Ubiquitous and Secure Networks and Services



Descargar 31.13 Kb.
Fecha de conversión05.11.2017
Tamaño31.13 Kb.

Ubiquitous and Secure Networks and Services

As taught in: Fall 2010



ANA BELÉN GARCÍA HERNANDO (COORDINATOR)

LOURDES LÓPEZ SANTIDRIÁN

JOSÉ FERNÁN MARTÍNEZ ORTEGA

Department of Telematic Engineering and Architectures

Technical University of Madrid


Image by The Opte Project [CC-BY-2.5 (www.creativecommons.org/licenses/by/2.5)], via Wikimedia Commons.




This subject is taught during the first semester of the "MSc in Systems and Services Engineering for the Information Society" (Máster en Ingeniería de Sistemas y Servicios para la Sociedad de la Información), being compulsory in the professional itinerary and optional in the research itinerary of the curriculum. In order to be able to follow it it is strongly advisable to have a previous background on the main telematic concepts related to communication networks, protocols and services, since these basic concepts will not be part of its contents. Its 5 ECTS correspond to a total of around 133 hours of student's work, including both theory- and practical- (i.e. laboratory-) oriented activities. Three hours a week are devoted to classroom lectures and activities.

Lecturers:

  • Ana Belén García Hernando (Coordinator)

  • Lourdes López Santidrián

  • José Fernán Martínez Ortega

Laboratory assistant instructor:

  • Pedro Castillejo Parrilla

ECTS: 5.

Degree: MSc in Systems and Services Engineering for the Information Society.

Revision: October 2011.

Syllabus

The complete learning guide for this subject can be obtained here [RSUS-Learning-Guide.pdf].



The weekly scheduling of the different units and milestones can be obtained here [RSUS-weekly-scheduling.pdf].

PREVIOUS REQUIRED BACKGROUND


Any of the following graduates (or students with demonstrable equivalent knowledge) may access this course:

  • Graduate in Communication Electronics Engineering.

  • Graduate in Telecommunication Systems Engineering.

  • Graduate in Sound and Image Engineering.

  • Graduate in Telematic Engineering.

COURSE OBJECTIVES


  • Be capable of performing independent learning during their professional career.

  • Be capable of projecting, calculating and designing systems and services for the Information Society.

  • Be capable of applying and integrating the acquired knowledge to solve problems in new environments, inside broader and multidisciplinary contexts, in the framework of their expertise area.

  • Be capable of performing research, development and innovation activities in the context of the Information Society.

  • Be capable of developing systems that offer ubiquitous and secure services.

  • Be capable of critically interpreting and assessing scientific documents in the area of the Information and Communication Technologies.

  • Be capable of communicating and disseminating their research results.

LEARNING OUTCOMES


  • Classify the ubiquitous services and applications according to their technical characteristics.

  • Explain the technological characteristics of the architectures, platforms, networks and protocols that offer ubiquitous services and applications.

  • Analyze the security threats to be considered in a ubiquitous system, according to both the application/service and the network environment.

  • Assess the security methods to neutralize the threats present in a ubiquitous system.

  • Design a system that offers a ubiquitous application or service, having a set of specifications and technical requirements as input.

  • Implement a ubiquitous system, having its design as input.

COURSE MATERIALS


  • Lecture notes with the relevant class information for each unit.

  • Case studies: additional required readings for each unit, together with the associated forms.

  • Labs and practical project: this course includes an introductory lab exercise as well as an assignment that consists on the development of a complete project.

Lecture Notes

UNIT

Link to the material

UNIT 1 - Introduction to ubiquitous systems. (Author: Lourdes López Santidrián)

RSUS-Unit-1-Slides

UNIT 2 - Applications and services. (Author: Ana Belén García Hernando)

RSUS-Unit-2-Slides

RSUS-Unit-2-Video about the SODA project.avi

UNIT 3 - Architectures and models. (Authors: José Fernán Martínez Ortega and Iván Corredor Pérez)

RSUS-Unit-3-Slides

UNIT 4 - Network technologies. (Author: Ana Belén García Hernando)

RSUS-Unit-4-Slides

UNIT 5 - Ubiquitous systems security. (Author: Lourdes López Santidrián)

RSUS-Unit-5-Slides

Assignments: Case Studies

UNIT 1 (Introduction to ubiquitous systems) Case Studies:



  • Case Study 1: Boonsri Dickinson. “With ’smart dust,’ a trillion sensors scattered around the globe”. May 2010. Available online from: [http://www.smartplanet.com/blog/science-scope/with-smart-dust-a-trillion-sensors-scattered-around-the-globe/1673].

  • Case Study 2: Delphine Christin, Andreas Reinhardt, Parag S. Mogre, Ralf Steinmetz. “Wireless Sensor Networks and the Internet of Things: Selected Challenges”. Multimedia Communications Lab, Technische Universität Darmstadt. August 2009. Available online from: [http://www.ti5.tu-harburg.de/events/fgsn09/proceedings/fgsn_031.pdf].

  • Case Study 3: Wayne W. Manges. “Wireless Sensor Network Topologies”. Sensors Magazine. May 2000. Available online from: [http://archives.sensorsmag.com/articles/0500/72/index.htm].

  • Case Study form [RSUS-Unit-1-Case-Study-Form.doc].

UNIT 2 (Applications and services) Case Studies:

  • Case Study 1: Wen-Tsuen Chen, Po-Yu Chen, Wei-Shun Lee, Chi-Fu Huang. "Design and Implementation of a Real Time Video Surveillance System with Wireless Sensor Networks". IEEE Vehicular Technology Conference, 2008, pp. 218-222. 11-14 May 2008.

  • Case Study 2: Junguo Zhang, Wenbin Li, Zhongxing Yin, Shengbo Liu, Xiaolin Guo. "Forest fire detection system based on wireless sensor network". 4th IEEE Conference on Industrial Electronics and Applications, ICIEA 2009, pp. 520-523. 25-27 May 2009.

  • Case Study 3: Barbato, A.; Borsani, L.; Capone, A. "A Wireless Sensor Network Based System for Reducing Home Energy Consumption". 7th Annual IEEE Communications Society Conference on Sensor Mesh and Ad Hoc Communications and Networks (SECON), pp. 1-3. 21-25 June 2010.

  • Case Study 4, sections 6, 8, 9 and 10 of: Reiner Jedermann and Walter Lang. “The Benefits of Embedded Intelligence – Tasks and Applications for Ubiquitous Computing in Logistics”. Lecture Notes in Computer Science, 2008, Volume 4952/2008, pp. 105-122.

  • Case Study form [RSUS-Unit-2-Case-Study-Form.doc].

UNIT 3 (Architectures and models) Case Studies:

  • Case Study 1: Matt Welsh, Geoff Mainland. “Programming Sensor Networks Using Abstract Regions”. Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1. 2004.

  • Case Study 2: Abdelzaher, T.; Blum, B.; Cao, Q.; Chen, Y.; Evans, D.; George, J.; George, S.; Gu, L.; He, T.; Krishnamurthy, S.; Luo, L.; Son, S.; Stankovic, J.; Stoleru, R.; Wood, A. "EnviroTrack: towards an environmental computing paradigm for distributed sensor networks". 24th International Conference on Distributed Computing Systems, 2004, pp. 582- 589. 2004.

  • Case Study 3: Kamin Whitehouse, Cory Sharp, Eric Brewer, and David Culler. “Hood: a neighborhood abstraction for sensor networks”. In Proceedings of the 2nd international conference on Mobile systems, applications, and services (MobiSys '04). ACM, New York, NY, USA. pp. 99-110. 2004.

  • Case Study 4: A. L. Murphy and W. B. Heinzelman. “Milan: Middleware Linking Applications and Networks”. Technical Report. University of Rochester, Rochester, NY, USA. 2002.

  • Case Study form [RSUS-Unit-3-Case-Study-Form.doc].

UNIT 4 (Network technologies) Case Studies:

  • Instructions and form for Unit 4 case study: [RSUS-Unit-4-Case-Study-Instructions-and-Form.doc].

  • Bachir, A.; Dohler, M.; Watteyne, T.; Leung, K.K. "MAC Essentials for Wireless Sensor Networks". IEEE Communications Surveys & Tutorials. Volume: 12, Issue: 2. 2010. Pp. 222 – 248.

  • Kemal Akkaya, Mohamed F. Younis "A survey on routing protocols for wireless sensor networks". Ad Hoc Networks 3(3). Pp. 325-349. 2005.

  • Felemban, E.; Chang-Gun Lee; Ekici, E. "MMSPEED: multipath Multi-SPEED protocol for QoS guarantee of reliability and timeliness in wireless sensor networks". IEEE Transactions on Mobile Computing, Volume: 5, Issue: 6. 2006. Pp. 738 – 754.

UNIT 5 (Ubiquitous systems security) Case Studies:

  • Case Study 1: Ming Li; Wenjing Lou; Kui Ren. "Data security and privacy in wireless body area networks". IEEE Wireless Communications, vol.17, no.1, pp.51-58, February 2010.

  • Case Study 2: Kun Sun, An Liu, Roger Xu, Peng Ning, and Douglas Maughan. “Securing network access in wireless sensor networks”. In Proceedings of the second ACM conference on Wireless network security (WiSec '09). ACM, New York, NY, USA, pp. 261-268. 2009.

  • Case Study 3: Rung-Ching Chen, Chia-Fen Hsieh, and Yung-Fa Huang. “A new method for intrusion detection on hierarchical wireless sensor networks”. In Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication (ICUIMC '09). ACM, New York, NY, USA, pp. 238-245. 2009.

  • Case Study 4: Tahir Naeem, Kok-Keong Loo. “Common Security Issues and Challenges in Wireless Sensor Networks and IEEE 802.11 Wireless Mesh Networks”. International Journal of Digital Content Technology and its Applications, Volume 3, Number 1. March 2009.

  • Case Study form [RSUS-Unit-5-Case-Study-Form.doc].

Assignments: Labs and Practical Project

Authors of Labs and Practical Project documentation: Pedro Castillejo Parrilla, Ana Belén García Hernando, José Fernán Martínez Ortega, Lourdes López Santidrián.

Slides: SunSpot Development Platform. [RSUS-Unit-6-Slides.pptx]

Lab exercise: Introduction to SunSpot Environment. [RSUS-Unit-6-Lab-exercise.pdf]

Practical Project: Requirements and general information. [RSUS-Unit-6-Project-requirements.pdf]



Additional Resources

Some online resources useful for this Unit:



  • About JAVA

    • JAVA tutorials for beginners. We recommend you to read and follow either (or both) of the following JAVA tutorials if you have never programmed in this language:

      • The Java Tutorials . Inside section "Trails Covering the Basics", you can follow the following tutorials at least: "Getting Started", "Learning the Java Language", and "Essential Java Classes".

      • JAVA for Beginners . Riccardo Flask. It includes lots of code examples.

    • Java Platform, Standard Edition 7 API Specification . Use this as a reference for using the methods provided by some of the main Java libraries.

  • About SunSPOT

    • Sun SPOT Tutorials

    • API specification for the Sun SPOT Libraries

Authors

Dr. Ana Belén García Hernando

Associate Professor. Department of Telematic Engineering and Architectures (DIATEL), Technical University of Madrid (UPM).



[Foto_Ana_Belen_Garcia.jpg]

Dr. Lourdes López Santidrián

Associate Professor. Department of Telematic Engineering and Architectures (DIATEL), Technical University of Madrid (UPM).



[Foto_Lourdes_Lopez.jpg]

Dr. José Fernán Martínez Ortega

Associate Professor. Department of Telematic Engineering and Architectures (DIATEL), Technical University of Madrid (UPM).



[Foto_Jose_Fernan_Martinez.jpg]

MSc. Pedro Castillejo Parrilla

Researcher. Department of Telematic Engineering and Architectures (DIATEL), Technical University of Madrid (UPM).



(Sin foto)

MSc. Iván Corredor Pérez

Researcher. Technical University of Madrid (UPM).



[Foto_Ivan_Corredor.jpg]

Acknowledgements

The authors would like to thank the institutions and persons who have kindly allowed the inclusion of images and other materials in this course lecture notes. If we have inadvertedly included any material that you consider copyrighted or you feel you have not been adequately acknowledged or cited, please let us know in order to correct the situation.



We also want to acknowledge the work performed by José Manuel Baños Expósito, who has assisted us both with the English proof-reading of the texts and with the permissions requests for using other authors’ images and materials.

Compartir con tus amigos:


La base de datos está protegida por derechos de autor ©odont.info 2017
enviar mensaje

    Página principal