Award Abstract # 2144669
CAREER: Towards Secure and Usable IoT Authentication Under Constraints

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: UNIVERSITY OF SOUTH CAROLINA
Initial Amendment Date: December 14, 2021
Latest Amendment Date: December 14, 2021
Award Number: 2144669
Award Instrument: Continuing Grant
Program Manager: Jeremy Epstein
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: June 1, 2022
End Date: February 28, 2023 (Estimated)
Total Intended Award Amount: $545,666.00
Total Awarded Amount to Date: $106,684.00
Funds Obligated to Date: FY 2022 = $14,427.00
History of Investigator:
  • Qiang Zeng (Principal Investigator)
    zeng@gmu.edu
Recipient Sponsored Research Office: University of South Carolina at Columbia
1600 HAMPTON ST
COLUMBIA
SC  US  29208-3403
(803)777-7093
Sponsor Congressional District: 06
Primary Place of Performance: University of South Carolina at Columbia
SC  US  29208-0001
Primary Place of Performance
Congressional District:
06
Unique Entity Identifier (UEI): J22LNTMEDP73
Parent UEI: Q93ZDA59ZAR5
NSF Program(s): Secure &Trustworthy Cyberspace
Primary Program Source: 01002223DB NSF RESEARCH & RELATED ACTIVIT
01002324DB NSF RESEARCH & RELATED ACTIVIT

01002425DB NSF RESEARCH & RELATED ACTIVIT

01002526DB NSF RESEARCH & RELATED ACTIVIT

01002627DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 025Z, 1045, 9150
Program Element Code(s): 806000
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

The booming development of Internet of Things (IoT) makes ever-growing impacts on various industries and daily lives. IoT authentication, which authenticates the legitimacy of a user and/or an IoT device, is among the most fundamental and critical IoT security problems. Existing approaches often suffer from insecurity (e.g., Bluetooth based proximity proving can be exploited by wireless attacks) or poor usability (e.g., requiring user interfaces or sensors unavailable on most IoT devices). The research advances secure and usable IoT authentication under constraints. Unlike many prior works that build authentication on proximity, which can be exploited by wireless attacks, the project's novelty is based on physical operations that cannot be spoofed by an attacker. The project's broader significance and importance are as follows. 1) The research can help people in rural areas or with disabilities have equal rights of access to modern techniques, such as drone delivery, without relying on special user-side hardware. 2) The research can make IoT pairing and authentication much easier and more secure, and the results have wide applications to smart health, forensics, and continuous security monitoring. 3) The PI will conduct outreach and educational activities that aim to increase awareness of cybersecurity in the K-12 community and broaden the participation of students from underrepresented groups.


The project seeks to improve IoT authentication and deliver novel approaches, algorithms, techniques, and systems through the following thrusts. Thrust 1: Authentication for UI-Constrained Devices. A protocol that supports mutual authentication, over an insecure wireless channel, to establish trust between a UI-constrained device and the user to support authentication for heterogeneous IoT devices. Thrust 2: Authentication for Distance-Constrained Devices. A highly usable approach enables secure authentication between an IoT device and the user even when they are multiple meters apart, which has applications ranging from drone delivery to ride sharing. Thrust 3: Authentication for Operation-Constrained Devices. For traditional objects retrofitted with zero-UI sensor nodes, AI-assisted implicit authentication enables recognizing a user without requiring any explicit authentication operations. In sum, the research seeks to substantially advance IoT authentication and foster a variety of IoT applications.

This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

Fu, Chenglong and Zeng, Qiang and Chi, Haotian and Du, Xiaojiang and Valluru, Siva Likitha "IoT Phantom-Delay Attacks: Demystifying and Exploiting IoT Timeout Behaviors" 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) , 2022 https://doi.org/10.1109/DSN53405.2022.00050 Citation Details
Sharp, Jonathan and Wu, Chuxiong and Zeng, Qiang "Authentication for drone delivery through a novel way of using face biometrics" the 28th Annual International Conference on Mobile Computing And Networking , 2022 https://doi.org/10.1145/3495243.3560550 Citation Details
Wu, Chuxiong and Li, Xiaopeng and Luo, Lannan and Zeng, Qiang "G2Auth: secure mutual authentication for drone delivery without special user-side hardware" Proceedings of the 20th Annual International Conference on Mobile Systems, Applications and Services , 2022 https://doi.org/10.1145/3498361.3538941 Citation Details
Wu, Chuxiong and Li, Xiaopeng and Zuo, Fei and Luo, Lannan and Du, Xiaojiang and Di, Jia and Zeng, Qiang "Use It-No Need to Shake It!: Accurate Implicit Authentication for Everyday Objects with Smart Sensing" Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies , v.6 , 2022 https://doi.org/10.1145/3550322 Citation Details
Wu, Chuxiong and Zeng, Qiang "Turning Noises to Fingerprint-Free Credentials: Secure and Usable Drone Authentication" IEEE Transactions on Mobile Computing , 2024 https://doi.org/10.1109/TMC.2024.3373503 Citation Details

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page