Upload
thyra
View
22
Download
0
Embed Size (px)
DESCRIPTION
Communication Networks for Critical Infrastructures - topics under research at INESC Porto. Manuel Ricardo DEEC, Faculdade de Engenharia, Universidade do Porto [email protected]. Outline. What is it? - PowerPoint PPT Presentation
Citation preview
Campus da FEUPRua Dr. Roberto Frias, 3784200 - 465 PortoPortugal
T +351 222 094 000F +351 222 094 050
© 2009
Communication Networks for Critical Infrastructures - topics under research at INESC Porto
Manuel RicardoDEEC, Faculdade de Engenharia, Universidade do Porto
Manuel RicardoDEEC, Faculdade de Engenharia, Universidade do Porto
1Telecommunications and Multimedia Unit
© 2008
Outline
• What is it?
“Sistemas ciber-físicos para inteligência ambiente: redes de sensores em infra-estruturas criticas“
• Related research topics @ INESC Porto
• What is it?
“Sistemas ciber-físicos para inteligência ambiente: redes de sensores em infra-estruturas criticas“
• Related research topics @ INESC Porto
2Telecommunications and Multimedia Unit
© 2008
Critical infrastructure
• Critical infrastructure – term used by governments
to describe assets essential for functioning of society /economy
• Infrastructures commonly associated with the term
– electricity, gas, oil
– telecommunications
– water
– agriculture, food
– public health
– transportation
– financial services
– security services
• Critical infrastructure – term used by governments
to describe assets essential for functioning of society /economy
• Infrastructures commonly associated with the term
– electricity, gas, oil
– telecommunications
– water
– agriculture, food
– public health
– transportation
– financial services
– security services
3Telecommunications and Multimedia Unit
© 2008
Ambient Intelligence
• Embedding intelligence in everyday objects
• Object gains the ability to
– Gather information from its environment
possibly react by adapting its function
– Process information
– Exchange information with neighbour objects or Internet
• Embedding intelligence in everyday objects
• Object gains the ability to
– Gather information from its environment
possibly react by adapting its function
– Process information
– Exchange information with neighbour objects or Internet
4Telecommunications and Multimedia Unit
© 2008
The Intelligent Object
• Computers are becoming small
• Common object becoming also a computer
• Computers are becoming small
• Common object becoming also a computer
5Telecommunications and Multimedia Unit
© 2008
Ambient Intelligence in Critical Infrastructures
• Objects of critical infrastructures will become computers
• New objects (criticality related) will be added to infrastructure
• As a result, critical infrastructures expected to become
efficient , reliable, secure
• Objects of critical infrastructures will become computers
• New objects (criticality related) will be added to infrastructure
• As a result, critical infrastructures expected to become
efficient , reliable, secure
6Telecommunications and Multimedia Unit
© 2008
The Challenges of Interconnecting Objects
• Thousands of computing-objects to be interconnected through
wireless, auto-configurable, high-bitrate, secure networks
• Research-topics@INESCPorto
– Scalable auto-configurable networks
– Intermittent connectivity / mobility
– Enabling high bitrates
– Network congestion control
– Information aware networks
– Moving PAN
– Secure Networks
• Thousands of computing-objects to be interconnected through
wireless, auto-configurable, high-bitrate, secure networks
• Research-topics@INESCPorto
– Scalable auto-configurable networks
– Intermittent connectivity / mobility
– Enabling high bitrates
– Network congestion control
– Information aware networks
– Moving PAN
– Secure Networks
7Telecommunications and Multimedia Unit
© 2008
Scalable and Auto-Configurable Networks
• Plug & play network
– Ethernet like network
– Big network = big LAN
• Some network services
– DHCP, ARP, IPv6 link local
– Routing protocols
– Generate broacast traffic
Network becomes congested
• Research@INESCPorto
– Re-design network services to avoid broadcast traffic
Using prune + data suppression/compression techniques
– Design large virtual Ethernet networks over existing technologies
• Plug & play network
– Ethernet like network
– Big network = big LAN
• Some network services
– DHCP, ARP, IPv6 link local
– Routing protocols
– Generate broacast traffic
Network becomes congested
• Research@INESCPorto
– Re-design network services to avoid broadcast traffic
Using prune + data suppression/compression techniques
– Design large virtual Ethernet networks over existing technologies
8Telecommunications and Multimedia Unit
Node
ARP REQUEST
Shortest Path Link Eliminated
by STPNode
© 2008
Intermittent Connectivity and Mobility in Large Networks
9Telecommunications and Multimedia Unit
• Global frequent routing update
leads to excessive overhead
• Ad-hoc routing protocols
inadequate for large networks
• Research@INESCPorto
– New routing techniques
for wireless and mobile networks
– New/lost links reported only to relevant nodes
• Global frequent routing update
leads to excessive overhead
• Ad-hoc routing protocols
inadequate for large networks
• Research@INESCPorto
– New routing techniques
for wireless and mobile networks
– New/lost links reported only to relevant nodes
© 2008
Enabling High Bitrates - Directional Antenna
10Telecommunications and Multimedia Unit
• Bitrate of a wireless link depends on
Bandwidth, Rx power, SINR
• Directional antenna enables
– More received power /longer links
– Less interference
– More links
• Research@INESCPorto
– What criteria use to form beams?
– How to combine
• on demand-links and routing techniques?
• beams with multichannel?
• Bitrate of a wireless link depends on
Bandwidth, Rx power, SINR
• Directional antenna enables
– More received power /longer links
– Less interference
– More links
• Research@INESCPorto
– What criteria use to form beams?
– How to combine
• on demand-links and routing techniques?
• beams with multichannel?
© 2008
Enabling High Bitrates – Avoiding Hidden Nodes
• Wireless networks rely on CSMA/CA shared access mechanisms
• CSMA/CA performance depends on
– Number of nodes
– Number of hidden nodes
• Research@INESCPorto
Network topology control
• reduce number of hidden nodes for less collisions
• dynamic selection of radio channels
• Wireless networks rely on CSMA/CA shared access mechanisms
• CSMA/CA performance depends on
– Number of nodes
– Number of hidden nodes
• Research@INESCPorto
Network topology control
• reduce number of hidden nodes for less collisions
• dynamic selection of radio channels
11Telecommunications and Multimedia Unit
© 2008
Network Congestion Control
• Current congestion control mechanisms
– inadequate for variable bitrate media
shared media / variable bitrate links
– unfair for real-time /short traffic flows
• Research@INESCPorto
– Use of explicit control techniques
network nodes control the sources rate
– Feedback signal considers
nodes congestion and energy
– Management of traffic priorities
• Current congestion control mechanisms
– inadequate for variable bitrate media
shared media / variable bitrate links
– unfair for real-time /short traffic flows
• Research@INESCPorto
– Use of explicit control techniques
network nodes control the sources rate
– Feedback signal considers
nodes congestion and energy
– Management of traffic priorities
12Telecommunications and Multimedia Unit
© 2008
Information Aware Networks
• Application and physical networks are different
e.g. P2P application over ad-hoc networks
• Research@INESCPorto
– Define network paths based on
• link quality, node energy
• type of information
– Network topology constrained by application
• Application and physical networks are different
e.g. P2P application over ad-hoc networks
• Research@INESCPorto
– Define network paths based on
• link quality, node energy
• type of information
– Network topology constrained by application
13Telecommunications and Multimedia Unit
© 2008
Moving Personal Area Networks
• Multi-technology PAN
Intra/extra PAN connectivity
• Research@INESC Porto
– PoA selected based on user-defined policies
– Centralized single tree routing
– Adaptive IP autoconfiguration
• Multi-technology PAN
Intra/extra PAN connectivity
• Research@INESC Porto
– PoA selected based on user-defined policies
– Centralized single tree routing
– Adaptive IP autoconfiguration
14Telecommunications and Multimedia Unit
UMTS
Wi-Fi
photos
docs
videos
docs
UWBBluetooth
audio files
UWB
Bluetooth
Internet
PAN
BAN
© 2008
Secure Networks
• Networks need to be secure
Security between any pair of nodes
• Research@INESCPorto
– Hierarchical distributed PKI
• Ephemeral certificates
• Used to authenticate a node
• Short public keys low processing power
• No revocation lists support of intermittent connectivity
– Secure group communications
• Authentication by certificates
• Short symmetric keys
• Key distribution using multicast techniques
• Networks need to be secure
Security between any pair of nodes
• Research@INESCPorto
– Hierarchical distributed PKI
• Ephemeral certificates
• Used to authenticate a node
• Short public keys low processing power
• No revocation lists support of intermittent connectivity
– Secure group communications
• Authentication by certificates
• Short symmetric keys
• Key distribution using multicast techniques
15Telecommunications and Multimedia Unit
Cert 2.2 N2.2.1 ({id2.2.1, pk2.2.1, ta, tb}pkCA2.2)
CA 1
CA 2.1
N 2.1.1 N 2.1.2
N 2.1.3
CA 2.2
N 2.2.1
Auth2.2.1({id2.2.1, pk2.2.1, ta, tb}pkCA2.2)
Network 2.1
Network 2.2
Receiver