,
Deduct parking fee
Look for parking space: subscribe
(plate-num, car-type, IAB guest)
Incoming Car ( check ID: Registered
student/faculty/staff, guest reservation? Fee
deduction)
Monitor
available space
Campus Parking Service
courtesy of Prof. Manish Parashar
28
Wireless Security
Wade Trappe
29
What are the major wireless security risks?





Easy to intercept and monitor wireless traffic!!!
Weak factory-installed security!
Intrusions
Denial of service attacks
Jamming attacks
30
Drive By Hacking and War Driving
Less than 1500ft
*
PalmPilot
Mobile Phone
If the distance from the Access Point to the
street outside is 1500 feet or less, then a
Intruder could also get access – while sitting
outside
31
Packet Sniffing
32
Service Set Identifier (SSID) and their limits!






Limits access by identifying the service area covered by the
access points.
AP periodically broadcasts SSID in a beacon.
End station listens to these broadcasts and chooses an AP to
associate with based upon its SSID.
Use of SSID – weak form of security as beacon management
frames on 802.11 WLAN are always sent in the clear.
A hacker can use analysis tools (eg. AirMagnet, Netstumbler,
AiroPeek) to identify SSID.
Some vendors use default SSIDs which are pretty well known
(eg. CISCO uses tsunami)
33
MAC Address Filtering




The system administrator can specify a list of MAC addresses
that can communicate through an access point.
Advantage :
Provides a little stronger security than SSID
Disadvantages :
Increases Administrative overhead
Reduces Scalability
Determined hackers can still break it
34
Wired Equivalent Privacy (WEP)





Designed to provide confidentiality to a wireless network similar to that of
standard LANs.
WEP is essentially the RC4 symmetric key cryptographic algorithm (same key
for encrypting and decrypting).
Transmitting station concatenates 40 bit key with a 24 bit Initialization Vector
(IV) to produce pseudorandom key stream.
WEP has been broken! Walker (Oct 2000), Borisov et. al. (Jan 2001), FluhrerMantin -Shamir (Aug 2001).
Unsafe at any key size : Testing reveals WEP encapsulation remains insecure
whether its key length is 1 bit or 1000 or any other size.
Message
CRC
RC4(v,K)
v
Ciphertext
Transmit
35
Jamming (Denial of Service)



Broadcast radio signals at the
same frequency as the wireless
Ethernet transmitters - 2.4 GHz for
802.11b/g!
To jam, you just need to broadcast
a radio signal at the same
frequency but at a higher power.
Waveform Generators and the
Microwave Oven!



Yes, heating up your lunch aggravates your
system administrator!
What can one do?
WINLAB’s solution, from Sun
Tze’s Art of War: “He who can’t
defeat his enemy should retreat!”

Answers:


Change your channel allocation
Move your location!
36
Where to go from here?



The future of communications is wireless!
New Jersey has a proud history of innovation in wireless.
Collaboration between university, government and industry will keep
NJ as a leader in wireless!
Research
Ideas
Core
Focus
Areas
Collaboration
With Industry and
Government
Adds Understanding
Result: Synthesize a
Statewide
Portfolio of Innovations
37