The document discusses security in wireless networks. It provides an overview of security frameworks and protocols for various wireless standards including 802.11, Bluetooth, 802.15, 802.16 and GSM. It discusses state-of-the-art security measures and limitations. It also discusses needs and challenges for security in next generation converged wireless networks with anytime, anywhere connectivity and communication between people and devices/things.
Enabling Active Flow Manipulation In Silicon-based Network Forwarding Engines Tal Lavian Ph.D.
This document discusses enabling active flow manipulation in silicon-based network forwarding engines. It describes Nortel's Openet platform, which uses active flow manipulation to allow network services to define and alter network behavior in real-time. Examples of applications using this capability are presented, including SSL acceleration and an active firewall service. The presentation outlines the technology transfer of active network ideas into practical commercial products and considers future directions such as service-centric networks and integrated management of network services.
A brief introduction to LoRaWAN given at the Webnesday in St. Gallen on January 11th 2017. The focus is to give an idea on what LoRaWAN is, why it helps for IoT applications and how to use it (in Switzerland).
Virtual Private Networks (VPNs) allow private networks to be connected securely over the public Internet. There are two main methods for implementing VPNs - using IPSec at the network level or SSL at the transport level. IPSec VPNs require client software installation on each workstation while SSL VPNs only require a web browser with SSL support, making SSL VPNs easier to use. VPNs offer benefits over dedicated leased lines such as lower cost, easier setup, and flexibility, but are less secure, reliable, and performant than isolated private networks.
Contrail is an SDN and NFV solution that provides network virtualization and automation capabilities. It allows for the agile deployment of virtualized network functions and services. This accelerates time to revenue and lowers total cost of ownership by improving infrastructure utilization and reducing operational expenses through centralized management. Contrail is open source and integrates with OpenStack and other open standards-based platforms. It also supports third party virtualized network functions and analytics tools.
Presentation by Quaenet on what LoRaWAN is and the role it plays in the Internet of Things (IoT and IIoT). Presented at Silicon Halton IoT Peer2Peer group Sep 2018.
Time Sensitive Networks: How changes to standard Ethernet enable convergence ...Erik van Hilten
Standard Ethernet continues to expand its range, functionality and applications with the IEEE open standard, Time Sensitive Networking (TSN). The capabilities of TSN provide the industrial community with the ability to use standard Ethernet to support highly reliable and precise synchronized networking for industrial control. The presentation provides an update on the roadmap for TSN and an explanation around ways in which TSN enables seamless convergence within control networks. TSN updates to standard Ethernet will meet industrial control and measurement applications' needs, and solve interoperability issues by incorporating new capabilities needed in distributed systems. This presentation was held at the Hannover Messe Industry 4.0 Forum by Intel's Neil Stroud and National Instruments' Erik van Hilten.
Enabling Active Flow Manipulation In Silicon-based Network Forwarding Engines Tal Lavian Ph.D.
This document discusses enabling active flow manipulation in silicon-based network forwarding engines. It describes Nortel's Openet platform, which uses active flow manipulation to allow network services to define and alter network behavior in real-time. Examples of applications using this capability are presented, including SSL acceleration and an active firewall service. The presentation outlines the technology transfer of active network ideas into practical commercial products and considers future directions such as service-centric networks and integrated management of network services.
A brief introduction to LoRaWAN given at the Webnesday in St. Gallen on January 11th 2017. The focus is to give an idea on what LoRaWAN is, why it helps for IoT applications and how to use it (in Switzerland).
Virtual Private Networks (VPNs) allow private networks to be connected securely over the public Internet. There are two main methods for implementing VPNs - using IPSec at the network level or SSL at the transport level. IPSec VPNs require client software installation on each workstation while SSL VPNs only require a web browser with SSL support, making SSL VPNs easier to use. VPNs offer benefits over dedicated leased lines such as lower cost, easier setup, and flexibility, but are less secure, reliable, and performant than isolated private networks.
Contrail is an SDN and NFV solution that provides network virtualization and automation capabilities. It allows for the agile deployment of virtualized network functions and services. This accelerates time to revenue and lowers total cost of ownership by improving infrastructure utilization and reducing operational expenses through centralized management. Contrail is open source and integrates with OpenStack and other open standards-based platforms. It also supports third party virtualized network functions and analytics tools.
Presentation by Quaenet on what LoRaWAN is and the role it plays in the Internet of Things (IoT and IIoT). Presented at Silicon Halton IoT Peer2Peer group Sep 2018.
Time Sensitive Networks: How changes to standard Ethernet enable convergence ...Erik van Hilten
Standard Ethernet continues to expand its range, functionality and applications with the IEEE open standard, Time Sensitive Networking (TSN). The capabilities of TSN provide the industrial community with the ability to use standard Ethernet to support highly reliable and precise synchronized networking for industrial control. The presentation provides an update on the roadmap for TSN and an explanation around ways in which TSN enables seamless convergence within control networks. TSN updates to standard Ethernet will meet industrial control and measurement applications' needs, and solve interoperability issues by incorporating new capabilities needed in distributed systems. This presentation was held at the Hannover Messe Industry 4.0 Forum by Intel's Neil Stroud and National Instruments' Erik van Hilten.
The document discusses Zigbee wireless communication networks. It provides an overview of Zigbee, including the basics of the underlying 802.15.4 standard. The presentation covers the architecture of Zigbee networks, including the different device types, layers of the protocol stack, and application profiles. Examples of applications of Zigbee technology are also discussed, along with technical trends such as improved power management and interoperability standards.
Internet of Things: Comparison of Protocols & StandardsAshu Joshi
This document compares connectivity standards and protocols for connecting "things" to the Internet, including ZigBee, Z-Wave, and Bluetooth. It provides overviews of each standard, discussing their protocol stacks, frequency bands used, data rates, and other key specifications. ZigBee supports mesh networking and application profiles for different industries. Z-Wave uses sub-1GHz bands and supports full mesh networking with AES encryption. Bluetooth's goal is cable replacement between mobile devices using the 2.4GHz band, and it includes Classic and Low Energy versions.
Zigbee is a wireless networking standard used for low-power digital radios in personal area networks. It uses small, low-power digital radios designed for use in wireless sensor and control networks. Zigbee devices include coordinators, routers, and end devices. Coordinators manage the network, routers relay data, and end devices can only communicate with their parent node. Zigbee uses mesh networking topologies to allow for redundancy and multiple communication paths. Its software architecture is built on top of the IEEE 802.15.4 standard and includes network, application, and device object layers. Zigbee networks are initialized by coordinators searching for channels and assigning PAN IDs to start the network for other devices
The document provides an overview of software defined networking (SDN) and future-proofing data center networks. It discusses the evolution of networks since 2000 and current challenges around inflexibility. SDN is defined as separating the network control and forwarding functions, making the network programmable. Benefits include direct programmability, agility, centralized management, and open standards. SDN uses the OpenFlow protocol and virtualization. The future of SDN includes integration of LAN and WAN SDN, lower MPLS costs, and controlling networks through devices.
- The document discusses different definitions and implementations of software-defined networking (SDN).
- Traditionally, SDN is defined by separating the network control and forwarding planes, with the control plane software located in a centralized controller.
- However, some vendors implement SDN by only exposing proprietary APIs on network devices, leaving control plane functions in the devices.
- True open SDN follows the OpenFlow standard to simplify devices and move all control functionality to external controllers, enabling network programmability.
This seminar report provides an overview of ZigBee technology. It defines ZigBee as a wireless networking standard intended for low-power devices. The report outlines ZigBee's key characteristics including low cost, low power consumption, mesh networking topology, and built-in security. It also describes ZigBee's protocol stack and compares it to other wireless technologies like Bluetooth and Wi-Fi. Common applications of ZigBee technology include home automation, wireless sensor networks, and industrial control.
The document discusses wireless sensor network challenges and various wireless communication standards. It introduces Zigbee as a new low power protocol for wireless sensor networks (WSN). Zigbee is based on the IEEE 802.15.4 standard and targets applications that require low data rates, long battery life, and secure networking. It provides features like mesh networking, an extended 64-bit addressing scheme and encryption for reliable and secure communication in WSNs.
This document discusses the evolution of software defined networking (SDN) and application-centric infrastructure. It describes how SDN has progressed from early implementations using OpenFlow (SDN 1.0) to separating the control and data planes (SDN 2.0) to the current approach of an application-centric infrastructure with a centralized controller and policy-based automation (SDN 3.0). It emphasizes how the new approach simplifies infrastructure management, enables intelligent services, and provides dynamic security through a centralized control plane.
Affan Basalamah outlines a plan to implement SDN technology at Institut Teknologi Bandung (ITB) without disrupting the production network. He discusses upgrading ITB's core, datacenter, edge, access and wireless networks to support both production and experimental SDN networks. This will allow SDN research and development activities to be conducted using the campus network infrastructure. Basalamah also describes potential SDN/NFV labs, testbeds and collaboration opportunities between universities in Indonesia.
OpenContrail Silicon Valley Meetup Aug 25 2015Scott Sneddon
The document discusses SDN market trends based on an SDxCentral report. It summarizes that the SDN, NFV, and network virtualization market is expected to exceed $105 billion by 2020 according to the report. It also provides details on SDN controllers, including major open source and commercial controllers. The rest of the document discusses use cases, selection criteria for controllers, and SDN adoption trends seen by the speaker.
Enabling Active Flow Manipulation In Silicon-based Network Forwarding EnginesTal Lavian Ph.D.
1) The document discusses Nortel Networks' work on enabling active flow manipulation in silicon-based network forwarding engines. This includes their development of the Openet platform, which provides an active services runtime environment on commercial network devices.
2) The document presents examples of active services applications developed using the Openet platform, including an Alteon Switched Firewall and SSL acceleration.
3) It outlines Nortel's vision for next generation active services platforms, including service-centric APIs and improved security and management capabilities.
The document discusses best practices for securing wireless networks. It recommends using a centralized wireless architecture with a mobility controller for better visibility and control. It emphasizes the importance of detecting and containing rogue access points, controlling uncontrolled wireless devices, using WPA2 encryption with 802.1x authentication, and implementing network access control with identity-based policies and health assessments to authorize devices and enforce security.
The document discusses ZigBee, a wireless technology standard for low-power wireless networks. ZigBee targets monitoring and control applications with low data rates and infrequent data transmissions from sensors and controllers. It operates on the IEEE 802.15.4 standard and forms mesh networks for reliability and range. The ZigBee Alliance has over 150 member companies working to enable interoperable, low-cost products based on the ZigBee standard across various market applications including home automation, lighting, HVAC, security, and industrial control.
This document provides an overview of Software Defined Networking (SDN) and OpenFlow. It defines SDN as separating the control plane from the data plane, allowing for centralized control of network traffic and more flexible programming of network behavior. OpenFlow is introduced as an open standard protocol that allows programming of network forwarding behavior by defining flows through flow tables on switches. Key benefits of SDN like efficiency, agility, scale and innovation are discussed. Components of an OpenFlow network including controllers, switches, and the secure channel are also outlined.
Wi-Fi is a wireless technology that uses radio frequencies to transmit data through the air based on the 802.11 standard. Security for Wi-Fi networks has evolved from the basic WEP encryption to WPA and WPA2, which provide stronger encryption through the use of keys, authentication, and integrity checks. Additional security measures for Wi-Fi networks include blocking the SSID, changing default passwords, MAC filtering, firewalls, VPNs, and protocols like Kerberos that authenticate nodes and check for modifications to data.
The journey to the digital enterprise requires new thinking. What have you done to modernize your data center network?
These slides--based on the webinar featuring Shamus McGillicuddy, senior analyst at leading IT analyst firm Enterprise Management Associates (EMA) and Steven Shalita, vice president of marketing and business development at Pluribus Networks--highlights how the most forward-thinking enterprises are leveraging software-defined technologies to make their data centers more agile, programmable, resilient, and visible.
The document discusses Zigbee wireless communication networks. It provides an overview of Zigbee, including the basics of the underlying 802.15.4 standard. The presentation covers the architecture of Zigbee networks, including the different device types, layers of the protocol stack, and application profiles. Examples of applications of Zigbee technology are also discussed, along with technical trends such as improved power management and interoperability standards.
Internet of Things: Comparison of Protocols & StandardsAshu Joshi
This document compares connectivity standards and protocols for connecting "things" to the Internet, including ZigBee, Z-Wave, and Bluetooth. It provides overviews of each standard, discussing their protocol stacks, frequency bands used, data rates, and other key specifications. ZigBee supports mesh networking and application profiles for different industries. Z-Wave uses sub-1GHz bands and supports full mesh networking with AES encryption. Bluetooth's goal is cable replacement between mobile devices using the 2.4GHz band, and it includes Classic and Low Energy versions.
Zigbee is a wireless networking standard used for low-power digital radios in personal area networks. It uses small, low-power digital radios designed for use in wireless sensor and control networks. Zigbee devices include coordinators, routers, and end devices. Coordinators manage the network, routers relay data, and end devices can only communicate with their parent node. Zigbee uses mesh networking topologies to allow for redundancy and multiple communication paths. Its software architecture is built on top of the IEEE 802.15.4 standard and includes network, application, and device object layers. Zigbee networks are initialized by coordinators searching for channels and assigning PAN IDs to start the network for other devices
The document provides an overview of software defined networking (SDN) and future-proofing data center networks. It discusses the evolution of networks since 2000 and current challenges around inflexibility. SDN is defined as separating the network control and forwarding functions, making the network programmable. Benefits include direct programmability, agility, centralized management, and open standards. SDN uses the OpenFlow protocol and virtualization. The future of SDN includes integration of LAN and WAN SDN, lower MPLS costs, and controlling networks through devices.
- The document discusses different definitions and implementations of software-defined networking (SDN).
- Traditionally, SDN is defined by separating the network control and forwarding planes, with the control plane software located in a centralized controller.
- However, some vendors implement SDN by only exposing proprietary APIs on network devices, leaving control plane functions in the devices.
- True open SDN follows the OpenFlow standard to simplify devices and move all control functionality to external controllers, enabling network programmability.
This seminar report provides an overview of ZigBee technology. It defines ZigBee as a wireless networking standard intended for low-power devices. The report outlines ZigBee's key characteristics including low cost, low power consumption, mesh networking topology, and built-in security. It also describes ZigBee's protocol stack and compares it to other wireless technologies like Bluetooth and Wi-Fi. Common applications of ZigBee technology include home automation, wireless sensor networks, and industrial control.
The document discusses wireless sensor network challenges and various wireless communication standards. It introduces Zigbee as a new low power protocol for wireless sensor networks (WSN). Zigbee is based on the IEEE 802.15.4 standard and targets applications that require low data rates, long battery life, and secure networking. It provides features like mesh networking, an extended 64-bit addressing scheme and encryption for reliable and secure communication in WSNs.
This document discusses the evolution of software defined networking (SDN) and application-centric infrastructure. It describes how SDN has progressed from early implementations using OpenFlow (SDN 1.0) to separating the control and data planes (SDN 2.0) to the current approach of an application-centric infrastructure with a centralized controller and policy-based automation (SDN 3.0). It emphasizes how the new approach simplifies infrastructure management, enables intelligent services, and provides dynamic security through a centralized control plane.
Affan Basalamah outlines a plan to implement SDN technology at Institut Teknologi Bandung (ITB) without disrupting the production network. He discusses upgrading ITB's core, datacenter, edge, access and wireless networks to support both production and experimental SDN networks. This will allow SDN research and development activities to be conducted using the campus network infrastructure. Basalamah also describes potential SDN/NFV labs, testbeds and collaboration opportunities between universities in Indonesia.
OpenContrail Silicon Valley Meetup Aug 25 2015Scott Sneddon
The document discusses SDN market trends based on an SDxCentral report. It summarizes that the SDN, NFV, and network virtualization market is expected to exceed $105 billion by 2020 according to the report. It also provides details on SDN controllers, including major open source and commercial controllers. The rest of the document discusses use cases, selection criteria for controllers, and SDN adoption trends seen by the speaker.
Enabling Active Flow Manipulation In Silicon-based Network Forwarding EnginesTal Lavian Ph.D.
1) The document discusses Nortel Networks' work on enabling active flow manipulation in silicon-based network forwarding engines. This includes their development of the Openet platform, which provides an active services runtime environment on commercial network devices.
2) The document presents examples of active services applications developed using the Openet platform, including an Alteon Switched Firewall and SSL acceleration.
3) It outlines Nortel's vision for next generation active services platforms, including service-centric APIs and improved security and management capabilities.
The document discusses best practices for securing wireless networks. It recommends using a centralized wireless architecture with a mobility controller for better visibility and control. It emphasizes the importance of detecting and containing rogue access points, controlling uncontrolled wireless devices, using WPA2 encryption with 802.1x authentication, and implementing network access control with identity-based policies and health assessments to authorize devices and enforce security.
The document discusses ZigBee, a wireless technology standard for low-power wireless networks. ZigBee targets monitoring and control applications with low data rates and infrequent data transmissions from sensors and controllers. It operates on the IEEE 802.15.4 standard and forms mesh networks for reliability and range. The ZigBee Alliance has over 150 member companies working to enable interoperable, low-cost products based on the ZigBee standard across various market applications including home automation, lighting, HVAC, security, and industrial control.
This document provides an overview of Software Defined Networking (SDN) and OpenFlow. It defines SDN as separating the control plane from the data plane, allowing for centralized control of network traffic and more flexible programming of network behavior. OpenFlow is introduced as an open standard protocol that allows programming of network forwarding behavior by defining flows through flow tables on switches. Key benefits of SDN like efficiency, agility, scale and innovation are discussed. Components of an OpenFlow network including controllers, switches, and the secure channel are also outlined.
Wi-Fi is a wireless technology that uses radio frequencies to transmit data through the air based on the 802.11 standard. Security for Wi-Fi networks has evolved from the basic WEP encryption to WPA and WPA2, which provide stronger encryption through the use of keys, authentication, and integrity checks. Additional security measures for Wi-Fi networks include blocking the SSID, changing default passwords, MAC filtering, firewalls, VPNs, and protocols like Kerberos that authenticate nodes and check for modifications to data.
The journey to the digital enterprise requires new thinking. What have you done to modernize your data center network?
These slides--based on the webinar featuring Shamus McGillicuddy, senior analyst at leading IT analyst firm Enterprise Management Associates (EMA) and Steven Shalita, vice president of marketing and business development at Pluribus Networks--highlights how the most forward-thinking enterprises are leveraging software-defined technologies to make their data centers more agile, programmable, resilient, and visible.
Understanding IT Network Security for Wireless and Wired Measurement Applicat...cmstiernberg
The document discusses network security considerations for merging IT and engineering networks. It provides an overview of common network security technologies for wired and wireless networks, including firewalls, VLANs, QoS, 802.11i/WPA2 encryption and authentication for wireless, and 802.15.4 security incorporated in ZigBee networks. The document emphasizes that properly implementing these security standards is critical to realizing the benefits of convergence while managing risks to process control and measurement systems.
Wireless Security Best Practices for Remote Monitoring Applicationscmstiernberg
Wireless network security continues to be an area of intense research and development, particularly in applications where wireless sensors are extending the reach of traditional monitoring and control systems. While the IT sector has embraced the IEEE 802.11i standard for corporate networks, engineers have many more options available to them for their industrial network designs. This presentation will provide an overview of IEEE 802.11i, IEEE 802.15.4, ZigBee, and other security protocols as they relate to measurement and automation applications. In addition, network design and commissioning best practices will provide attendees with a set of recommendations for guarding against the most common security attacks.
Central controlled IPRAN uses SDN principles to improve upon traditional IPRAN networks by moving major control functions to a central controller. This allows for free service planning, plug-and-play deployment, automatic protocol configuration, and fast troubleshooting from a single controller rather than individual network devices. The central controller has end-to-end visibility and control over forwarding nodes like base stations, cell site gateways, and aggregation gateways. This architecture simplifies operations and maintenance of the network.
This document proposes enhancing the security of wireless networks using physical layer protection. It discusses weaknesses in conventional encryption systems and proposes encrypting data at the physical layer instead of the MAC layer. This is done by using physical layer transforms like XOR, scrambling, or phase shifting based on a cipher stream. Encrypting at the physical layer makes the decrypted data difficult for hackers to record. Simulation results show the proposed techniques do not degrade communication performance for modulation schemes up to QAM-16 over AWGN channels. Future work includes analyzing different error coding schemes' effects on hacking complexity and exploring joint encryption and error coding.
The document discusses the history and standards of wireless networks, including 802.11 standards such as 802.11b, 802.11g, and 802.11n. It then describes the two main modes that wireless networks can operate in: infrastructure mode where clients connect to a central access point, and ad-hoc mode where clients connect directly to each other without an access point. The document also discusses wireless security standards including WEP (Wired Equivalent Privacy), WPA, and WPA2, noting flaws in the original WEP encryption.
A presentation which on Wireless Network Security. It contains Introduction to wireless networking, security threats and risks, best practices on using wireless networks.
The document discusses security issues with IEEE 802.11b wireless local area networks (WLANs). It outlines 7 main security problems: 1) easy access to networks, 2) unauthorized access points, 3) unauthorized use of services, 4) constraints on service and performance, 5) MAC spoofing and session hijacking, 6) traffic analysis and eavesdropping, 7) higher level attacks once access is gained. It then analyzes weaknesses in the Wired Equivalent Privacy (WEP) encryption used by 802.11b and outlines improvements made in later standards like Wi-Fi Protected Access (WPA) and 802.11i.
Seminar Paper on Security Issues of 802.11b based on IEEE Whitepaper by Boland, H. and Mousavi, H., Carleton University, Ottawa, Ont., Canada, IEEE Canadian Conference on Electrical and Computer Engineering, 2-5 May 2004
The document discusses security issues with wireless LANs and methods to improve security. It covers vulnerabilities in WEP encryption and authentication methods like open authentication and shared key authentication. It also introduces improved security standards like 802.1X authentication, TKIP encryption, and AES encryption to provide features like mutual authentication, dynamic keys, and message integrity checks. The conclusion recommends deploying as many security enhancements as possible for wireless LANs and understanding potential vulnerabilities when not all improvements can be implemented.
Wireless intelligent networking allows service providers to introduce new services quickly through an evolving network architecture. It uses standards like CAMEL and WIN to enable features controlled outside the switch like pre-paid calling. The architecture includes elements like the SCP and IP that contain service logic and resources, interacting with other networks through signaling protocols like SS7.
The document discusses wireless local area network (WLAN) security. It describes common WLAN security methods like service set identifiers (SSIDs), Wired Equivalent Privacy (WEP), and media access control (MAC) address authentication. It also discusses newer security protocols like Wi-Fi Protected Access (WPA) and WPA2 that improved upon WEP. WPA2 is the strongest and uses the Advanced Encryption Standard (AES) along with 802.1X authentication, the Counter Mode with CBC-MAC Protocol (CCMP), and the Temporal Key Integrity Protocol (TKIP). The document recommends using a combination of security technologies and performing a threat risk assessment to determine the optimal WLAN security solution.
Unified wired/wireless IP data networking solution designed to increase efficiency by reducing data contention. Combined with an advanced Layer 3 architecture and an IEEE802.11 enterprise wireless LAN management system, icXchange helps ensure content delivery as well as solid connectivity for the user.
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless ControllerRobb Boyd
This document discusses Cisco's Catalyst 9800 Wireless Controller. It introduces the Catalyst 9800 series, which includes the C9800-40 and C9800-80 appliances. The C9800-80 can support up to 6,000 access points and 64,000 clients, while the C9800-40 can support up to 2,000 access points and 32,000 clients. The document also discusses the Cisco Catalyst 9800 Wireless Controller for Cloud and for Switch, which embed the wireless capabilities on switches. It highlights features like seamless software updates, high availability, and support for technologies like SD-Access, ETA, and wireless assurance.
ICC's Access Control System is a unified wired/wireless system to allow SMB and small enterprise leverage software to control IP data networking centrally or distributed throughout their networks.
ICC's Access Control System is a unified wired/wireless system to allow SMB and small enterprise leverage software to control IP data networking centrally or distributed throughout their networks.
This document summarizes security features and vulnerabilities across 2G, 3G, and 4G mobile networks. It discusses:
- Security elements in 2G networks like authentication, encryption, and vulnerabilities due to weak encryption algorithms and unsecured terminals.
- New security features in 3G networks like network authentication, explicit integrity checks, switch-based security, and flexibility to enhance security over time.
- 4G network security architecture focusing on network access, domain, user, and application security as well as visibility and configuration of security features.
- Key security risks in 4G like distributed networks, complex business models, and minimizing security spending. Preventative measures discussed include interoperability standards, security audits
The document discusses using affordable sensing technologies for data-driven healthcare applications in screening, diagnosis, and therapy. It describes challenges in healthcare access and affordability in developing and developed countries. The TCS HeartSense and RehabBox technologies are presented as using sensors like PPG, PCG and Kinect to enable affordable screening for conditions like CAD, hypertension, and remote rehabilitation for stroke patients. Pilot studies show potential for these technologies to provide early screening and monitoring of diseases. The document outlines several publications and patents from ongoing work in this area.
1. Tele-rehabilitation aims to provide rehabilitation services to patients in their homes using remote monitoring and virtual therapy sessions to reduce costs and increase access to care.
2. Current rehabilitation methods are very expensive, with quantitative gait analysis systems costing $200k, and many patients do not receive needed rehabilitation after discharge from hospitals.
3. TCS proposes a low-cost tele-rehabilitation platform using sensors and games to monitor patients' physical and cognitive exercises at home or in clinical settings, with doctors providing remote feedback and monitoring progress through a cloud-based system.
The document discusses the need for standardization in the Internet-of-Things (IoT). It notes that IoT involves a highly heterogeneous set of sensors, devices, and data that needs interoperability standards. It describes some existing standards for different IoT layers including networking, data formats, protocols, and interfaces. The document advocates for both syntactic and semantic interoperability standards and outlines Tata Consultancy Services' contributions to various standards bodies.
Data-driven healthcare using affordable sensing can help address problems in both developed and developing countries by enabling remote 24/7 monitoring, automated alerts, personalized diagnostics and prognostics, and discovery of new treatment protocols. This document outlines an Internet-of-Things based system that uses sensors in mobile phones, wearables and other devices to monitor patients' physiological signals and activity remotely. Challenges in accurate sensing are addressed through techniques like noise removal and orientation correction. Initial results on conditions like coronary artery disease show potential for low-cost early detection and risk profiling.
The document discusses the Internet of Actuating Things and challenges related to devices that can cause physical changes in state. It notes that actuating things present responsibilities around authentication, timeliness, security, and unintended actuations. Robots are proposed as a type of actuating thing in IoT applications such as public safety, agriculture, and infrastructure monitoring. The document outlines technology challenges for wireless robotics networks, including variable communication ranges, mobility, dynamic topologies, and real-time communication for actuation.
This document discusses using ubiquitous devices like mobile phones and set top boxes as gateways for internet-of-things applications. It describes a road monitoring application that uses sensors in mobile phones to detect potholes and bumps. It also outlines a home monitoring solution that uses a set top box as a gateway to monitor energy and water usage through smart meters and detect issues like water leaks through sensors. The document concludes by discussing intelligent user interfaces and using the most common devices like phones, TVs and computers as interfaces.
This document discusses using unobtrusive sensing to discover personal context through mobile phone sensors, 3D cameras, wearable devices, and online data. It describes sensing location, proximity, activity, identity, cognitive load, and physiological parameters to understand physical, individual, and community context. Example applications include customer behavior studies, crowdedness monitoring, wellness tracking, and organizational behavior analysis. The approach involves multimodal fusion of smartphone sensors, Kinect-style cameras, wearable EEG devices, and social media/email data to provide context discovery services while preserving user privacy.
This document summarizes Arpan Pal's presentation on communication and signal processing technologies for intelligent infrastructure and cyber-physical systems. It outlines the challenges of reducing communication costs, preserving battery power, and extracting information from noisy sensor data. It then provides examples of applying these technologies to intelligent transportation systems using accelerometer analytics on buses to analyze road conditions, home energy management through non-intrusive load monitoring of energy meter data, and mobile phone-based wellness applications using sensors to count steps, measure pulse, and classify activities. It also introduces RIPSAC, a generic platform developed by TCS for Internet of Things applications.
The document discusses intelligent infrastructure applications and technologies. It describes research areas like modeling cyber physical systems, sensor data collection and analytics, communication protocols, and developing an integrated platform. Use cases presented include intelligent transportation, healthcare, energy, stores, safety, compliance, homes, and agriculture. The research aims to address challenges of sensor data extraction, analytics, privacy and system performance and scalability.
This document proposes a system for personal and community context discovery as a service. It suggests using mobile phone sensors, 3D cameras, and web data in a non-intrusive way to gather information on location, proximity, activity, and identity to discover individual behaviors and community patterns. A multimodal fusion approach is recommended to integrate these context sources for improved accuracy. An IoT platform is presented as a way to implement and deploy this context discovery service for application developers.
This document discusses distributed edge computing for internet of things applications. It describes how edge devices can be used for distributed computing to process large amounts of sensor data in real-time. The challenges of using edge devices include communication costs, preserving battery life on devices, and handling the varying capabilities of different edge devices. The document proposes using an agent-based distributed computing framework like CONDOR that can schedule jobs across heterogeneous edge devices through common middleware. It provides an example of using this approach for adaptive wind forecasting applications.
This document discusses using social media as a "soft sensor" for intelligent infrastructure and human-centric cyber-physical systems. It outlines how natural language processing and emotion mining of social media posts can provide insights into public safety, transportation, and healthcare. The document also describes TCS's RIPSAC IoT platform and how it could integrate social media analytics technologies to power applications in various domains. TCS has innovation labs conducting research in areas like social media analytics and academic collaborations to foster joint innovation.
This document discusses wireless technologies and the IEEE 802.11g OFDM system. It provides an overview of cellular wireless systems and wireless networks. It then describes the key aspects of 802.11g OFDM such as OFDM, the PHY layer frame structure, and the development framework. It also discusses simulation issues, receiver algorithms, implementation challenges, simulation results, and security algorithms. It concludes with areas of future work around convergence to 4G wireless systems.
This document describes a proposed system for creating interactive mashups of television news and related web information. The system would use optical character recognition to extract text from TV video frames, search the internet or RSS feeds for related contextual information, and blend the internet content with the TV video for display. Currently the solution is demonstrated on a PC with recorded TV video, but is proposed to eventually run on TCS' Home Infotainment Platform. The value proposition is that it would enrich the TV viewing experience by providing additional related online content informed by the TV program context.
The document discusses a proposed system to provide electronic program guides (EPGs) for analog cable TVs in India by detecting the channel logo of the currently viewed program. The system would localize and recognize the channel logo, download the corresponding EPG data from the internet, and render the EPG information blended with the TV video. A demo was presented capturing a TV screen during channel changes, showing the logo detection and EPG fetching and rendering. The solution could enrich the viewer experience for analog cable TV users and provide multiple levels of EPG data in a hierarchical manner by linking to additional online information.
The document provides an overview of embedded system design components and processes. It discusses fabless hardware design including VLSI design tools and flows. It also describes board level design considerations and software design flows for different hardware platforms like FPGA/SOC, programmable DSP/SOC, and reconfigurable architectures. The key steps involved in algorithm design, simulation, synthesis, physical design, fabrication and board testing are outlined.
Grid computing can be used to distribute computing tasks from internet-of-things (IoT) devices to edge devices to reduce costs and preserve battery power at the edge. Edge devices have unused computing resources that can be utilized as part of a grid. Communication techniques like CoAP reduce bandwidth usage compared to HTTP. TCS has developed an IoT platform called RIPSAC that incorporates services for device management, analytics, applications, storage, messaging and middleware to support grid computing in IoT environments.
Euro india2006 wirelessradioembeddedchallengesArpan Pal
This document discusses challenges in developing embedded systems for wireless radio technologies. It describes the engineering and technology challenges, including needing to support field upgrades, comprehensive testing, delayed hardware availability, and stringent development schedules while keeping costs and power consumption low. It also outlines some common hardware platforms used for wireless radio, including ASICs, DSPs, FPGAs, and software-defined radios. The document then provides two case studies on developing a 3G protocol conformance tester and an IEEE 802.16 WiMAX MAC system to demonstrate challenges and solutions.
This document presents a generic framework for expediting the development of Layer 2 MAC protocols. The framework includes common functionalities, a system model based on multithreaded modules, and a state handler matrix. It provides network and physical layer abstraction, a common library, and an OSAL. The framework reduces MAC development time by 40% and was used to implement a WMAN MAC. The roadmap includes packaging the framework as a wizard and enriching the library with new functions.
The document proposes a home energy information gateway system that uses a television and over-the-top box to display energy consumption data from a smart meter. The system connects the smart meter to the internet via the over-the-top box to allow remote energy monitoring, billing data access for utilities, and control of home appliances. The system is designed to be low-cost and provide additional functions like media playback and web browsing through the television interface.
1. Arpan Pal, MNGN2005
Wireless Security –Wireless Security –
State-of-the-Art and FutureState-of-the-Art and Future
Arpan PalArpan Pal
Practice Head, DSP and Communications
Center of Excellence for Embedded Systems
Tata Consultancy Services Ltd.
3. Arpan Pal, MNGN2005
Things Required to protect a secure systemThings Required to protect a secure system
Integrity
Message transmitted never corrupted
Confidentiality
Certain information never disclosed to unauthorized entities
Authentication
Verify identity of peer node
Authorization
Perform pre-defined actions after authentication
Availability
Survivability of the network in Denial-of-Service attack
Nonrepudiation
Neither sender nor receiver of a message be able to deny
transmission
4. Arpan Pal, MNGN2005
Security FrameworkSecurity Framework
Security
Protocol
•Secured Session
Initiation
•Capability
Negotiation
•Authentication
•Secured Data
Transmission and
Reception
•Secure Session
Termination
Security Algorithms
Key Generation
Algorithm
Cipher Algorithm
Digestion
Algorithm
Digital Certificates
Big Integer Math
Library
6. Arpan Pal, MNGN2005
Wireless Local Area Network (802.11)Wireless Local Area Network (802.11)
Infrastructure
Ad hoc Networks/
Sensor Networks
Acces
s
Point
Acces
s
Point
Distributio
n
System
7. Arpan Pal, MNGN2005
Wireless Local Area Network (802.11)Wireless Local Area Network (802.11)
Application
No security in upper layers
Presentation
Session
Transport
Network
Data-link (MAC) Authentication, Encryption (WEP) and Integrity
check (CRC)
Physical
Modulation (FHSS, DSSS, OFDM) protects
eavesdropping
802.11
8. Arpan Pal, MNGN2005
Security Framework – 802.11Security Framework – 802.11
Security Protocol
•Session Initiation
•Start
•Scan
•Join
•Capability Negotiation
•Open/Shared
Negotiation
•WEP enabled or
disabled
•Authentication
•Open Authentication
•Challenge Text
Password Protocol
•Secured Data
Transmission and
Reception
•Secure Session
Termination
Digestion Algo Digital Certificates
Big Integer Math Library
Key Gen Algo
NULL
Cipher Algo
RC4
CRC-32 NULL
9. Arpan Pal, MNGN2005
Wireless Local Area Network (802.11)Wireless Local Area Network (802.11)
WEP – Drawbacks
IV is 24 bits – Keyspace gets exhausted, quicker if packets are
smaller
Shared Key is distributed manually
802.1X
Adopts EAP (Extensible Authentication Protocol)
2 – level Authentication
MD5
Wireless
Station
Access
Point
Authentication
Server
10. Arpan Pal, MNGN2005
Wireless Local Area Network (802.11)Wireless Local Area Network (802.11)
802.11i
Adopts some part of 802.1X
128 bits encryption key, 128 bits IV – more security
Introduces TKIP (Temporal Key Integrity Protocol)
• per-packet keying (PPK) – different key for each packet
• a message integrity check (MIC) – better than CRC-32 checksum
• a re-keying mechanism
Introduces AES (Advanced Encryption Standard)
• Better encryption technology
• Resource Consuming, so requires new hardware
Introduces WRAP (Wireless Robust Authentication Protocol)
Introduces CCMP (Counter Mode CBC MAC Protocol)
12. Arpan Pal, MNGN2005
Wireless Personal Area NetworkWireless Personal Area Network
Bluetooth [IEEE 802.15.1]Bluetooth [IEEE 802.15.1]
13. Arpan Pal, MNGN2005
Wireless Personal Area NetworkWireless Personal Area Network
Bluetooth [IEEE 802.15.1]Bluetooth [IEEE 802.15.1]
Security
14. Arpan Pal, MNGN2005
Bluetooth SecurityBluetooth Security
3 security Modes – device can only support one at a time
Non-secure
Service-level enforced security
Link level enforced security – prior to channel setup
3 categories of device with 2 levels of trust
Trusted- previously authenticated and marked as trusted
Untrusted devices - known devices that have been previously
authenticated, but are not marked as trusted
Unknown untrusted – no security information known
15. Arpan Pal, MNGN2005
Security Framework - BluetoothSecurity Framework - Bluetooth
Security Protocol
•Session Initiation
•Capability Negotiation
•Security Modes
(Nonsecure, Service
level enforced
security, Link-level
enforced Security)
•Authentication
•Exchange of Random
Number
•Challenge-Response
Protocol
•Secured Data Transmission
and Reception
•Secure Session
Termination
Digestion Algo Digital Certificates
Big Integer Math Library
Key Gen Algo
E2
, E3
Cipher Algo
E0
E1
,CRC NULL
16. Arpan Pal, MNGN2005
Wireless Personal Area Network (WPAN)Wireless Personal Area Network (WPAN)
IEEE 802.15IEEE 802.15
17. Arpan Pal, MNGN2005
Wireless Personal Area NetworkWireless Personal Area Network
[IEEE 802.15.3][IEEE 802.15.3]
Piconet Controller (PNC)
Sole source of local message control and facilitates admission of ordinary
devices to the piconet
18. Arpan Pal, MNGN2005
Wireless Personal Area Network (WPAN)Wireless Personal Area Network (WPAN)
[IEEE 802.15.3][IEEE 802.15.3]
Security
19. Arpan Pal, MNGN2005
Security Framework - [IEEE 802.15.3]Security Framework - [IEEE 802.15.3]
Security Protocol
•Session Initiation
•Capability Negotiation
•Mode 0 (Unsecured)
or Mode 1 (Secured)
•Authentication: Challenge-
Response Protocol between
•DEV-DEV
•PNC-DEV
•New PNC- Old PNC
•Secured Data Transmission
and Reception
•Secure Session
Termination
Digestion Algo Digital Certificates
Big Integer Math Library
Key Gen Algo
NULL
Cipher Algo
AES
CRC NULL
20. Arpan Pal, MNGN2005
Wireless Metropolitan Area NetworkWireless Metropolitan Area Network
(WMAN) IEEE 802.16(WMAN) IEEE 802.16
21. Arpan Pal, MNGN2005
Wireless Metropolitan Area NetworkWireless Metropolitan Area Network
– IEEE 802.16– IEEE 802.16
Architecture
Architecture
802.16
Base Station
Subscriber
Station
22. Arpan Pal, MNGN2005
Wireless Metropolitan Area NetworkWireless Metropolitan Area Network
– IEEE 802.16– IEEE 802.16
23. Arpan Pal, MNGN2005
Security FrameworkSecurity Framework
– IEEE 802.16– IEEE 802.16
Security Protocol
•Session Initiation
•Capability Negotiation
•Authentication
•Periodic Reauthorization
and Key Refresh
•Secured Data Transmission
and Reception
•Secure Session
Termination
Digestion Algo Digital Certificates
Big Integer Math Library
Key Gen Algo
RSA
Cipher Algo
DES, AES, TEK (3-
DES, AES, RSA)
X.509SHA-1
24. Arpan Pal, MNGN2005
Global System for Mobile CommunicationGlobal System for Mobile Communication
(GSM)(GSM)
25. Arpan Pal, MNGN2005
Global System for Mobile CommunicationGlobal System for Mobile Communication
SIM
AuC
HLR
VLR
MSC
BS
MS
A3,A8, IMSI, Ki, Kc
A5
A5, IMSI, Kc A3,A8, IMSI, Ki
RAND, SRES, Kc
RAND, SRES, Kc
MS: Mobile Station
BS: Base Station
VLR: Visiting Location Register
HLR: Home Location Register
MSC: Mobile Switch Center
AuC: Authentication Center
RAND: Random
SRES: Signed Response
A3: Authentication Algorithm
A5: Ciphering Algorithm
A8: Ciphering Key Generation Algorithm
IMSI: International Mobile Subscriber Identity
Ki: Individual Subscriber Authentication Key
Kc: Ciphering Key
SIM: Subscriber Identity Module Smart Card
26. Arpan Pal, MNGN2005
Security Framework - GSMSecurity Framework - GSM
Security Protocol
•Session Initiation
•Capability Negotiation
•Exchange of Random
Number
•Exchange of
Cryptographic Service
primitives
•Authentication
•Challenge-Response
Protocol
•Secured Data Transmission
and Reception
•Secure Session
Termination
Digestion Algo Digital Certificates
Big Integer Math Library
Key Gen Algo
A8
Cipher Algo
A5
A8, COMP-128 NULL
28. Arpan Pal, MNGN2005
A Mobile LifestyleA Mobile Lifestyle
HOME
PUBLIC
TRANSPORT
AUTO
WORK
OUTDOORS
RURAL
WWAN
WLAN
WPAN
WMAN
HOT SPOTS
Vision of Seamless MobilityVision of Seamless Mobility
ChallengesChallenges
• QoSQoS
• SecuritySecurity
ChallengesChallenges
• QoSQoS
• SecuritySecurity
Single-network fixed function devices
evolving to multi-network multi-function
“Always-on” Communication –
anytime, anywhere, any network
Seamless transition across networks
Courtesy: Dan Dahle, Senior Strategic Architect, Intel Corporation, IWS 2005Courtesy: Dan Dahle, Senior Strategic Architect, Intel Corporation, IWS 2005
30. Arpan Pal, MNGN2005
User Needs for Wireless 2010+User Needs for Wireless 2010+
ServicesServices
Audio-Voice-Video-DataAudio-Voice-Video-Data
ScalabilityScalability
Network & DevicesNetwork & Devices
User NeedsUser Needs
Next Gen WiMAXNext Gen WiMAX
3GPP-LTE3GPP-LTE
ETSI TISPANETSI TISPAN
……..
Mobility,Mobility,
Interference,Interference,
CapacityCapacity
Bandwidth,Bandwidth,
Throughput, PowerThroughput, Power
Consumption,Consumption,
ComplexityComplexity
Throughput, Latency,Throughput, Latency,
Tolerance For Loss,Tolerance For Loss,
Symmetric andSymmetric and
Asymmetric ServicesAsymmetric Services
Wireless RequirementsWireless Requirements
Common User Needs Yield Common Wireless RequirementsCommon User Needs Yield Common Wireless RequirementsCommon User Needs Yield Common Wireless RequirementsCommon User Needs Yield Common Wireless Requirements
Courtesy: Dan Dahle, Senior Strategic Architect, Intel Corporation, IWS 2005Courtesy: Dan Dahle, Senior Strategic Architect, Intel Corporation, IWS 2005
Cross-layerCross-layer
SecuritySecurity
Cross-layerCross-layer
SecuritySecurity
CoverageCoverage
AnywhereAnywhere
31. Arpan Pal, MNGN2005
Three Directions of Mobile EvolutionsThree Directions of Mobile Evolutions
3. Progress of Media Convergence3. Progress of Media Convergence
2. From the Growth in Quantity to the
Growth in Quality
2. From the Growth in Quantity to the
Growth in Quality
1. From Person to Person
Communications to Non-Person
Communications
1. From Person to Person
Communications to Non-Person
Communications
Courtesy: Dr. Yasuo Hirata, Chairman, KDDI R&D Labs, IWS 2005Courtesy: Dr. Yasuo Hirata, Chairman, KDDI R&D Labs, IWS 2005
32. Arpan Pal, MNGN2005
Towards Ubiquitous Network SocietyTowards Ubiquitous Network Society
Person Person
Things
Voice Mail Photo
Home Appliance, RFID,
Camera
Data Video
Data
Whoever
Wherever
Whatever
ITS 、 Sensor 、 Disk
Person
ThingsThings
Courtesy: Dr. Yasuo Hirata, Chairman, KDDI R&D Labs, IWS 2005Courtesy: Dr. Yasuo Hirata, Chairman, KDDI R&D Labs, IWS 2005
Privacy Policy
Core Items
in Ubiquitous
Environment
Core Items
in Ubiquitous
Environment
Security Policy
Future Trends
33. Arpan Pal, MNGN2005
Courtesy: Dr. Henry Tirri, Nokia Research Center, IWS 2005Courtesy: Dr. Henry Tirri, Nokia Research Center, IWS 2005
34. Arpan Pal, MNGN2005
My personal Adaptive Global NETworkMy personal Adaptive Global NETwork
(MAGNET)(MAGNET)
User-centric approach to improve the quality of life for the end-user
More smarter smarter, more responsive, and more accommodating
Environments to the needs of the individual
Everything without jeopardizing privacy and security.
35. Arpan Pal, MNGN2005
My personal Adaptive Global NETworkMy personal Adaptive Global NETwork
(MAGNET)(MAGNET)
Bluetooth
Internet
Intranet
WLAN
Access
Point
Application
Server
IrDA
WLAN
Node B RNC
3G GGSN
3G SGSN
UMTS
RNC Radio Network Controller
SGSN Serving GPRS Support Node
GGSN Gateway GPRS Support Node
Bluetooth
Access
Point
36. Arpan Pal, MNGN2005
Next Generation Service DeploymentNext Generation Service Deployment
Courtesy:Courtesy: Ingo Elsen, Ericsson EurolabIngo Elsen, Ericsson Eurolab
37. Arpan Pal, MNGN2005
Security Requirements of FutureSecurity Requirements of Future
– Its all about Convergence– Its all about Convergence
Convergence of heterogeneous networks (clusters)
Generic definition of identities and credentials
Generic AAA (Authentication, Authorization, Accounting)
Secure Roaming and Routing strategy
Convergence of Devices (Any Service Anywhere on Any capable device)
Security at every layer
Secure device discovery
Convergence of Applications and Services (Context-Awareness)
Secure Service discovery
Privacy Policy
Convergence of Content (Audio, Video, Data, Sensors)
Security at every layer
Content level security
38. Arpan Pal, MNGN2005
Next Generation Wireless Networks –Next Generation Wireless Networks –
Work Done @ TCSWork Done @ TCS
39. Arpan Pal, MNGN2005
Physical Layer EncryptionPhysical Layer Encryption
Conventional Stream Ciphering SystemsConventional Stream Ciphering Systems
MAC
PHY
PHY
Channel
Encryption
Function
MAC
Data Path
Encryption
Algorithm
Key K
MAC
Decryption
Function
MAC
Data Path
Decryption
Algorithm
Key K
Recording Point &
Decryption Point
Coincide
Hardware
Encryption done at MAC layer
At the receiver
The decrypted data is available
at Hardware-Software interface –
hence recordable
Commutative Property of the
Encryption operator (normally
XOR) makes it prone to attacks –
Vernam Cipher property
40. Arpan Pal, MNGN2005
MAC
Channel
Encoder
Modulator
Channel
Demodulator
Channel
DecoderMAC
PHY
PHY
Encryption
Function
Encryption
Algorithm
Key K
Decryption
Function
Encryption
Algorithm
Key K
Encryption done at
PHY layer
Encryption
Function - XOR or
some other PHY layer
transforms like
Scrambling
Phase Shift
between I and Q
channels etc.
Advantages
Decrypted data directly not available to the Hacker for Recording as normally PHY is
located within a embedded chipset.
Presence of Difficult-to-Invert blocks like Channel Decoder between the recording
point at MAC-PHY interface and Decryption point makes known plain-text attack very
difficult
Recording
Point
Decryption
Point
Hardware
Decryption can
be moved here also
Encryption can
be moved here also
Physical Layer EncryptionPhysical Layer Encryption
Proposed SystemProposed System
41. Arpan Pal, MNGN2005
Watermark
is the practice of imperceptibly altering a cover to embed a message about
that cover
Challenges in Video
• Embedding Watermark in the Compressed Domain, e.g. H.264
• Real-time performance
• Encrypted Watermarking
Content SecurityContent Security
Authentication is based on a public-key based challenge response protocol, resulting in the establishment of a shared link key between the joining device and the PNC.
Authentication is based on a public-key based challenge response protocol, resulting in the establishment of a shared link key between the joining device and the PNC.
Authentication is based on a public-key based challenge response protocol, resulting in the establishment of a shared link key between the joining device and the PNC.
Authentication is based on a public-key based challenge response protocol, resulting in the establishment of a shared link key between the joining device and the PNC.
<number>
<number>
<number>
1 – Need to capture fixed as well as mobile. Need to make sure coverage comments includes mobility in talking points.
2 – User needs are functional, not qualitative. Should we add confidence/privacy/security.
3 – Moving from power users to mainstream. These exist today, but they are going mainstream.