
NSF Org: |
CNS Division Of Computer and Network Systems |
Recipient: |
|
Initial Amendment Date: | June 20, 2014 |
Latest Amendment Date: | June 20, 2014 |
Award Number: | 1421933 |
Award Instrument: | Standard Grant |
Program Manager: |
Thyagarajan Nandagopal
CNS Division Of Computer and Network Systems CSE Directorate for Computer and Information Science and Engineering |
Start Date: | July 1, 2014 |
End Date: | December 31, 2017 (Estimated) |
Total Intended Award Amount: | $245,581.00 |
Total Awarded Amount to Date: | $245,581.00 |
Funds Obligated to Date: |
|
History of Investigator: |
|
Recipient Sponsored Research Office: |
1960 KENNY RD COLUMBUS OH US 43210-1016 (614)688-8735 |
Sponsor Congressional District: |
|
Primary Place of Performance: |
2015 Neil Ave Columbus OH US 43210-1277 |
Primary Place of
Performance Congressional District: |
|
Unique Entity Identifier (UEI): |
|
Parent UEI: |
|
NSF Program(s): | Secure &Trustworthy Cyberspace |
Primary Program Source: |
|
Program Reference Code(s): |
|
Program Element Code(s): |
|
Award Agency Code: | 4900 |
Fund Agency Code: | 4900 |
Assistance Listing Number(s): | 47.070 |
ABSTRACT
Wireless cellular networks serve as an essential cyber-infrastructure for mobile users. Unlike the Internet, cellular networks have adopted usage-based charging, rather than the simpler flat-rate charging. Data-plan subscribers have to pay their data bills based on the consumed traffic volume in 3G/4G networks. Although this metered charging system has been operational and generally successful for years, the security study of such a system remains largely unaddressed. The objective of this research is to investigate the insecurity aspects of large-scale cellular network infrastructures, identify their security loopholes, sketch novel attacks that exploit such loopholes, devise defenses that protect from such attacks, and validate the attacks and the defenses via real experiments in operational carriers. The proposed study helps us to better understand how various forms of vulnerabilities exhibit in the cellular system, open new venue for secure system design and operations, and refine the networking design that makes both the infrastructure and the user devices more resilient against malicious threats.
By addressing the key security issues of mobile data charging, the proposed research helps to protect the multi-trillion dollar network operations. It not only secures revenues of global cellular operators, but also protects the monetary rights of billions of mobile users. The proposed solutions will help to renovate the existing network infrastructure, and shape the upcoming 5G cellular technology in its standardization. It will also train a new generation of engineers and students in this field. The PIs will interact closely with industry for possible technology transfer.
PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH
Note:
When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external
site maintained by the publisher. Some full text articles may not yet be available without a
charge during the embargo (administrative interval).
Some links on this page may take you to non-federal websites. Their policies may differ from
this site.
Please report errors in award information by writing to: awardsearch@nsf.gov.