Check out the new USENIX Web site.
MobiSys '03: First International Conference on Mobile Systems, Applications, and Services, May 5-8, 2003, San Francisco, CA, USA
MobiSys Home   Invitation   Organizers   At a Glance   Students
Registration   Tutorials   Technical Sessions   Activities   Call for Papers
TUTORIALS

To meet your needs, the Tutorial Program at MobiSys 2003 provides in-depth, immediately useful instruction in the latest techniques, effective tools, and best strategies. The tutorials survey the topic, then dive right into the specifics of what to do and how to do it. Instructors are well-known experts in their fields, selected for their ability to teach complex subjects. Attend tutorials at MobiSys 2003 and take valuable skills back to your company or organization. Register now to guarantee your first choice—seating is limited.

Monday, May 5, 2003    
Half Day Tutorials   
M1am An Intro to Wearable Computing
M2pm Mobile Networking
Full Day Tutorials    
M3 802.11 Wireless Network Security Cancelled
M4 Programming Wireless Sensor/Effector Networks of TinyOS Motes

Our Guarantee
If you're not happy, we're not happy. If you feel a tutorial does not meet the high standards you have come to expect from USENIX and ACM Sigmobile, let us know by the first break and we will change you to any other available tutorial immediately

Continuing Education Units (CEUs)
USENIX provides Continuing Education Units for a small additional administrative fee. The CEU is a nationally recognized standard unit of measure for continuing education and training and is used by thousands of organizations. Each full-day tutorial, or two half-day tutorials, qualifies for 0.6 CEUs. You can request CEU credit by completing the CEU section on the registration form. USENIX provides a certificate for each attendee taking a tutorial for CEU credit and maintains transcripts for all CEU students. CEUs are not the same as college credits. Consult your employer or school to determine their applicability.

M1am An Introduction to Wearable Computing
Bradley Rhodes, Ricoh Innovations, and Thad Starner, Georgia Tech

Intended Audience: Anyone interested in the research and commercial potential of wearable computers. Anyone interested in using wearable computers.

Overview: Ubiquitous computing implies the deployment of computers and networking services everywhere that users might travel. There is an alternative: wearable computers. By carrying their own infrastructure, users are guaranteed a certain level of service wherever they go.

What should a wearable computer contain? What is the market for such a device, and when will wearable computing products become profitable?

This tutorial will provide an intense introduction to the field of wearable computing from both the research and commercial viewpoints. It will highlight both past success stories and upcoming challenges.

Bradley RhodesBradley Rhodes is a research scientist at Ricoh Innovations in Menlo Park, California. He completed his PhD work at MIT in Software Agents, and combined agent technology with wearable computing to create applications that can best be described as Intelligence Augmentation.
Thad StarnerThad Starner is a professor in the College of Computing at Georgia Tech in Atlanta. He completed one of the first PhDs on wearable computing while at MIT and has been using a wearable computer as an integral part of his everyday life since 1993.

M2pm Mobile Networking
Thomas F. La Porta, Penn State University

Intended Audience: This tutorial is intended for researchers and developers involved with or interested in mobility-related research areas, and provides a basic understanding of how 3G systems operate and open related research issues.

Overview: Mobile networks are evolving from so-called second generation (2G) voice-centric circuit-based networks to third generation multi-service networks. Instead of limited 8 Kbps voice services, and very bandwidth limited hard-to-use data services, 3G networks promise to deliver the "mobile Internet"—high speed multimedia services. While the standards for these 3G networks are in place, deployment has just begun. This tutorial will focus on the networking aspects of 3G systems.

The first part of the tutorial will be a very brief overview of the current cellular network, then the vision of the all-IP 3G networks will be discussed. The UMTS General Packet Radio Service and the IP Multimedia Subsystem is covered in detail. These systems are expected to provide an integrated wireless network that supports data services using GPRS protocols, and multimedia services using SIP. I briefly describe the CDMA 2000 Enhanced Voice Data Only (EV-DO) system which is based on Mobile IP.

Thomas F. La Porta Thomas F. La Porta received his Ph.D. degree in Electrical Engineering from Columbia University. He is a professor in the Computer Science and Engineering Department at Penn State. Dr. La Porta was the Director of the Bell Labs Mobile Networking Research Department. He is the Editor-in-Chief of the IEEE Transactions on Mobile Computing. He has published over 50 technical papers and holds 24 patents.

M3 802.11 Wireless Network Security—Principles and Practice Cancelled
Bernard Aboba and Dan Simon, Microsoft

Intended Audience: Researchers and developers who want to learn about 802.11 wireless network security. Familiarity with the very basics of network security, cryptography and 802.11 would be helpful. Deep knowledge of these topics is not required.

Overview: Wireless networks based on the 802.11 standard have proliferated in recent years, as have stories of their many security vulnerabilities. In this tutorial, we will present an overview of the main cryptographic and security issues relevant to 802.11 wireless networks, and discuss the past, present, and future of 802.11 network security standards. Topics include:

  • Security requirements and threat models for wireless networks
  • Existing standards
    • WEP, IPsec/IKE, Mobile IPv6
    • Known attacks
  • The WPA and 802.11i proposals
    • EAP, RADIUS
    • Key Hierarchy, 4-way handshake, Ciphers
    • DoS: The Achilles Heel of IEEE 802.11i
  • Long-term issues and goals

Bernard Aboba Bernard Aboba is an Architect in the Windows Networking and Communications group at Microsoft. He is co-chair of the IETF AAA and EAP WGs, a co-author of the IEEE 802.1X-2001 standard, and maintainer of a website on IEEE 802.11 security (https://www.drizzle.com/~aboba/IEEE).

Dan Simon is a cryptographer at Microsoft Research. His research interests include systems and network security and cryptography. He received his PhD from the University of Toronto in 1993, and has been with Microsoft since 1994.

M4 Programming Wireless Sensor/Effector Networks of TinyOS Motes
David Culler and members of the TinyOS team

Intended Audience: Researchers and developers interested in hands-on experience with the system design, software, and hardware of emerging low-power, wireless networks interconnected with the physical world. Participants should be fluent in C and familiar with concurrency and communication concepts. Experience with embedded devices will also be useful. The laboratory material will focus on the Berkeley TinyOS wireless mote platform available through Crossbow, Inc. Participants with their own hardware are encouraged to bring it. A set of kits will be available for use by teams without their own hardware.

Overview: Networks of small, wireless devices connected to the physical world are emerging as an important new class of computer system. The "technology push" stems from the miniaturization of processors and storage combined with the development of CMOS radios and MEMS sensors and actuators to allow sensing, processing, and communication to be integrated in small, low-cost devices. Tremendous "application pull" comes from the ability to instrument physical spaces and objects at unprecedented fidelity while coordinating their activities through the network. Between these two driving forces lie a host of systems design challenges in providing networking, aggregate data processing, programmability, and distributed services in this severely resource-constrained environment.

The Berkeley wireless sensor motes and TinyOS were developed to enable researchers to explore these systems issues in the face of real constraints and the uncertainties of the physical world, as well as to implement novel applications. A series of presentations and hands-on labs will cover the wireless hardware architecture and sensor interfaces, the TinyOS system framework for resource-constrained concurrency, the nesC programming environment, ad hoc multihop networking, network services, power-management, in-network query processing, and high-level application deployments. All of the material, including the TinyOS distribution and mote designs is openly available.

David Culler David Culler is a Professor of Computer Science at the University of California and Founding Director of Intel Research, Berkeley. He received his Ph.D. from MIT in 1989. His research addresses vast networks of small, embedded wireless devices, parallel computer architecture, parallel programming languages, and high performance communication.

Home   |   Invitation   |   Organizers   |   At a Glance   |   Students
Registration   |   Tutorials   |   Technical Sessions   |   Activities/BoFs   |   Call for Papers
Last changed: 15 Apr. 2003 jr