The 17th GRACE Seminar on Advanced Software Science and Engineering

Time: 13:00-15:00, Tues, March 24th, 2009
Place: Lecure Room 2 (2004), 20F, National Institute of Informatics (map)
Inquiry: Nobukazu Yoshioka (nobukazu_AT_nii.ac.jp)
Fee: Free
You need to register your name, affiliation and e-mail address in
advance. Please send a mail titled “17th Grace Seminar” including
the information to event-info@grace-center.jp.

Programme:
13:00-14:00 Engineering Organic Computing Applications
— Design, Analysis, Safety
Speaker: Wolfgang Reif, University of Augsburg
14:00-15:00 Light-weight Packet Marking for Detecting Compromised Nodes
in Wireless Sensor Networks
Speaker: Yuichi Sei, NII

Details:
Title: Engineering Organic Computing Applications
— Design, Analysis, Safety
Speaker: Wolfgang Reif, University of Augsburg

Abstract:
The term Organic Computing here stands for a number of techniques to
incorporate nature inspired properties into technical systems (nothing
to do with organic material in context of computing). One interesting
class of Organic Computing (OC) applications are software intensive
(embedded) systems with self-x properties. They are able to
dynamically adapt to changes in requirements, to automatically detect
and neutralize component failures and to continuously optimize
themselves for better performance. These capabilities are called
self-adaptation, self-healing and self-optimization. The expectation
is that systems with self-x capabilities are by far superior to
standard systems in terms of availability, reliability and effort of
maintenance. Self-x embedded systems might have an enormous impact on
innovations in production automation, automotive systems, space,
robotics, sensor nets and many other fields.
On the other hand self-x (or organic) embedded systems require new
methods with respect to construction paradigms, functional
correctness, safety and trust. One major challenge is to reconcile the
flexibility of self-x systems with the demand for guaranteed positive
(or at least non negative) in technical applications. Another
challenge is to measure the degree of self-x capacity available in a
technical solution, and finally a software engineering process for OC
systems is needed. This part of the tutorial presents an approach to
solve these problems. We introduce a canonical system architecture
separating the productive system from the self-x infrastructure, and
the Observer/Controller part of an OC application. Furthermore, we
show how to achieve safety by model based analysis, and presented a
technique how to compute the self-x capacity embodied in an OC
application. It can be shown, that self-x mechanisms can indeed add
new potential to classical redundancy- and fault-tolerance techniques.
In addition, quantitative safety analysis helps to classify systems
according to standard safety criteria (e.g. SIL).

– . – . – . – . – . – . – . – . – . – . – . – . – . – . – . – . – . –
Title: Light-weight Packet Marking for Detecting Compromised Nodes
in Wireless Sensor Networks
Speaker: Yuichi Sei, NII

Abstract:
Wireless sensor networks (WSN) consist of a high number of sensor
nodes that are used to events such as intruders. Sensor nodes are
usually deployed in an open environment accessible by third
parties. As a result they can easily be physically captured with
malicious intent. Once a node is compromised, sensitive information
like secret keys or data stored in the physical memory is
exposed. That information can be used to create malicious nodes. Our
goal is to locate compromised nodes that create false messages and
send them to the sink. Existing methods can only be used in situations
where there is one source node and the routing path from it to the
sink is static. This limitation is a big problem in wireless sensor
networks that are prone to node failures. The existing methods must
also receive a lot of false messages before they can locate a
compromised node. We propose light-weight packet marking (LPM) for
detecting compromised nodes. In LPM, each node appends its ID and a
$k$-bit (e.g., 1 bit) message authentication code (MAC) to messages
and the sink detects a compromised node by using a statistical
method. Our method can be used in static and dynamic environments and
can detect compromised nodes quickly. Mathematical analyses and
simulations prove the effectiveness of our method.
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
[Biographies]
Prof. Dr. Wolfgang Reif is full professor of Computer Science and
Director of the Institute for Software & Systems Engineering (ISSE) at
the University of Augsburg, Germany. Furthermore, he is Dean of the
Faculty of Applied Computer Science. He studied Computer Science and
did his Ph.D. at the University of Karlsruhe, Germany. From 1995 to
2000 he was Professor for Computer Science at the University of Ulm
before moving to the Universtity of Augsburg in Bavaria. His
scientific interests are in software & systems engineering, safety,
security, and quality, software for Mechatronics and Robotics,
self-organising, adaptive systems (Organic Computing), and formal
specification and verification. He is also leading Bavaria’s Elite
Graduate Program on Software Engineering, a joint program of the
University of Augsburg, the Technical University of Munich, and the
LMU Munich.

Yuichi Sei is a research assistant of National Institute of
Informatics. He received the Ph.D. degree in information science and
technology from The University of Tokyo in 2009. His current research
interests include distributed systems for security and software
reliability.

This entry was posted in Research, Seminar. Bookmark the permalink.

Comments are closed.