The PI is developing bottom-up mechanisms for securing wireless networks against a class of "layer-violating" attacks. In a layer-violating attack, the attacker uses protocol behavior at one layer of the network stack to compromise a secure protocol at a different layer. Such layer-violating attacks often can span from the physical layer all the way to the transport layer. In the PI's approach, each layer interlocks with the higher layer, relying on the security properties guaranteed by the lower layer to provide security properties to the next higher layer, resulting in a protocol stack that is resilient to layer-violating attacks. The PI's efforts focus on four important security properties: availability against jamming, fairness, routing, and privacy. The outcomes of this research will be:
The PI is also revising the introductory programming curriculum in the ECE department; one aspect of this revision is an emphasis on safe and secure code writing. The PI is also working to develop a middle-school-level curriculum to encourage underprivileged groups to pursue engineering education.