Final year project proposal 200 5 06
Download
1 / 14

al Year Project Proposal 2005/06 - PowerPoint PPT Presentation


  • 631 Views
  • Uploaded on

Final Year Project Proposal (200 5/06). Dr. Bin Xiao Assistant Professor Department of Computing Email: [email protected] URL: http://www.comp.polyu.edu.hk/~csbxiao. Sensor networks: self-organization and data collections. BScIT & BAC (XB1 & XB2) What is a sensor network?.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'al Year Project Proposal 2005/06' - ryanadan


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Final year project proposal 200 5 06 l.jpg

Final Year Project Proposal (2005/06)

Dr. Bin Xiao

Assistant ProfessorDepartment of ComputingEmail: [email protected]: http://www.comp.polyu.edu.hk/~csbxiao


Sensor networks self organization and data collections l.jpg
Sensor networks: self-organization and data collections

  • BScIT & BAC (XB1 & XB2)

  • What is a sensor network?


Applications for sensor networks l.jpg
Applications for Sensor Networks

  • Infrastructure Security

    • Tsing Ma Bridge

  • Environment and Habitat Monitoring

  • Industrial Sensing

  • Traffic Control


Environmental monitoring applications l.jpg
Environmental Monitoring Applications

  • Monitoring interactive phenomena

    • Atmosphere, Water, Soil, and Biomass

  • Home security

Contaminants

And

Pathogens

H2O

C

Light


Data integration l.jpg
Data Integration

  • Energy conservation argues for in-network information aggregation

  • The aggregation of probabilistic information is tricky.

  • Network configuration and data fusion to a sink node needs more attention.


Communications and new applications for peer to peer networks l.jpg
Communications and new applications for peer-to-peer networks

  • BAC (XB3)

  • What is a peer-to-peer (P2P) network?

Internet


Napster example l.jpg

E? networks

E

E?

m5

Napster: Example

  • A killer application: Napster

    • Free music over the Internet

  • Key idea: share the storage and bandwidth of individual (home) users

m5

E

m6

F

D

m1 A

m2 B

m3 C

m4 D

m5 E

m6 F

m4

C

A

B

m3

m1

m2


P2p issues l.jpg
P2P Issues networks

Security and Protection

Trust

Anonymity

Reputation

Business and

Legal Issues

Business Models

Intellectual Property Rights

Sociometry

Small World Phenomena

Power-Law Networks

Network Architecture

and Design

Network Topology

Routing

Overlay Networks

P2P

Distributed Databases

Query Decomposition

Query Distribution

Mediation

Distributed Data

Structures

Distributed Hash Tables

Scalable Distributed

Data Structures

Intelligent Agents/

Web-based Services

Matchmaking

Service Description


Current popular applications for p2p networks l.jpg
Current popular applications for P2P networks networks

  • BitTorrent (BT) software


Current popular applications for p2p networks10 l.jpg
Current popular applications for P2P networks networks

  • Coolstream – an online network TV, using similar technology as BT.


New applications for peer to peer networks l.jpg
New applications for peer-to-peer networks networks

  • Support P2P communication in Internet, or in a heterogeneous network including the fixed Internet, wireless LANs, and the 3G systems.

Internet


Security in our daily wireless networks l.jpg
Security in our daily wireless networks networks

  • BAC (XB4)

  • Wireless networks (including mobile ad hoc networks and sensor networks)


Possible issues l.jpg
Possible issues networks

  • Intrusion detection

  • Self-monitoring/self-healing wireless networks

  • Dependability/security optimization and adaptive control

  • Role of biometrics

  • Novel threats/attacks/vulnerability

  • Public key infrastructure implementation

  • Intrusion tolerant mechanisms

  • Denial of service attacks and prevention

  • Secure group communication/multicast

  • Security considerations for resource constrained devices

  • Cross-layer network attacks and mitigation

  • Secure routing protocols

  • Network controlled secure physical reconfiguration

  • Redundancy and security

  • Reasoning about trust in wireless environment

  • Tools for analysis and verification of protocols

  • Privacy, contract agreements, and payment systems


The end l.jpg
The End networks

These three hot topics are waiting for your selections. They

are interesting and practical.

Any questions, please feel free to contact me.


ad