Award Abstract # 0954020
CAREER: EASE: Enhancing the Security of Pervasive Wireless Networks by Exploiting Location

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: THE TRUSTEES OF THE STEVENS INSTITUTE OF TECHNOLOGY
Initial Amendment Date: February 18, 2010
Latest Amendment Date: March 9, 2014
Award Number: 0954020
Award Instrument: Continuing Grant
Program Manager: Ralph Wachter
rwachter@nsf.gov
 (703)292-8950
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: March 1, 2010
End Date: February 29, 2016 (Estimated)
Total Intended Award Amount: $488,812.00
Total Awarded Amount to Date: $504,791.00
Funds Obligated to Date: FY 2010 = $96,702.00
FY 2011 = $107,830.00

FY 2012 = $195,938.00

FY 2014 = $104,321.00
History of Investigator:
  • Yingying Chen (Principal Investigator)
    yingche@scarletmail.rutgers.edu
Recipient Sponsored Research Office: Stevens Institute of Technology
ONE CASTLE POINT ON HUDSON
HOBOKEN
NJ  US  07030-5906
(201)216-8762
Sponsor Congressional District: 08
Primary Place of Performance: Stevens Institute of Technology
ONE CASTLE POINT ON HUDSON
HOBOKEN
NJ  US  07030-5906
Primary Place of Performance
Congressional District:
08
Unique Entity Identifier (UEI): JJ6CN5Y5A2R5
Parent UEI:
NSF Program(s): Special Projects - CNS,
TRUSTWORTHY COMPUTING,
Secure &Trustworthy Cyberspace
Primary Program Source: 01001011DB NSF RESEARCH & RELATED ACTIVIT
01001112DB NSF RESEARCH & RELATED ACTIVIT

01001213DB NSF RESEARCH & RELATED ACTIVIT

01001415DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 1045, 1187, 9102, 9178, 9251
Program Element Code(s): 171400, 779500, 806000
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

Wireless systems have become an inseparable part of our social fabric, which allow users to move around and access the services from different locations while on the move. However, wireless security is often cited as a major technical barrier that must be overcome before widespread adoption of mobile services can occur. Traditional approaches have focused on addressing security threats on a case-by-case basis in an ad-hoc manner as new and specialized threats are uncovered. Furthermore, as wireless networks become increasingly pervasive, the ubiquity of wireless is redefining security challenges (e.g., attacks can be conducted by new and rapidly evolving adversaries with little effort).

This project aims to build location-oriented information into any wireless network stack and serve as a promising new dimension across different layers to complement conventional security solutions and enhance wireless security. A suite of location-enabled techniques are integrated into wireless network stacks as a true partner to cope with attacks and collaboratively defend against adversaries. The solutions are developed generic enough to apply across heterogeneous mixes of wireless technologies through the interaction with industry collaborators.

Project results are expected to assist conventional security methods and advance our knowledge in exploring generic security approaches across a wide-range of wireless technologies, which will contribute significantly to the successful deployment and adoption of emerging wireless services. The project also strengthens the education and research of undergraduate and graduate students in related areas of wireless networks and security, and helps to prepare students to face the challenges of future information technology.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

(Showing: 1 - 10 of 14)
Chen Wang, Xiaonan Guo, Yan Wang, Yingying Chen, Bo Liu "Friend or Foe? Your Wearable Devices Reveal Your Personal PIN" the 11th ACM symposium on Information, Computer and Communications Security (ACM AsiaCCS) , 2016
Hongbo Liu, Hui Wang, Yingying Chen, and Dayong Jia "Defending against Frequency-Based Attacks on Distributed Data Storage in Wireless Networks" ACM Transactions on Sensor Networks , v.10 , 2014 , p.49:1
Hongbo Liu, Jie Yang, Yan Wang, Yingying Chen, and C. E. Koksal, "Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation" IEEE Transactions on Mobile Computing , v.13 , 2014 , p.2820
Hongbo Liu, Zhenhua Liu, Yingying Chen, Wenyuan Xu "Determining the Position of a Jammer Using a Virtual-Force Iterative Approach" Springer Wireless Networks (WiNET) , v.16 , 2010 , p.1
Hongbo Liu, Zhenhua Liu, Yingying Chen, Wenyuan Xu "Determining the Position of a Jammer Using a Virtual-Force Iterative Approach," Springer Wireless Networks (Springer WiNET), the Journal of Mobile Communication, Computation and Information , v.16 , 2010 , p.1
Jian Liu, Yan Wang, Gorkem Kar, Yingying Chen, Jie Yang, Marco Gruteser "Snooping Keystrokes with mm-level Audio Ranging on a Single Phone" the 21st Annual International Conference on Mobile Computing and Networking (ACM MobiCom) , 2015
Jie Yang, Yingying Chen, Wade Trappe, and Jerry Cheng "Detection and Localization of Multiple Spoofing Attackers in Wireless Networks" IEEE Transactions on Parallel and Distributed Systems (IEEE TPDS) , v.24 , 2013 , p.44
Xiaoyan Li, Yingying Chen, Jie Yang, and Xiuyuan Zheng "Achieving Robust Wireless Localization Resilient to Signal Strength Attacks" Springer Wireless Networks (WiNET) , v.18 , 2012 , p.45
Yingying Chen, Hui Wang, Xiuyuan Zheng, Jie Yang "A Reinforcement Learning-Based Framework for Prediction of Near Likely Nodes in Data-Centric Mobile Wireless Networks" EURASIP Journal on Wireless Communications and Networking , 2010
Yingying Chen, Hui Wang, Xiuyuan Zheng, Jie Yang "A Reinforcement Learning-Based Framework for Prediction of Near Likely Nodes in Data-Centric Mobile Wireless Networks" EURASIP Journal on Wireless Communications and Networking , v.2010 , 2010
Yingying Chen, Jie Yang, Wade Trappe, Richard P. Martin "Detecting and Localizing Identity-Based Attacks inWireless and Sensor" IEEE Transactions on Vehicular Technology , v.59 , 2010 , p.2418
(Showing: 1 - 10 of 14)

PROJECT OUTCOMES REPORT

Disclaimer

This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.

This project takes an unique viewpoint of exploring the opportunities for cross-layer solutions that utilize the correlation information inherited from location across network stacks to collaboratively defend against security threats. The key insights of this project are: location should be integrated into any wireless network stack as a true partner to cope with attacks and effectively defend against adversaries, and security solutions that can leverage the knowledge provided by location across different network layers is promising to collaboratively enhance wireless security.

This project results in multiple publications centered around four main areas: (1) detecting attacks involving the claimed identity of a mobile device; (2) localizing attackers while coping with the localization infrastructure threats; and (3) utilizing the knowledge combined from lower layers, e.g., the detection of attacks and localization of adversaries, to provide attack resilient secure access to network resources by coping with access violations.

(1) Due to the shared nature of the wireless medium, attackers can gather useful identity information during passive monitoring and further utilize the identity information to launch identity-based attacks, in particular, the two most harmful but easy to launch attacks: spoo?ng attacks and sybil attacks. Identity-based attacks will have a serious impact to the normal operation of wireless and sensor networks. We take a different approach by using the physical properties associated with wireless transmissions to detect identity-based attacks, as well as localizing the adversaries in wireless and sensor networks. We formulate a generalized attack detection model using statistical signi?cance testing. We then provide theoretical analysis of exploiting the spatial correlation of Received Signal Strength (RSS) inherited from wireless nodes for attack detection.

(2) To ensure the availability of wireless networks, mechanisms are needed for the wireless networks to cope with jamming attacks. Most existing anti-jamming work does not consider the location information of radio interferers and jammers. However, this information can provide important insights for networks to manage its resource in different layers and to defend against radio interference. We examine two jamming models, region-based and signal-to-noise-ratio (SNR) based, to illustrate the underlying principles that govern the state of a node. We develop mechanisms to localize both single jammer as well as multiple jammers. The two main components in our framework, namely automatic network topology partitioner and intelligent multi-jammer localizer, work together to derive different categories of node clusters and achieve high localization accuracy even under overlapping jammed areas.

(3) The usage of wireless devices (e.g., PDAs, smartphones, and laptops) has become an inseparable part of our daily lives, which actively involves in information sharing and various data transactions in ways that previously were not possible. However, to ensure the successful deployment and adoption of these emerging applications, secure communication is crucial to support data transmission confidentiality, data integrity, and device authentication among multiple wireless devices. We examine secure group communication among multiple wireless devices by exploiting physical layer information of radio channel (e.g., Received Signal Strength and Channel State Information) instead of using the traditional cryptographic-based methods. The main advantage of the secret key generation utilizing physical layer information of radio channel is that it allows any two wireless devices within transmission range of each other to extract a shared symmetric cryptographic key while do not require a fixed infrastructure or a secure communication channel. To enable secure group communication, two proto...

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page