
NSF Org: |
CNS Division Of Computer and Network Systems |
Recipient: |
|
Initial Amendment Date: | February 18, 2010 |
Latest Amendment Date: | March 9, 2014 |
Award Number: | 0954020 |
Award Instrument: | Continuing Grant |
Program Manager: |
Ralph Wachter
rwachter@nsf.gov (703)292-8950 CNS Division Of Computer and Network Systems CSE Directorate for Computer and Information Science and Engineering |
Start Date: | March 1, 2010 |
End Date: | February 29, 2016 (Estimated) |
Total Intended Award Amount: | $488,812.00 |
Total Awarded Amount to Date: | $504,791.00 |
Funds Obligated to Date: |
FY 2011 = $107,830.00 FY 2012 = $195,938.00 FY 2014 = $104,321.00 |
History of Investigator: |
|
Recipient Sponsored Research Office: |
ONE CASTLE POINT ON HUDSON HOBOKEN NJ US 07030-5906 (201)216-8762 |
Sponsor Congressional District: |
|
Primary Place of Performance: |
ONE CASTLE POINT ON HUDSON HOBOKEN NJ US 07030-5906 |
Primary Place of
Performance Congressional District: |
|
Unique Entity Identifier (UEI): |
|
Parent UEI: |
|
NSF Program(s): |
Special Projects - CNS, TRUSTWORTHY COMPUTING, Secure &Trustworthy Cyberspace |
Primary Program Source: |
01001112DB NSF RESEARCH & RELATED ACTIVIT 01001213DB NSF RESEARCH & RELATED ACTIVIT 01001415DB NSF RESEARCH & RELATED ACTIVIT |
Program Reference Code(s): |
|
Program Element Code(s): |
|
Award Agency Code: | 4900 |
Fund Agency Code: | 4900 |
Assistance Listing Number(s): | 47.070 |
ABSTRACT
Wireless systems have become an inseparable part of our social fabric, which allow users to move around and access the services from different locations while on the move. However, wireless security is often cited as a major technical barrier that must be overcome before widespread adoption of mobile services can occur. Traditional approaches have focused on addressing security threats on a case-by-case basis in an ad-hoc manner as new and specialized threats are uncovered. Furthermore, as wireless networks become increasingly pervasive, the ubiquity of wireless is redefining security challenges (e.g., attacks can be conducted by new and rapidly evolving adversaries with little effort).
This project aims to build location-oriented information into any wireless network stack and serve as a promising new dimension across different layers to complement conventional security solutions and enhance wireless security. A suite of location-enabled techniques are integrated into wireless network stacks as a true partner to cope with attacks and collaboratively defend against adversaries. The solutions are developed generic enough to apply across heterogeneous mixes of wireless technologies through the interaction with industry collaborators.
Project results are expected to assist conventional security methods and advance our knowledge in exploring generic security approaches across a wide-range of wireless technologies, which will contribute significantly to the successful deployment and adoption of emerging wireless services. The project also strengthens the education and research of undergraduate and graduate students in related areas of wireless networks and security, and helps to prepare students to face the challenges of future information technology.
PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH
Note:
When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external
site maintained by the publisher. Some full text articles may not yet be available without a
charge during the embargo (administrative interval).
Some links on this page may take you to non-federal websites. Their policies may differ from
this site.
PROJECT OUTCOMES REPORT
Disclaimer
This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.
This project takes an unique viewpoint of exploring the opportunities for cross-layer solutions that utilize the correlation information inherited from location across network stacks to collaboratively defend against security threats. The key insights of this project are: location should be integrated into any wireless network stack as a true partner to cope with attacks and effectively defend against adversaries, and security solutions that can leverage the knowledge provided by location across different network layers is promising to collaboratively enhance wireless security.
This project results in multiple publications centered around four main areas: (1) detecting attacks involving the claimed identity of a mobile device; (2) localizing attackers while coping with the localization infrastructure threats; and (3) utilizing the knowledge combined from lower layers, e.g., the detection of attacks and localization of adversaries, to provide attack resilient secure access to network resources by coping with access violations.
(1) Due to the shared nature of the wireless medium, attackers can gather useful identity information during passive monitoring and further utilize the identity information to launch identity-based attacks, in particular, the two most harmful but easy to launch attacks: spoo?ng attacks and sybil attacks. Identity-based attacks will have a serious impact to the normal operation of wireless and sensor networks. We take a different approach by using the physical properties associated with wireless transmissions to detect identity-based attacks, as well as localizing the adversaries in wireless and sensor networks. We formulate a generalized attack detection model using statistical signi?cance testing. We then provide theoretical analysis of exploiting the spatial correlation of Received Signal Strength (RSS) inherited from wireless nodes for attack detection.
(2) To ensure the availability of wireless networks, mechanisms are needed for the wireless networks to cope with jamming attacks. Most existing anti-jamming work does not consider the location information of radio interferers and jammers. However, this information can provide important insights for networks to manage its resource in different layers and to defend against radio interference. We examine two jamming models, region-based and signal-to-noise-ratio (SNR) based, to illustrate the underlying principles that govern the state of a node. We develop mechanisms to localize both single jammer as well as multiple jammers. The two main components in our framework, namely automatic network topology partitioner and intelligent multi-jammer localizer, work together to derive different categories of node clusters and achieve high localization accuracy even under overlapping jammed areas.
(3) The usage of wireless devices (e.g., PDAs, smartphones, and laptops) has become an inseparable part of our daily lives, which actively involves in information sharing and various data transactions in ways that previously were not possible. However, to ensure the successful deployment and adoption of these emerging applications, secure communication is crucial to support data transmission confidentiality, data integrity, and device authentication among multiple wireless devices. We examine secure group communication among multiple wireless devices by exploiting physical layer information of radio channel (e.g., Received Signal Strength and Channel State Information) instead of using the traditional cryptographic-based methods. The main advantage of the secret key generation utilizing physical layer information of radio channel is that it allows any two wireless devices within transmission range of each other to extract a shared symmetric cryptographic key while do not require a fixed infrastructure or a secure communication channel. To enable secure group communication, two proto...
Please report errors in award information by writing to: awardsearch@nsf.gov.