CS GZ06/4038: Mobile and Adaptive Systems


Steve Hailes s.hailes@cs.ucl.ac.uk 7.19 MPEB
Brad Karp 7.05 MPEB
Cecilia Mascolo c dot mascolo at cs dot ucl dot ac dot uk 7.18 MPEB

Meeting Times

UCL Term 2: 7th January, 2008 - 8th February, 2008

  • Monday 10 AM - 11 AM, MPEB 1.20
  • Monday 3 PM - 4 PM, MPEB 1.20
  • Tuesday 1 PM - 2 PM, MPEB 1.20
  • Wednesday 9 AM - 10 AM, MPEB 1.20
  • Wednesday 10 AM - 11 AM, MPEB 1.20
  • Friday noon - 1 PM, MPEB 1.03

  • Detailed Course Calendar

    Each paper appears in the calendar below on the day when it will be covered in lecture. Students will find they get the most out of lecture by far when they read papers before they are covered, and are strongly encouraged to do so. Papers marked Pre-Reading: must be read before the day on which they appear in the calendar.

    N.B. that all assigned readings (including those presented by students at the end of the course) are examinable.

    Monday Tuesday Wednesday Friday

    7th Jan



    8th Jan


    Introduction to Sensor Nets

    Pre-Reading: SensorNet survey


    9th Jan


    Security for sensor nodes

    Pre-Reading: SPINS

    Pre-Reading: Key distribution

    11th Jan


    Security: DoS, Trust

    Pre-Reading: DoS


    14th Jan


    Pre-Reading: Simulation1

    Pre-Reading: Simulation2

    15th Jan

    Geographic Routing

    Lecture Notes:
    Reading Critically, GPSR

    Pre-Reading: GPSR

    16th Jan

    Karp (9 AM - 11 AM)
    Geographic Routing, revisited

    Lecture Notes: CLDP

    Pre-Reading: CLDP

    18th Jan

    Wireless LAN MACs

    Lecture Notes: MACAW and Wireless MACs

    Pre-Reading: MACAW

    21st Jan

    Karp (10 - 11 AM, 3 - 4 PM)
    Mesh Networks

    Lecture Notes: Roofnet

    Pre-Reading: Roofnet

    PPR: Partial Packet Recovery

    Lecture Notes: PPR

    Pre-Reading: PPR

    22nd Jan

    Distributed Hash Tables (DHTs)

    Lecture Notes: DHTs and Chord

    Pre-Reading: Chord

    23rd Jan

    Karp (9 AM - 10 AM)
    Distributed Hash Tables (DHTs) (cont'd)

    Lecture Notes: (continuation of 22nd Jan slides)

    Mascolo (10 AM - 11 AM)

    Lecture Notes: XORs Slides

    Reading: XORs

    25th Jan


    Lecture Notes: Zebra Slides

    Reading Zebranet

    28th Jan


    Lecture Notes: Cartel Slides

    Reading Cartel

    Publish/Subscribe in DTN

    Lecture Notes: SocialCast Slides

    Reading: SocialCast

    29th Jan

    Sensor Programming

    Lecture Notes: Abstract Regions Slides

    Reading: Abstract Regions

    30th Jan

    Service Composition and Reputation

    Lecture Notes: Mobile Bazaar

    Reading: Mobile Bazaar

    1st Feb

    Reality Mining

    Lecture Notes: Reality Mining Slides

    Reality Mining

    4th Feb

    10 AM:

    Group C (Demertzis, Giotsas, Ntoulas, Radoi)
    DHT-Based Indirection as an Internet Building Block

    Presentation Slides

    Reading: i3

    3 PM:

    Group D (Beste, Carbone, Naranjo, Ojiaku)
    Using Social Networks for DTN Routing

    Presentation Slides

    Reading: Social Network Analysis for Routing in Disconnected Delay-tolerant MANETs

    5th Feb

    Group E (Constantinides, Kennedy, Qu, Wu)
    Security for Mobile Networks

    Presentation Slides

    Reading: Providing Robust and Ubiquitous Security Support for Wireless Mobile Networks

    6th Feb

    9 AM:

    Group B (Cheng, Hunt, Ouyang, Punyaporn)
    Secure Ad hoc Routing

    Presentation Slides

    Reading: Ariadne: A secure on-demand routing protocol for ad hoc networks

    10 AM:

    Group A (Hunt, Nikolaidis, Stephan, Vaisman)
    DHT-Style Routing for Wireless Networks

    Presentation Slides

    Reading: Virtual Ring Routing: Network Routing Inspired by DHTs

    8th Feb

    No lecture

    Assigned Readings (to be covered in lectures and discussions)

    Steve Hailes:

  • General introduction to sensornets:
    Akyildiz, I., Su, W., Sankarasubramaniam, Y., and Cayirci, E., A survey on sensor networks, in IEEE Commun. Mag., 40 (8), (2002), 102--114. html
  • Security in mote-based sensornets:
    Perrig, A., Szewczyk, R., Wen, V., Culler, D., and Tygar, J. D., SPINS: Security protocols for sensor networks, in Proceedings of MobiCom 2001. html
  • More security for sensornets:
    Chan, H., Perrig, A., and Song, D., Random Key Predistribution Schemes for Sensor Networks, in Proc. of the IEEE Symposium on Security and Privacy (Oakland 2003). html
  • DoS in sensornet context:
    Wood, A.D. and Stankovic, J.A., Denial of Service in Sensor Networks, in IEEE Computer, Oct 2002. html
  • Simulation and its problems:
    Cavin, D., Sasson, Y., and Schiper, A., On the accuracy of MANET simulators, in Proceedings of the ACM Workshop on Principles of Mobile Computing (POMC '02), Oct. 2002, pp. 38--43. html
  • D. Kotz, C. Newport, R. Gray, J. Liu, Y. Yuan, and C. Elliott, "Experimental evaluation of wireless simulation assumptions," in Int'l Workshop Modeling Analysis and Simulation of Wireless and Mobile Systems (MSWiM 04). ACM Press, New York, Oct. 2004. html
  • Brad Karp:

  • Geographic routing (scalable routing in multi-hop wireless networks):
    Karp, B. and Kung, H.T., GPSR: Greedy Perimeter Stateless Routing for Wireless Networks, in Proceedings of the Sixth Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom 2000), Boston, MA, August, 2000, pp. 243-254. .ps.gz
  • Geographic routing, revisited (on arbitrary topologies):
    Kim, Y.-J., Govindan, R., Karp, B., and Shenker, S., Geographic Routing Made Practical, in the Proceedings of the Second USENIX/ACM Symposium on Networked System Design and Implementation (NSDI 2005), Boston, MA, May, 2005. pdf
  • The "classic" wireless MAC layer:
    Bharghavan, V., Demers, A., Shenker, S., and Zhang, L., MACAW: A Media Access Protocol for Wireless LANs, in ACM SIGCOMM 1994. ps.gz
  • A 40-node, fixed, outdoor 802.11b mesh network:
    Bicket, J., Aguayo, D., Biswas, S., and Morris, R., Architecture and Evaluation of an Unplanned 802.11b Mesh Network, in MobiCom 2005, August 2005. pdf
  • A wireless PHY that recognizes which bits within a packet have been received correctly, and a MAC layer that requests retransmission only of incorrectly received bits:
    Jamieson, K. and Balakrishnan, H., PPR: Partial Packet Recovery for Wireless Networks, in ACM SIGCOMM 2007, Kyoto, Japan, August 2007. pdf
  • One of the original Distributed Hash Table (DHT) overlay proposals:
    Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., and Balakrishnan, H., Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications, in ACM SIGCOMM 2001, San Diego, CA, USA, August 2001, pp. 149-160. pdf
  • Cecilia Mascolo:

  • Wireless network coding.
    Sachin Katti, Hariharan Rahul, Wenjun Hu, Dina Katabi, Muriel Medard and Jon Crowcroft. XORs in the air: Practical wireless network coding:
    In Proceedings of SIGCOMM 2006., Sept. 2006, Pisa, Italy. ACM. pdf
    Juang, P., Oki, H., Wang, Y., Martonosi, M., Peh, L., and Rubenstein, D. Energy-efficient computing for wildlife tracking: Design tradeoffs and early experiences with Zebranet, in ASPLOS 2002, San Jose, CA, October 2002. html
  • DTN in Vehicular Networking.
    Bret Hull, Vladimir Bychkovsky, Yang Zhang, Kevin Chen, Michel Goraczko, Allen K. Miu, Eugene Shih, Hari Balakrishnan, Samuel Madden.
    CarTel: A Distributed Mobile Sensor Computing System. In Proceedings of SenSys, Boulder, CO, November 2006. pdf
  • Social publish-subscribe routing in DTN:
    P. Costa, C. Mascolo, M. Musolesi, G. P. Picco. Socially-aware Routing for Publish-Subscribe in Delay-tolerant Mobile Ad Hoc Networks.
    In IEEE Journal of Selected Areas of Communications. Special Issue un Delay Tolerant Networking, IEEE. 2008. pdf
  • Sensor Programming:
    M. Welsh and G. Mainland.
    Programming Sensor Networks Using Abstract Regions. In Proceedings of NSDI'04. pdf
  • Service Composition and Reputation:
    Chakravorty, R., Agarwal, S., Banerjee, S., and Pratt, I., MoB: A Mobile Bazaar for Wide-area Wireless Services. In Proceedings of MobiCom 2005. pdf
  • Human Connectivity Studies:
    N. Eagle and A. Pentland:
    Reality Mining: Sensing Complex Social Systems. Personal and Ubiquitous Computing. Vol 10, #4, 2006. pdf

  • Presentation Papers (to be presented by student groups)

    N.B. that papers in red have been claimed by groups for their presentations.

    Steve Hailes:

  • Performance evaluation of ad hoc routing
    J. Broch, D. A. Maltz, D. B. Johnson, Y. C. Hu, and J. Jetcheva. A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. In Proc. of the ACM/IEEE MobiCom, October 1998. html
  • Security in mobile networks:
    Kong, J., Zerfos, P., Luo, H., and Lu, S., Providing Robust and Ubiquitous Security Support for Wireless Mobile Networks, in ICNP 2001. html
  • Emulation for mobile systems:
    Noble, B., Satyanarayanan, M., Nguyen, G., and Katz, R., Trace-Based Mobile Network Emulation, in ACM SIGCOMM 1997. html
  • Secure routing for ad hoc networks
    Y.-C. Hu, A. Perrig, and D. B. Johnson, Ariadne: A secure on-demand routing protocol for ad hoc networks, in The 8th ACM International Conference on Mobile Computing and Networking, September 2002. html
  • Trust management
    Boukerche, A. and Li, X., An agent-based trust and reputation management scheme for wireless sensor networks, in Global Telecommunications Conference, 2005 (GLOBECOM '05). pdf
  • Brad Karp:

  • A read-write filesystem atop a DHT, based on logs:
    Muthitacharoen, A., Morris, R., Gil, T., and Chen, B., Ivy: A Read/Write Peer-to-peer File System, in ACM/USENIX OSDI 2004. pdf
  • The nature of congestion in sensornets, and how to control it:
    Rangwala, S., Gummadi, R., Govindan, R., and Psounis, K., Interference-Aware Fair Rate Control in Wireless Sensor Networks, in SenSys 2006. pdf
  • Synopsis Diffusion: how to aggregate measurements in a sensornet robustly, without duplicating values (!):
    Nath, S., Synopsis Diffusion for Robust Aggregation in Sensor Networks, in SenSys 2004. pdf
  • DHT lookup as rendezvous primitive for multicast, anycast, and mobility support:
    Stoica, I., Adkins, D., Zhuang, S., Shenker, S., and Surana, S., Internet Indirection Infrastructure, in ACM SIGCOMM 2002. pdf
  • Routing for mesh networks using a DHT-style structure:
    Caesar, M., Castro, M., Nightingale, E., O'Shea, G., and Rowstron, A., Virtual Ring Routing: Network Routing Inspired by DHTs, in ACM SIGCOMM 2006. pdf
  • Cecilia Mascolo:

  • P. Costa, L. Mottola, A. L. Murphy and Gian Pietro Picco. Programming Wireless Sensor Networks with the TeenyLIME Middleware. In Proceedings of the 8th ACM/IFIP/USENIX International Middleware Conference, Newport Beach (CA, USA), November 2007. pdf
  • E. Daly, M. Haahr. Social network analysis for routing in disconnected delay-tolerant MANETs. In Proceedings of the 8th ACM international Symposium on Mobile Ad Hoc Networking and Computing (Montreal, Quebec, Canada, September 09 - 14, 2007). MobiHoc '07. ACM, New York, NY, 32-40. pdf
  • L. Luo, T. F. Abdelzaher. T. H. and J. A. Stankovic. EnviroSuite: An environmentally immersive programming framework for sensor networks. In Trans. on Embedded Computing Sys.. Vol 5(3). 2006. pp: 543--576. pdf
  • G. Mainland, D. Parkes, and M. Welsh. Decentralized, adaptive resource allocation for sensor networks. In International Symposium on Network Systems Design and Implementation, 2005. ACM. pdf
  • J. Polastre et al. A Unifying Link Abstraction for Wireless Sensor Networks. In Proceedings of International Conference On Embedded Networked Sensor Systems (Sensys05). San Diego, CA. 2005. pdf

  • GZ06/4038 Presentation Guidelines


    Your coursework is a group exercise, in which you and your fellow group members prepare and deliver a presentation.

    All groups will be listed here once groups have been formed.

    Presentation Schedule

    Each presentation will take place during a one-hour lecture slot for GZ06/4038 during the last week of the half-term (4th February, 2008 - 8th February, 2008, inclusive). Your group will have 30 minutes in which to present and 20 minutes to answer questions from students and staff. Please be prompt!

    The presentation schedule will appear in the course calendar once groups have formed and selected papers to present.

    Submission of Presentation Materials

    Send a single electronic version of your slides (PDF or gzip'ed PostScript) as an email attachment no later than:

         10 AM Monday, 4th February, 2008

    to all course staff:

    S.Hailes@cs.ucl.ac.uk C dot Mascolo at cs dot ucl dot ac dot uk

    In your presentation to the class, you must use the same slides that you submitted by email for this 4th February deadline.

    Presentation Format

    Most groups in recent years have used a laptop to project slides; you may also use overhead projector slides, if you so desire, and any other appropriate materials or aids.

    Each group member should take a turn to speak, and all group members should speak for the same approximate duration.

    Each group's presentation should include:

    1. a summary of the work/experiments in the paper
    2. the main conclusions drawn and why the work is important
    3. a critical appraisal of the work
    4. a summary and appraisal of relevant/similar work in the area


    At least two members of staff will be present for presentations. You will be assesed on [% of marks]:

    1. presentation structure and delivery [10%]
    2. a summary of the work in the paper and the main conclusions (a and b) [10%]
    3. a critical appraisal of work in the paper (c) [15%]
    4. a summary and appriasal of some relevant/similar work (d) [15%]
    5. responses to questions [10%]
    6. a short individual report (3 pages of A4 maximum, plus references) discussing the main issues with respect to future development and application of the particular technology/system you have presented. This should be a personal viewpoint backed-up by references to literature in support of the statements in your discussion. [40%]

    The marksheet that the assessors will use for the presentations can be found here.

    Note that:

    Each student must submit his individual report by:

         Friday, 15th February, 2008

    You will be required to submit the individual report both electronically and on paper; you will be sent further instructions by email concerning how and when you should do so.