Networking, wireless

group_project

Visible to the public TWC: Small: Collaborative: Secure Data Charging Architecture for Mobile Devices in 3G/4G Cellular Networks: Vulnerabilities and Solutions

Wireless cellular networks serve as an essential cyber-infrastructure for mobile users. Unlike the Internet, cellular networks have adopted usage-based charging, rather than the simpler flat-rate charging. Data-plan subscribers have to pay their data bills based on the consumed traffic volume in 3G/4G networks. Although this metered charging system has been operational and generally successful for years, the security study of such a system remains largely unaddressed.

group_project

Visible to the public TWC: Small: Evidence of Presence for Intelligent Vehicles using Environment-Based Security

Emerging intelligent automobiles will be able to harness advance on-car sensors to support new applications such as pollution detection, road condition monitoring, and traffic control. All these applications require the ability to verify both the location and the time of a reading. This project involves the design of verification methods that make use of environment factors, such as the presence of light and shadows and the measured wireless signal strength, instead of conventional public key infrastructure-based methods, in order to verify when and where data was collected.

group_project

Visible to the public TWC: Small: PERMIT: Privacy-Enabled Resource Management for IoT Networks

This project investigates how privacy can be used to inform the design and management of future data sensing systems. Networked systems that collect data about individuals will play an increasingly important role in our lives, with applications including industrial monitoring and control, "smart" homes/cities, and personalized health care. These systems will gather private information about individuals, which creates many coupled engineering challenges.

group_project

Visible to the public EAGER: Collaborative: Algorithmic Framework for Anomaly Detection in Interdependent Networks

Modern critical infrastructure relies on successful interdependent function among many different types of networks. For example, the Internet depends on access to the power grid, which in turn depends on the power-grid communication network and the energy production network. For this reason, network science researchers have begun examining the robustness of critical infrastructure as a network of networks, or a multilayer network. Research in network anomaly detection systems has focused on single network structures (specifically, the Internet as a single network).

group_project

Visible to the public TWC: TTP Option: Large: Collaborative: Towards a Science of Censorship Resistance

The proliferation and increasing sophistication of censorship warrants continuing efforts to develop tools to evade it. Yet, designing effective mechanisms for censorship resistance ultimately depends on accurate models of the capabilities of censors, as well as how those capabilities will likely evolve. In contrast to more established disciplines within security, censorship resistance is relatively nascent, not yet having solid foundations for understanding censor capabilities or evaluating the effectiveness of evasion technologies.

group_project

Visible to the public TWC: Small: Designing Strong End-to-End Authentication Mechanisms for Modern Telephony Systems

Telephony is the dominant means of digital communication across the globe. With more than six billion users worldwide, these systems represent the only communications infrastructure available to the majority of people on the planet. Authentication has traditionally been the most central security issue for telephony providers. Tied directly to the billing process, authentication ensures that providers are able to correctly charge specific parties for their network usage.

group_project

Visible to the public TWC: Small: Evaluating and Improving Security in Emerging Branchless Banking Systems

Branchless banking brings much-needed financial services to the unbanked in both the developing and developed worlds. Leveraging ubiquitous cellular networks, these services are now being deployed as smart phone apps, providing an electronic payment infrastructure where alternatives such as credit cards generally do not exist. Over 30% of the GDP in many such nations can now be attributed to branchless banking applications, many of which now perform more transactions per month than traditional payment processors including PayPal.

group_project

Visible to the public CAREER: A Pathway towards Channel Camouflage and Manipulation Techniques for Wireless Security

Wireless channel exhibits the spatial uncorrelation property, i.e., the characteristic of a wireless channel becomes uncorrelated every half carrier wavelength over distance. This property fertilizes an emerging research area that utilizes wireless channel characteristics to authenticate a wireless transmitter.