SlideShare a Scribd company logo
1 of 36
15-829B/18-849B/95-811A/19-729A
Internet-Scale Sensor Systems:
Design and Policy
Lecture 1 – Class Overview
Lecture 1 2
01-14-03
Outline
 Introduction to sensor systems
 Administrivia
 Whirlwind tour
Lecture 1 3
01-14-03
Objectives
 A multi-disciplinary introduction to the topic
area of sensor systems
 Databases, networking, security, policy
 Related topics
 Ad-hoc networking, XML databases, etc.
 What are sensor systems?
Lecture 1 4
01-14-03
Sensor System Types – Smart-Dust/Motes
 First introduced in late 90’s by groups at
UCB/UCLA/USC
 Published at Mobicom/SOSP conferences
 Small, resource limited devices
 CPU, disk, power, bandwidth, etc.
 Simple scalar sensors – temperature, motion
 Single domain of deployment (e.g. farm, battlefield,
etc.) for a targeted task (find the tanks)
 Ad-hoc wireless network
Lecture 1 5
01-14-03
Sensor System Types – Smart-Dust/Motes
 Hardware
 UCB motes
 Programming
 TinyOS
 Query processing
 TinyDB
 Directed diffusion
 Geographic hash tables
 Power management
 MAC protocols
 Adaptive topologies
Lecture 1 6
01-14-03
Berkeley Motes
 Devices that incorporate
communications, processing,
sensors, and batteries into a
small package
 Atmel microcontroller with
sensors and a communication
unit
 RF transceiver, laser module, or
a corner cube reflector
 Temperature, light, humidity,
pressure, 3 axis
magnetometers, 3 axis
accelerometers
Lecture 1 7
01-14-03
Berkeley Motes (Levis & Culler, ASPLOS 02)
Lecture 1 8
01-14-03
Sensor System Types – Brilliant Rocks
 Largely unexplored
 Larger PC/PDA class devices
 Multimedia sensors
 Sensors shared by many applications
 Parking space finder
 Person locator
 Bus locator
 Directly connected to Internet
Lecture 1 9
01-14-03
Example Application: Parking Space Finder
 A distributed database
maintains
 Spot availability data
 Address of parking spot
 Meter description
 Historical availability data
 Query: Where is the
cheapest empty parking spot
near Wean Hall?
 Returns list of spaces,
details on their meters
Lecture 1 10
01-14-03
IrisNet
 Local CMU/Intel Research Pittsburgh project
 Webcams & other smart sensors are everywhere,
collecting vast amounts of data
 But, no effective tools for querying this data and extracting
useful information
 Goal: Build a scalable infrastructure with
 Efficient query processing
 Filtering raw video feeds
 Dynamic reconfigurability
 Ease of service creation
Lecture 1 11
01-14-03
IrisNet Architecture
• Organizing Agents (OA):
• PC-class or server-class
processor, GBs of storage,
Linux
• Sensing Agents (SA):
• PDA/PC-class processor,
MBs–GBs storage, Linux
User
Internet
Sensing Agent Sensing Agent
Sensing Agent
Organizing Agents
Lecture 1 12
01-14-03
Outline
 Introduction to sensor systems
 Administrivia
 Whirlwind tour
Lecture 1 13
01-14-03
Who’s Who?
 Dave Farber (Public Policy)
 http://www.cis.upenn.edu/~farber
 dave@farber.net
 Phil Gibbons (Databases)
 http://info.pittsburgh.intel-research.net/People/gibbons
 phillip.b.gibbons@intel.com
 Brad Karp (Networking/Distributed Systems)
 http://www.cs.cmu.edu/~bkarp
 bkarp@cs.cmu.edu
Lecture 1 14
01-14-03
Who’s Who?
 Adrian Perrig (Security)
 http://www.ece.cmu.edu/~adrian
 perrig@cmu.edu
 Srinivasan Seshan (Networking/Distributed
Systems)
 http://www.cs.cmu.edu/~srini
 srini@cmu.edu
 TA: Suman Nath
 http://www.cs.cmu.edu/~sknath
 sknath@cs.cmu.edu
Lecture 1 15
01-14-03
Class Web Page:
http://www.cs.cmu.edu/~srini/15-829A
 Check regularly  announcements!!
 Course schedule
 Reading list
 Lecture notes
 Assignments
 Project ideas
 Exams
 Student list
Lecture 1 16
01-14-03
Office Hours
 Will be posted on web page
 Current office hours
 Srini: Tuesday 12:30 – 1:30
 Suman: ?
 Brad: Wednesday 10:00 – 11:00
 Dave: ? (out till Jan 23rd)
 Phil: ?
 Adrian: Tuesday 3:00 – 4:00
Lecture 1 17
01-14-03
Grading
 Homework assignments
 Mini-project (15%)
 Hand-ins for readings (10%)
 Class participation (10%)
 Project (40%)
 Final exam (25%)
Lecture 1 18
01-14-03
Course Materials
 Lack of a good reference text
 Too recent a topic
 Research papers
 Links to ps or pdf on Web page
 ~40 papers total (1-2 papers per lecture)
 Optional readings
Lecture 1 19
01-14-03
Assumed Background
 Undergrad familiarity with databases,
networking, security topic areas
 Should have familiarity in at least 2 of the 3
 E.g., relational database, routing, transport,
public/private key crypto, etc.
 For missing background, we will
 Provide pointers to catch up on these topics
 Keep undergrad texts on reserve in library
 Cover background quickly in lectures
Lecture 1 20
01-14-03
Projects
 3-person groups
 IrisNet-based
 IrisNet – locally developed research prototype
 An infrastructure for developing wide-area sensor services
 Mini-project provides intro to IrisNet
 Expectations
 10 page report + presentation
 Workshop quality results
 Project ideas
 Will be posted on Web page and discussed in lecture #3
Lecture 1 21
01-14-03
Example Projects – New Applications
 Person tracker – where is Srini?
 Image processing
 How do you identify Srini?
 Can you simplify the problem by using tracking?
 Query processing
 What type of queries are possible – where is Srini
now?, where has Srini been?, where is he usually?
 What type of data schema – are people organized by
location, name, organization?
 Privacy issues
 Who can access this information?
 How can user and infrastructure control/check
privacy?
Lecture 1 22
01-14-03
Example Projects – Infrastructure
Improvements
 Incorporating new sensor types in IrisNet
infrastructure
 Sensor motes, mobile sensors
 Applying image processing techniques to anonymize
video camera feed
 Using replication techniques to make IrisNet
infrastructure robust to failures
 Interesting deadlines
 Sensys – Apr 8th
 Mobicom workshops – June middle
Lecture 1 23
01-14-03
Projects (cont.)
 Generous donation from Intel
 20 laptops + cameras
 10 desktops
 Each project group will receive 2 laptops and
3 cameras
 Handed out during project proposal
 No replacements – take good care of them
 No grade until you return them in good condition!
 Make project groups by 1/28
Lecture 1 24
01-14-03
Outline
 Introduction to sensor systems
 Administrivia
 Whirlwind tour
Lecture 1 25
01-14-03
Topic Areas
 Networking/Distributed Systems
 Databases
 Security
 Privacy & Policy
Lecture 1 26
01-14-03
Networking/Distributed Systems
 Sensor Motes
 UCB Mote platform
 Directed diffusion, Geographic Hash Tables (GHT)
 TinyOS
 Wide area naming
 DNS
 INS
 Service discovery
 Distributed Hash Tables (DHTs)
 Chord, CAN, Pastry, Tapestry, etc.
 Databases: Pier
 Applications: CFS, Past
Lecture 1 27
01-14-03
Networking/Distributed Systems
 Adhoc networks/related sensor work
 Adhoc routing (DSR, GPSR)
 Leach/SPIN
 Adhoc network capacity
 Synchronization/localization
 Ad-hoc network clock synchronization
 GPS
 Indoor positioning (Radar, BAT, Cricket)
 Resource allocation/policing
 Class-based scheduling
 Resource protection
Lecture 1 28
01-14-03
Networking/Distributed Systems
 Geographic/network topology discovery
 Global Network Positioning (GNP)
 IDMAPS
 Network Weather Service
 IP2Geo
 Robustness
 Clock synchronization, causality for logging
 Logging/monitoring techniques
 Replication/consistency
 Transactional properties
Lecture 1 29
01-14-03
Databases
 XML introduction
 Data representation/schema
 Query languages (XPath, XQuery, XSLT)
 Distributed query processing in IrisNet
 Sensor network databases
 Streaming queries (Telegraph)
 Tiny DB
 Time-series data & data mining
Lecture 1 30
01-14-03
Databases
 Data models
 Hierarchal
 Relational databases
 Native XML databases
 Advanced topics
 Aggregation
 Consistency
 Queries on images
 Schema changes
Lecture 1 31
01-14-03
Security
 Security intro
 What is security?
 Security properties - authentication / confidentiality /
anonymity
 Attacker models & vulnerability classification
 E.g., Denial-of-service, Identity attacks (Sybil)
 Security vulnerabilities of wireless communication
 Basic cryptographic mechanisms
 Public-key cryptography
 Symmetric-key cryptographic primitives (Hash, MAC, block
cipher)
 One-way chains
 Merkle hash trees (data verification)
Lecture 1 32
01-14-03
Security
 Key distribution, trust bootstrapping
 Duckling (imprinting)
 Public key infrastructure (PKI)
 Small-group key agreement
 Large-group key distribution
 Key infection, secrecy amplification
 Random-key predistribution
Lecture 1 33
01-14-03
Security
 Advanced cryptographic primitives
 Secret sharing
 Group signatures
 Broadcast authentication
 Secure logging
 Code safety
 Sandboxing, VM
 Software fault isolation
 Java security
 Proof carrying code
Lecture 1 34
01-14-03
Privacy & Policy
 Policy introduction
 Mechanisms to encourage proper behavior
 E.g. cameras won’t spy on people
 Rewards & enforcement
 Privacy
 Laws on how private information can be distributed
 Describing privacy requirements (P3P)
 Other countries have privacy laws (info about citizens)
 E.g. European laws about personal info race, religion
 Laws/issues regarding crypto export/import/usage
 Access requirements for law enforcement
 Mechanisms to discover information (traffic analysis, etc.)
Lecture 1 35
01-14-03
Privacy & Policy
 Control how data can be used/accessed
 Digital rights management (DRM)
 Trusted systems
 Regulatory requirement (DMCA)
 Palladium
 Resource allocation/policing
 Admission control
 Fair allocation among competing applications
 Enforcement
Lecture 1 36
01-14-03
Next Lecture
 IrisNet system overview
 IrisNet demo
 Assigned reading:
 [N+03] IrisNet: An Architecture for Compute-
Intensive Wide-Area Sensor Network Services

More Related Content

Similar to Lecture on Internet Scale Sensor Systems

Secure Data Sharing with ABE in Wireless Sensor Networks
Secure Data Sharing with ABE in Wireless Sensor NetworksSecure Data Sharing with ABE in Wireless Sensor Networks
Secure Data Sharing with ABE in Wireless Sensor NetworksComputer Science Journals
 
A Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksA Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksScott Faria
 
1.Architecture
1.Architecture1.Architecture
1.Architecturephanleson
 
Data Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkData Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkIJCI JOURNAL
 
INFORMATION TECHNOLOGY.ppt
INFORMATION TECHNOLOGY.pptINFORMATION TECHNOLOGY.ppt
INFORMATION TECHNOLOGY.pptadnanwaris550
 
DEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICSDEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICSChris Sistrunk
 
Passive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessPassive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessDavid Sweigert
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?EnergySec
 
Research Challenges in Networked Systems, Torsten Braun, Universität Bern
Research Challenges in Networked Systems, Torsten Braun, Universität BernResearch Challenges in Networked Systems, Torsten Braun, Universität Bern
Research Challenges in Networked Systems, Torsten Braun, Universität BernThe Research Council of Norway, IKTPLUSS
 
Mobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and SecurityMobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and SecurityJohn Paul Prassanna
 
Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network Dharmendrasingh417
 
Leverage your network to improve asset management
Leverage your network to improve asset managementLeverage your network to improve asset management
Leverage your network to improve asset managementjmarkwort
 
International Journal of Computer Science and Security Volume (1) Issue (3)
International Journal of Computer Science and Security Volume (1) Issue (3)International Journal of Computer Science and Security Volume (1) Issue (3)
International Journal of Computer Science and Security Volume (1) Issue (3)CSCJournals
 
Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...eSAT Journals
 
gcettb presentation on sensor network
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor networkrahulkumargiri
 
Data Communication & Networking Basics
Data Communication & Networking BasicsData Communication & Networking Basics
Data Communication & Networking BasicsMahbub Alam Masud
 
Lessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy SectorLessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy SectorEnergySec
 

Similar to Lecture on Internet Scale Sensor Systems (20)

Secure Data Sharing with ABE in Wireless Sensor Networks
Secure Data Sharing with ABE in Wireless Sensor NetworksSecure Data Sharing with ABE in Wireless Sensor Networks
Secure Data Sharing with ABE in Wireless Sensor Networks
 
18CS3040 DISTRIBUTED SYSTEMS
18CS3040 DISTRIBUTED SYSTEMS18CS3040 DISTRIBUTED SYSTEMS
18CS3040 DISTRIBUTED SYSTEMS
 
A Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksA Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor Networks
 
1.Architecture
1.Architecture1.Architecture
1.Architecture
 
Data Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkData Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor Network
 
INFORMATION TECHNOLOGY.ppt
INFORMATION TECHNOLOGY.pptINFORMATION TECHNOLOGY.ppt
INFORMATION TECHNOLOGY.ppt
 
DEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICSDEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICS
 
Passive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessPassive monitoring to build Situational Awareness
Passive monitoring to build Situational Awareness
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?
 
IJCSE Paper
IJCSE PaperIJCSE Paper
IJCSE Paper
 
Research Challenges in Networked Systems, Torsten Braun, Universität Bern
Research Challenges in Networked Systems, Torsten Braun, Universität BernResearch Challenges in Networked Systems, Torsten Braun, Universität Bern
Research Challenges in Networked Systems, Torsten Braun, Universität Bern
 
Mobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and SecurityMobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and Security
 
Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network
 
Leverage your network to improve asset management
Leverage your network to improve asset managementLeverage your network to improve asset management
Leverage your network to improve asset management
 
International Journal of Computer Science and Security Volume (1) Issue (3)
International Journal of Computer Science and Security Volume (1) Issue (3)International Journal of Computer Science and Security Volume (1) Issue (3)
International Journal of Computer Science and Security Volume (1) Issue (3)
 
Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...
 
gcettb presentation on sensor network
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor network
 
Data Communication & Networking Basics
Data Communication & Networking BasicsData Communication & Networking Basics
Data Communication & Networking Basics
 
4777.team c.final
4777.team c.final4777.team c.final
4777.team c.final
 
Lessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy SectorLessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy Sector
 

More from DrAdeelAkram2

Lec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless CommunicationLec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless CommunicationDrAdeelAkram2
 
Lec 2 Cell Planning Principles lecture notes
Lec 2 Cell Planning Principles lecture notesLec 2 Cell Planning Principles lecture notes
Lec 2 Cell Planning Principles lecture notesDrAdeelAkram2
 
Wireless Ad Hoc Networking Lecture Notes
Wireless Ad Hoc Networking Lecture NotesWireless Ad Hoc Networking Lecture Notes
Wireless Ad Hoc Networking Lecture NotesDrAdeelAkram2
 
Grid and Cloud Computing Lecture-2a.pptx
Grid and Cloud Computing Lecture-2a.pptxGrid and Cloud Computing Lecture-2a.pptx
Grid and Cloud Computing Lecture-2a.pptxDrAdeelAkram2
 
Grid and Cloud Computing Lecture 1a.pptx
Grid and Cloud Computing Lecture 1a.pptxGrid and Cloud Computing Lecture 1a.pptx
Grid and Cloud Computing Lecture 1a.pptxDrAdeelAkram2
 
08_-_Masamichi_Tanaka_-_Bigdata_and_AI_in_IOT.pdf
08_-_Masamichi_Tanaka_-_Bigdata_and_AI_in_IOT.pdf08_-_Masamichi_Tanaka_-_Bigdata_and_AI_in_IOT.pdf
08_-_Masamichi_Tanaka_-_Bigdata_and_AI_in_IOT.pdfDrAdeelAkram2
 
Amazon Echo Introduction, Capabilities and Vulnerabilities
Amazon Echo Introduction, Capabilities and VulnerabilitiesAmazon Echo Introduction, Capabilities and Vulnerabilities
Amazon Echo Introduction, Capabilities and VulnerabilitiesDrAdeelAkram2
 

More from DrAdeelAkram2 (8)

Lec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless CommunicationLec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless Communication
 
Lec 2 Cell Planning Principles lecture notes
Lec 2 Cell Planning Principles lecture notesLec 2 Cell Planning Principles lecture notes
Lec 2 Cell Planning Principles lecture notes
 
Wireless Ad Hoc Networking Lecture Notes
Wireless Ad Hoc Networking Lecture NotesWireless Ad Hoc Networking Lecture Notes
Wireless Ad Hoc Networking Lecture Notes
 
Grid and Cloud Computing Lecture-2a.pptx
Grid and Cloud Computing Lecture-2a.pptxGrid and Cloud Computing Lecture-2a.pptx
Grid and Cloud Computing Lecture-2a.pptx
 
Grid and Cloud Computing Lecture 1a.pptx
Grid and Cloud Computing Lecture 1a.pptxGrid and Cloud Computing Lecture 1a.pptx
Grid and Cloud Computing Lecture 1a.pptx
 
08_-_Masamichi_Tanaka_-_Bigdata_and_AI_in_IOT.pdf
08_-_Masamichi_Tanaka_-_Bigdata_and_AI_in_IOT.pdf08_-_Masamichi_Tanaka_-_Bigdata_and_AI_in_IOT.pdf
08_-_Masamichi_Tanaka_-_Bigdata_and_AI_in_IOT.pdf
 
Amazon Echo Introduction, Capabilities and Vulnerabilities
Amazon Echo Introduction, Capabilities and VulnerabilitiesAmazon Echo Introduction, Capabilities and Vulnerabilities
Amazon Echo Introduction, Capabilities and Vulnerabilities
 
OpenMosix.ppt
OpenMosix.pptOpenMosix.ppt
OpenMosix.ppt
 

Recently uploaded

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseWSO2
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 

Recently uploaded (20)

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 

Lecture on Internet Scale Sensor Systems

  • 2. Lecture 1 2 01-14-03 Outline  Introduction to sensor systems  Administrivia  Whirlwind tour
  • 3. Lecture 1 3 01-14-03 Objectives  A multi-disciplinary introduction to the topic area of sensor systems  Databases, networking, security, policy  Related topics  Ad-hoc networking, XML databases, etc.  What are sensor systems?
  • 4. Lecture 1 4 01-14-03 Sensor System Types – Smart-Dust/Motes  First introduced in late 90’s by groups at UCB/UCLA/USC  Published at Mobicom/SOSP conferences  Small, resource limited devices  CPU, disk, power, bandwidth, etc.  Simple scalar sensors – temperature, motion  Single domain of deployment (e.g. farm, battlefield, etc.) for a targeted task (find the tanks)  Ad-hoc wireless network
  • 5. Lecture 1 5 01-14-03 Sensor System Types – Smart-Dust/Motes  Hardware  UCB motes  Programming  TinyOS  Query processing  TinyDB  Directed diffusion  Geographic hash tables  Power management  MAC protocols  Adaptive topologies
  • 6. Lecture 1 6 01-14-03 Berkeley Motes  Devices that incorporate communications, processing, sensors, and batteries into a small package  Atmel microcontroller with sensors and a communication unit  RF transceiver, laser module, or a corner cube reflector  Temperature, light, humidity, pressure, 3 axis magnetometers, 3 axis accelerometers
  • 7. Lecture 1 7 01-14-03 Berkeley Motes (Levis & Culler, ASPLOS 02)
  • 8. Lecture 1 8 01-14-03 Sensor System Types – Brilliant Rocks  Largely unexplored  Larger PC/PDA class devices  Multimedia sensors  Sensors shared by many applications  Parking space finder  Person locator  Bus locator  Directly connected to Internet
  • 9. Lecture 1 9 01-14-03 Example Application: Parking Space Finder  A distributed database maintains  Spot availability data  Address of parking spot  Meter description  Historical availability data  Query: Where is the cheapest empty parking spot near Wean Hall?  Returns list of spaces, details on their meters
  • 10. Lecture 1 10 01-14-03 IrisNet  Local CMU/Intel Research Pittsburgh project  Webcams & other smart sensors are everywhere, collecting vast amounts of data  But, no effective tools for querying this data and extracting useful information  Goal: Build a scalable infrastructure with  Efficient query processing  Filtering raw video feeds  Dynamic reconfigurability  Ease of service creation
  • 11. Lecture 1 11 01-14-03 IrisNet Architecture • Organizing Agents (OA): • PC-class or server-class processor, GBs of storage, Linux • Sensing Agents (SA): • PDA/PC-class processor, MBs–GBs storage, Linux User Internet Sensing Agent Sensing Agent Sensing Agent Organizing Agents
  • 12. Lecture 1 12 01-14-03 Outline  Introduction to sensor systems  Administrivia  Whirlwind tour
  • 13. Lecture 1 13 01-14-03 Who’s Who?  Dave Farber (Public Policy)  http://www.cis.upenn.edu/~farber  dave@farber.net  Phil Gibbons (Databases)  http://info.pittsburgh.intel-research.net/People/gibbons  phillip.b.gibbons@intel.com  Brad Karp (Networking/Distributed Systems)  http://www.cs.cmu.edu/~bkarp  bkarp@cs.cmu.edu
  • 14. Lecture 1 14 01-14-03 Who’s Who?  Adrian Perrig (Security)  http://www.ece.cmu.edu/~adrian  perrig@cmu.edu  Srinivasan Seshan (Networking/Distributed Systems)  http://www.cs.cmu.edu/~srini  srini@cmu.edu  TA: Suman Nath  http://www.cs.cmu.edu/~sknath  sknath@cs.cmu.edu
  • 15. Lecture 1 15 01-14-03 Class Web Page: http://www.cs.cmu.edu/~srini/15-829A  Check regularly  announcements!!  Course schedule  Reading list  Lecture notes  Assignments  Project ideas  Exams  Student list
  • 16. Lecture 1 16 01-14-03 Office Hours  Will be posted on web page  Current office hours  Srini: Tuesday 12:30 – 1:30  Suman: ?  Brad: Wednesday 10:00 – 11:00  Dave: ? (out till Jan 23rd)  Phil: ?  Adrian: Tuesday 3:00 – 4:00
  • 17. Lecture 1 17 01-14-03 Grading  Homework assignments  Mini-project (15%)  Hand-ins for readings (10%)  Class participation (10%)  Project (40%)  Final exam (25%)
  • 18. Lecture 1 18 01-14-03 Course Materials  Lack of a good reference text  Too recent a topic  Research papers  Links to ps or pdf on Web page  ~40 papers total (1-2 papers per lecture)  Optional readings
  • 19. Lecture 1 19 01-14-03 Assumed Background  Undergrad familiarity with databases, networking, security topic areas  Should have familiarity in at least 2 of the 3  E.g., relational database, routing, transport, public/private key crypto, etc.  For missing background, we will  Provide pointers to catch up on these topics  Keep undergrad texts on reserve in library  Cover background quickly in lectures
  • 20. Lecture 1 20 01-14-03 Projects  3-person groups  IrisNet-based  IrisNet – locally developed research prototype  An infrastructure for developing wide-area sensor services  Mini-project provides intro to IrisNet  Expectations  10 page report + presentation  Workshop quality results  Project ideas  Will be posted on Web page and discussed in lecture #3
  • 21. Lecture 1 21 01-14-03 Example Projects – New Applications  Person tracker – where is Srini?  Image processing  How do you identify Srini?  Can you simplify the problem by using tracking?  Query processing  What type of queries are possible – where is Srini now?, where has Srini been?, where is he usually?  What type of data schema – are people organized by location, name, organization?  Privacy issues  Who can access this information?  How can user and infrastructure control/check privacy?
  • 22. Lecture 1 22 01-14-03 Example Projects – Infrastructure Improvements  Incorporating new sensor types in IrisNet infrastructure  Sensor motes, mobile sensors  Applying image processing techniques to anonymize video camera feed  Using replication techniques to make IrisNet infrastructure robust to failures  Interesting deadlines  Sensys – Apr 8th  Mobicom workshops – June middle
  • 23. Lecture 1 23 01-14-03 Projects (cont.)  Generous donation from Intel  20 laptops + cameras  10 desktops  Each project group will receive 2 laptops and 3 cameras  Handed out during project proposal  No replacements – take good care of them  No grade until you return them in good condition!  Make project groups by 1/28
  • 24. Lecture 1 24 01-14-03 Outline  Introduction to sensor systems  Administrivia  Whirlwind tour
  • 25. Lecture 1 25 01-14-03 Topic Areas  Networking/Distributed Systems  Databases  Security  Privacy & Policy
  • 26. Lecture 1 26 01-14-03 Networking/Distributed Systems  Sensor Motes  UCB Mote platform  Directed diffusion, Geographic Hash Tables (GHT)  TinyOS  Wide area naming  DNS  INS  Service discovery  Distributed Hash Tables (DHTs)  Chord, CAN, Pastry, Tapestry, etc.  Databases: Pier  Applications: CFS, Past
  • 27. Lecture 1 27 01-14-03 Networking/Distributed Systems  Adhoc networks/related sensor work  Adhoc routing (DSR, GPSR)  Leach/SPIN  Adhoc network capacity  Synchronization/localization  Ad-hoc network clock synchronization  GPS  Indoor positioning (Radar, BAT, Cricket)  Resource allocation/policing  Class-based scheduling  Resource protection
  • 28. Lecture 1 28 01-14-03 Networking/Distributed Systems  Geographic/network topology discovery  Global Network Positioning (GNP)  IDMAPS  Network Weather Service  IP2Geo  Robustness  Clock synchronization, causality for logging  Logging/monitoring techniques  Replication/consistency  Transactional properties
  • 29. Lecture 1 29 01-14-03 Databases  XML introduction  Data representation/schema  Query languages (XPath, XQuery, XSLT)  Distributed query processing in IrisNet  Sensor network databases  Streaming queries (Telegraph)  Tiny DB  Time-series data & data mining
  • 30. Lecture 1 30 01-14-03 Databases  Data models  Hierarchal  Relational databases  Native XML databases  Advanced topics  Aggregation  Consistency  Queries on images  Schema changes
  • 31. Lecture 1 31 01-14-03 Security  Security intro  What is security?  Security properties - authentication / confidentiality / anonymity  Attacker models & vulnerability classification  E.g., Denial-of-service, Identity attacks (Sybil)  Security vulnerabilities of wireless communication  Basic cryptographic mechanisms  Public-key cryptography  Symmetric-key cryptographic primitives (Hash, MAC, block cipher)  One-way chains  Merkle hash trees (data verification)
  • 32. Lecture 1 32 01-14-03 Security  Key distribution, trust bootstrapping  Duckling (imprinting)  Public key infrastructure (PKI)  Small-group key agreement  Large-group key distribution  Key infection, secrecy amplification  Random-key predistribution
  • 33. Lecture 1 33 01-14-03 Security  Advanced cryptographic primitives  Secret sharing  Group signatures  Broadcast authentication  Secure logging  Code safety  Sandboxing, VM  Software fault isolation  Java security  Proof carrying code
  • 34. Lecture 1 34 01-14-03 Privacy & Policy  Policy introduction  Mechanisms to encourage proper behavior  E.g. cameras won’t spy on people  Rewards & enforcement  Privacy  Laws on how private information can be distributed  Describing privacy requirements (P3P)  Other countries have privacy laws (info about citizens)  E.g. European laws about personal info race, religion  Laws/issues regarding crypto export/import/usage  Access requirements for law enforcement  Mechanisms to discover information (traffic analysis, etc.)
  • 35. Lecture 1 35 01-14-03 Privacy & Policy  Control how data can be used/accessed  Digital rights management (DRM)  Trusted systems  Regulatory requirement (DMCA)  Palladium  Resource allocation/policing  Admission control  Fair allocation among competing applications  Enforcement
  • 36. Lecture 1 36 01-14-03 Next Lecture  IrisNet system overview  IrisNet demo  Assigned reading:  [N+03] IrisNet: An Architecture for Compute- Intensive Wide-Area Sensor Network Services