CODE BLUE Sensor Networks for Emergency Response Challenges and Opportunities

Similar documents
CodeBlue: A Wireless Sensor Network for Medical Care and Disaster Response

Sensor networks, a new class of devices,

CodeBlue: An Ad Hoc Sensor Network Infrastructure for Emergency Medical Care

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

Lecture 8 Wireless Sensor Networks: Overview

Secure Technology Alliance Response: NIST IoT Security and Privacy Risk Considerations Questions

Path Optimization in Stream-Based Overlay Networks

Danube University Krems. The University for Continuing Education. Security Issues in Resource-limited Sensor Networks. Thilo Sauter Albert Treytl

The Internet of Things

PMS 138 C Moto Black spine width spine width 100% 100%

Group Description Project Description

Security Challenges Facing the Future Wireless World (aka.. Alice and Bob in the Wireless Wonderland) Wade Trappe

HEMS, a Hurricane Evacuation Management System

Wireless Network Security

Mobile Computing Introduction

Alcatel-Lucent OmniVista Cirrus Simple, secure cloud-based network management as a service

NETWORKING. 8. ITDNW08 Congestion Control for Web Real-Time Communication

MEDiSN : SPECIAL TOPICS IN MEDICAL SECURITY AND PRIVACY

Alcatel-Lucent OmniVista Cirrus Simple, secure cloud-based network management as a service

Distributed Systems 26. Mobile Ad Hoc Mesh Networks

A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CompTIA E2C Security+ (2008 Edition) Exam Exam.

Briefing: Navigation Message Authentication for Civil GPS Anti-Spoofing

The Cryptographic Sensor

An Implementation of Fog Computing Attributes in an IoT Environment

Advanced SensorNet Technologies to Monitor Trusted Corridors. A KTEC Center of Excellence 1

Security and Smartness for Medical Sensor Networks in Personalized Mobile Health Systems

Securing V2X communications with Infineon HSM

Secure Embedded Wireless Networks

Building Pervasive Computing Applications on Sensor Networks. Rutgers, The State University of New Jersey

Feasibility of Gateway-less IoT e-health Applications

Mobile ad hoc networks Various problems and some solutions

Embedded Systems. Cristian Rotariu

Overview of Mobile Networking Initiatives at WINLAB

Guide to Networking Essentials, 6 th Edition. Chapter 7: Network Hardware in Depth

MoB: A Mobile Bazaar for Wide Area Wireless Services. R.Chakravorty, S.Agarwal, S.Banerjee and I.Pratt mobicom 2005

Wireless and Mobile. Rab Nawaz Jadoon. Applications DCS. Assistant Professor. Department of Computer Science

Key establishment in sensor networks

OpenWay by Itron Security Overview

Project: IEEE P Task Group for Wireless Smart Sensors

BEYOND TRADITIONAL PASSWORD AUTHENTICATION: PKI & BLOCKCHAIN

Wi-Fi Security for Next Generation Connectivity. Perry Correll Aerohive, Wi-Fi Alliance member October 2018

The Role of PNT in Cybersecurity Location-based Authentication

CSCD 433/533 Advanced Networking

Portable Wireless Mesh Networks: Competitive Differentiation

White paper. Combatant command (COCOM) next-generation security architecture

Reliable and Real-time Wireless Sensor Networks: Protocols and Medical Applications

The Heart Buddy. Andrew Pagan, Andrew Villagomez, Jose Reyes, Jairo Hernandez

Leveraging IoT Biometrics and Zephyr RTOS for Neonatal Nursing in Uganda

Advanced iscsi Management April, 2008

OPC UA Configuration Manager PTC Inc. All Rights Reserved.

Cisco Structured Wireless-Aware Network (SWAN) Implementation Guide

Monitoring the Mobility Express Network

BIG-IP Local Traffic Manager: Configuring a Custom Cipher String for SSL Negotiation. Version 13.0

Introduction and Statement of the Problem

Distributed and Cloud Computing

WAP Security. Helsinki University of Technology S Security of Communication Protocols

Harness the Power of Policy on Device

Computer Security: Principles and Practice

Base Station Client Utility

Getting to Grips with Public Key Infrastructure (PKI)

5G Revolution & Service security in Korea

The Integration of the Capabilities of Wireless Sensor Networks in 3GPP IMS: Case Study and Potential Issues for Standardization

WeVe: When Smart Wearables Meet Intelligent Vehicles

Connecting to the NJITSecure wireless network.

Securing Wireless LAN Controllers (WLCs)

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

Managing Rogue Devices

AllNet: Ubiquitous Interpersonal Communication

Swarm at the Edge of the Cloud. John Kubiatowicz UC Berkeley Swarm Lab September 29 th, 2013

NETWORK SECURITY. Ch. 3: Network Attacks

IEEE PROJECTS ON EMBEDDED SYSTEMS

ARCHITECTURING AND SECURING IOT PLATFORMS JANKO ISIDOROVIC MAINFLUX

ASIT-33018PFM. 18-Port Full Gigabit Managed PoE Switch (ASIT-33018PFM) 18-Port Full Gigabit Managed PoE Switch.

Tait GridLink THE INTELLIGENT CHOICE FOR DISTRIBUTION AUTOMATION. harris.com #harriscorp

SAML-Based SSO Solution

SECURITY MANAGEMENT SYSTEM FUNCTIONAL ARCHITECTURE FOR ENTERPRISE NETWORK

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

Trust Harris for LTE. Critical Conditions Require Critical Response

Managing Rogue Devices

Integrated Security Management Framework

Security for Wireless Handhelds

Two Password Authentication Based Security Of Patient's Private Data

PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL

IPv6 Home Automation. IGC/INET, 12/05/2004 Jordi Palet & Francisco Ortiz Consulintel

Wireless Sensor Networks CS742

Axway Validation Authority Suite

Data Model Considerations for Radar Systems

IoT Infrastructure. idevicesinc.com

ARM Security Solutions and Numonyx Authenticated Flash

Security of vehicular communications. Vehicular communication (VC) systems

Trustworthy user authentication, authorization, data integrity AND consent management

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Wireless Sensor Networks

TACLINK. Tactical Communications System. Complete Communications Management System

FastTrack: An Optimized Transit Tracking System for the MBTA

Convergence Everywhere

Cyber security mechanisms for connected vehicles

Transcription:

Sensor networks CODE BLUE Sensor Networks for Emergency Response Challenges and Opportunities New class of devices having the potential to revolutionize the capture, processing and communication of critical data for use by first responders. Consists of small, low-power and low-cost devices with limited computational and wireless communication capabilities. CODE BLUE A software infrastructure built on sensor networks that addresses the challenges about the limitations of sensor networks in use of emergency situations. Is an integration of sensor nodes and other devices into a disaster response setting. Facilitates: Ad hoc network formation Resource naming and discovery Security In-network aggregation of sensor-produced data Challenges CODE BLUE has to face: DISCOVERY AND NAMING Establish the communication pathway between the vital sign sensors and first responders. Device naming should be application centric. Something more than a low-level network address required. Discovery process should be decentralized to prevent failures at a single node.

Challenges (cont.) ROBUST ROUTING Disaster scenario devices might need to communicate with other devices outside their immediate radio range. Ad hoc routing techniques preferred. Multicast: a vital sign sensors can send information to multiple types of receivers. PRIORITZATION OF CRITICAL DATA Limited bandwidth on low-power radios. Information needs to be selective. SECURITY Big concern in wireless communication. Privacy and patient profiles. Can t rely on a predeployed public key infrastructure. Tracking system How to track patients and rescuers efficiently. Should be able to adapt many types of signal (GPS, RF signal )

CODE BLUE CODE BLUE (Cont.) Completed Components Code Blue information plane addresses the challenges previously described Facilitates the discovery process between devices. Flexible naming scheme Authentication and encryption provisions Credential establishment service Location tracking An improving system Wireless vital sign sensor: Run on motes: Very simple-architecture chips low power, very simple OS (for concurrency and resource management in sensor networks). No TCP/IP or ARP Some motes in use: Pulse oximeter: captures a patient s heart rate and blood oxygen saturation EKG: heart s electrical activity in more severely injured patients Handheld devices (carried by first responder) Motes described from previous slide Wireless Vital Sign Sensor system: Handheld devices Carried by first responder Can capture information from multiple motes. Since motes have ids, the responder can identify the patients.

SECURITY IMPLEMENTATION Defend adversaries on spoofing, capturing information Conventional login authentication not practical Public-key architecture too heavy for the framework Motes only has 4kb RAM, cannot store so many RSA public keys. Use: ECC (Elliptic Curve Cryptography) on Mica2. Smaller keys (163 bit) can be generated in 35 seconds Future: leverage complex computation of keys to other more powerful devices (sensor nodes have to decide which device to trust). LOCATION TRACKING - MoteTrack RF-based Beacons (can replace smoke detectors) populated in the area and have a subset of signatures. Mobile node waiting for signature (known, fixed locations previously set up) and send that information to the beacons closest to it to know where it is. MoteTrack (Cont.) MoteTrack (Cont.) Decentralized Robustness Mobile nodes request information about the reference-signature bases. It relies on the beacon message with the strongest Received Signal Strength Indication (RSSI) to calculate its location.

Conclusion Other subsystems are being developed on Code Blue (device discovery, traffic prioritization, robust routing ) Open question: Leverage of computational power to other devices.