Award Abstract # 1228847
TTP: Medium: Securing the Wireless Philadelphia Network

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: DREXEL UNIVERSITY
Initial Amendment Date: August 28, 2012
Latest Amendment Date: August 28, 2012
Award Number: 1228847
Award Instrument: Standard Grant
Program Manager: Kevin Thompson
kthompso@nsf.gov
 (703)292-4220
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: September 1, 2012
End Date: August 31, 2018 (Estimated)
Total Intended Award Amount: $1,080,445.00
Total Awarded Amount to Date: $1,080,445.00
Funds Obligated to Date: FY 2012 = $1,080,445.00
History of Investigator:
  • Steven Weber (Principal Investigator)
    sweber@ece.drexel.edu
  • Spiros Mancoridis (Co-Principal Investigator)
  • Harish Sethu (Co-Principal Investigator)
  • Kapil Dandekar (Co-Principal Investigator)
Recipient Sponsored Research Office: Drexel University
3141 CHESTNUT ST
PHILADELPHIA
PA  US  19104-2875
(215)895-6342
Sponsor Congressional District: 03
Primary Place of Performance: Drexel University
3141 Chestnut St.
Philadelphia
PA  US  19104-2816
Primary Place of Performance
Congressional District:
03
Unique Entity Identifier (UEI): XF3XM9642N96
Parent UEI:
NSF Program(s): Secure &Trustworthy Cyberspace
Primary Program Source: 01001213DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 7434, 7924
Program Element Code(s): 806000
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

The Wireless Philadelphia Network (WPN) is a metropolitan?area network (MAN) consisting of thousands of Tropos 5210 wireless mesh routers distributed across the entire city of Philadelphia and connected by a fiber backbone. This project is employing this network as a testbed to investigate three diverse security challenges facing any large-scale wireless network servicing a heterogeneous population. The first challenge is in efficient network anomaly detection algorithms, and the proposed solution is to investigate the efficacy of both compressive sampling and distributed source coding based approaches in reducing the amount of data that must be transmitted to the anomaly detector. The second challenge is physical layer security in wireless networks, and the proposed solution is to use physical layer based encryption algorithms and user authentication. The third challenge is anomaly detection at the application layer, in particular for web servers, and the proposed solution is to develop software sensors on the hardware, operating system, virtual machine, and application server, and develop rules for identifying possible anomalies using these metrics. Besides the intellectual merit of these challenges, the project has several broader impacts. First, low-income residents gain Internet access through integration with the Freedom Rings Partnership. Second, students participate in community service based engineering design projects. Finally, curricular enhancements and the recruitment of women and minority graduate students improve the educational and diversity missions at our university.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

(Showing: 1 - 10 of 26)
Bradford D. Boyle, Steven Weber "Primal-dual characterizations of jointly optimal transmission rate and scheme for distributed sources" Data Compression Conference , 2014
Brandon Z. Katz, Cem Sahin and Kapil R. Dandekar "Real-time wireless physical layer encryption" IEEE 17th Annual Wireless and Microwave Technology Conference , 2016
Brandon Z. Katz; Cem Sahin; Kapil R. Dandekar "Real-time wireless physical layer encryption" Proceedings of the IEEE Annual Wireless and Microwave Technology Conference , 2016
B. Z. Katz, C. Sahin, and K. R. Dandekar "Real-time wireless physical layer encryption" 2016 IEEE 17th Annual Wireless and Microwave Technology Conference (WAMICON) , 2016
Cem Sahin, Brandon Katz, Kapil R. Dandekar "Secure and robust symmetric key generation using physical layer techniques under various wireless environments" IEEE Radio and Wireless Symposium (RWS) , 2016
Cem Sahin; Brandon Katz; Kapil R. Dandekar "Secure and robust symmetric key generation using physical layer techniques under various wireless environments" Proceedings of the IEEE Radio and Wireless Symposium , 2016 978-1-4673-9806-0
Chacko, James and Juretus, Kyle and Jacovic, Marko and Sahin, Cem and Kandasamy, Nagarajan and Savidis, Ioannis and Dandekar, Kapil R. "Securing Wireless Communication via Hardware-Based Packet Obfuscation" Journal of Hardware and Systems Security , 2019 10.1007/s41635-019-00070-0 Citation Details
James Chacko, Kyle Juretus, Marko Jacovic, Cem Sahin, Nagarajan Kandasamy, Ioannis Savidis, Kapil Dandekar "Physical gate based preamble obfuscation for securing wireless communication" Proceedings of IEEE 2017 International Conference on Computing , 2017
James Chacko; Kyle Juretus ; Marko Jacovic ; Cem Sahin ; Nagarajan Kandasamy ; Ioannis Savidis ; Kapil Dandekar "Physical gate based preamble obfuscation for securing wireless communication" Proceedings of IEEE 2017 International Conference on Computing, Networking and Communications , 2017
Katz, Brandon Z. and Sahin, Cem and Dandekar, Kapil R. "Real-time wireless physical layer encryption" 2016 IEEE 17th Annual Wireless and Microwave Technology Conference (WAMICON) , 2016 https://doi.org/10.1109/WAMICON.2016.7483851 Citation Details
Nguyen, Danh and Sahin, Cem and Shishkin, Boris and Kandasamy, Nagarajan and Dandekar, Kapil R. "A real-time and protocol-aware reactive jamming framework built on software-defined radios" SRIF 2014 - Proceedings of the ACM SIGCOMM 2014 Workshop on Software Radio Implementation Forum , 2014 https://doi.org/10.1145/2627788.2627798 Citation Details
(Showing: 1 - 10 of 26)

PROJECT OUTCOMES REPORT

Disclaimer

This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.

This project mainly investigated three aspects of network security: i) state measurement and aggregation techniques for local network anomaly detection; ii) physical layer security for wireless network; iii) web server anomaly detection for civic services.

 
In the aspect of state measurement and aggregation techniques for local network anomaly detection, we proposed and evaluated an anomaly detection algorithm using compressed signals and a distance-based subspace anomaly detector. In addition, we implemented two distributed anomaly detection algorithms based on principal component analysis and analyzed the tradeoff between communication cost incurred by the distributed algorithm and the anomaly detection accuracy. We also analyzed the influence of training sample size on the anomaly detection accuracy and derived upper bound on the accuracy of the subspace obtained by the training data and an approximation to the anomaly detection error rate. We studied the problem of detecting denial-of-service attacks in wireless networks based on log-likelihood ratio test using Markov chain modeling. Finally, with respect to the problem of optimal transmission of distributed correlated discrete memoryless sources across a network with capacity constraints, we showed important structural properties of the polytope of feasible solutions, and investigated primal-dual based algorithms for finding the optimal solution. Next, we developed a comprehensive understanding of the set of feasible rates for the sensor encoders and how the network capacity constraints impact the feasibility of the vertices of the Slepian-Wolf rate region. We demonstrated a connection between conditional independence relationships amongst the sensors and the complexity of the optimization problem. We have shown that a decomposed/layered approach to solving the posed optimization problem, in general, leads to a suboptimal solution.

In the aspect of physical layer security for wireless network, we obtained significant results confirming that channel state information is a suitable source for physical layer security schemes leveraging reconfigurable antennas. Furthermore, we designed a practical sampling technique based on timer-based interrupts for implementing real-time wireless physical layer encryption techniques on standards-compliant devices. Finally, we invented a preamble-obfuscation technique for securing wireless devices from sophisticated cyber-attacks. 


In the aspect of web server anomaly detection for civic services, we designed an online automatic malware detection and classification system. Using the extracted features from live process-level system calls obtained by various sensors deployed on production hosts, the “quickest change” data fusion center can detect malware infection as quickly as possible. In addition, we evaluated the effectiveness of three machine learning based algorithms in detecting malware infections using system-call features. For malware classification, we evaluated our proposed malware classification system’s performance on data collected from production environments and experimentally identify the feature extraction, detection, and classification techniques that achieved high detection accuracy with low cost.

 


Last Modified: 10/09/2018
Modified by: Steven Weber

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page