Skip to feedback

Award Abstract # 1143602
EAGER: Exploring the Security Capabilities of Physical Layer Network Coding

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: UNIVERSITY OF NORTH CAROLINA AT CHARLOTTE
Initial Amendment Date: August 8, 2011
Latest Amendment Date: August 8, 2011
Award Number: 1143602
Award Instrument: Standard Grant
Program Manager: Jeremy Epstein
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: September 1, 2011
End Date: August 31, 2014 (Estimated)
Total Intended Award Amount: $199,568.00
Total Awarded Amount to Date: $199,568.00
Funds Obligated to Date: FY 2011 = $199,568.00
History of Investigator:
  • Weichao Wang (Principal Investigator)
    wwang22@uncc.edu
Recipient Sponsored Research Office: University of North Carolina at Charlotte
9201 UNIVERSITY CITY BLVD
CHARLOTTE
NC  US  28223-0001
(704)687-1888
Sponsor Congressional District: 12
Primary Place of Performance: University of North Carolina at Charlotte
9201 University City Blvd
Charlotte
NC  US  28223-0001
Primary Place of Performance
Congressional District:
12
Unique Entity Identifier (UEI): JB33DT84JNA5
Parent UEI: NEYCH3CVBTR6
NSF Program(s): TRUSTWORTHY COMPUTING
Primary Program Source: 01001112DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 7795, 7916
Program Element Code(s): 779500
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

As the use of mobile, wireless computing devices continues to grow, so does concern with assuring that communications within these wireless networks is not vulnerable to various kinds of attacks. Physical-layer Network Coding (PNC) was developed as a means for improving communication in wireless networks. This project will conduct exploratory research to determine whether and how the use of PNC can be exploited to detect attacks. The work is organized into three tasks. The first task will identify capabilities to detect attacks and design corresponding mechanisms for differing network infrastructures and attacker models. Signal strength attacks, Sybil attacks, and wormhole attacks will be the initial targets of study. The second task will study the detection accuracy of the proposed mechanisms and explore more complex network scenarios. The third task will develop simulations to model the attack detection mechanisms.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

Xiongwei Xie and Weichao Wang "Detecting Primary User Emulation Attacks in Cognitive Radio Networks via Physical Layer Network Coding" International Journal of Ubiquitous Systems and Pervasive Networks (JUSPN) , v.5 , 2014 , p.1
Zhiwei Li and Weichao Wang "Node localization through physical layer network coding: Bootstrap, security, and accuracy" Ad Hoc Networks , v.10 , 2012 , p.1267-1277
Zhiwei Li and Weichao Wang "Node Localization through Physical Layer Network Coding: Bootstrap, Security, and Accuracy" Elsevier Ad Hoc Networks , v.10 , 2012 , p.1267 http://dx.doi.org/10.1016/j.adhoc.2012.04.001
Zhiwei Li, Di Pu, Weichao Wang, and Alex Wyglinski "Forced Collision: Detecting Wormhole Attacks with Physical Layer Network Coding" Elsevier Tsinghua Science and Technology, special issue on Wireless Mobile Computing and Networking , v.16 , 2011 , p.505 http://dx.doi.org/10.1016/S1007-0214(11)70069-4

PROJECT OUTCOMES REPORT

Disclaimer

This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.

The overall research goal of this project is as follows: we seek to explore and deeply understand the security capabilities of the physical layer network coding (PNC) technique in wireless networks, build new attack detection mechanisms upon the gained insights of PNC, and evaluate the approaches through both theoretical analysis and simulation.

 

In wireless networks, bandwidth is considered one of the most scarce and valuable resources. The PNC technique has been proposed to greatly improve the bandwidth usage efficiency. However, very little research has been conducted to study its security capabilities.

 

In this project, we investigate the problem from a new perspective and create new solutions that are different from existing approaches. Instead of trying to protect network coding results from pollution attacks, we seek to explore whether or not the PNC technique can be used to detect attacks on wireless networks. Specifically, our research: (1) identifies the properties of PNC that can be used for attack detection; creates the design of the detection mechanisms under different network structures and attacker models; (2) identifies and overcomes the difficulties of turning the design into practical solutions in real networks; and (3) evaluates the approaches through both theoretical analysis and simulation.

 

The proposed research leads to the design of innovative detection mechanisms of multiple types of malicious attacks on wireless networks including: Sybil attacks, primary user emulation attacks, wormhole attacks, and sender authentication. The proposed research can also be used to achieve accurate localization in wireless networks.

 

From student training side, three PhD students and one Master’s student benefit from the project in thesis topic selection, innovative research, problem solving, and academic writing. The students are rooted in either EE or CS major which shows the interdisciplinary nature of the project. These students published three journal papers, three conference papers, and one poster during the project duration.

 

From the education side, the PI designed new educational modules on physical layer security in wireless networks. These modules have been integrated into both graduate level and undergraduate level security courses. More than ten presentations and invited talks have been given by the research team to promote and disseminate the research achievements.

 

The general public could also benefit from the research achievements of the project. Wide adoption of the PNC technique will help address the bandwidth deficiency issue and enable the development and deployment of new bandwidth-hungry mobile applications in the fields of entertainment, public safety, and interactive education. Therefore, a large number of end users could benefit from our research results.   


Last Modified: 11/24/2014
Modified by: Weichao Wang