
NSF Org: |
CNS Division Of Computer and Network Systems |
Recipient: |
|
Initial Amendment Date: | April 15, 2022 |
Latest Amendment Date: | May 29, 2024 |
Award Number: | 2148132 |
Award Instrument: | Continuing Grant |
Program Manager: |
Phillip Regalia
pregalia@nsf.gov (703)292-2981 CNS Division Of Computer and Network Systems CSE Directorate for Computer and Information Science and Engineering |
Start Date: | May 1, 2022 |
End Date: | April 30, 2025 (Estimated) |
Total Intended Award Amount: | $1,000,000.00 |
Total Awarded Amount to Date: | $1,000,000.00 |
Funds Obligated to Date: |
FY 2024 = $332,470.00 |
History of Investigator: |
|
Recipient Sponsored Research Office: |
77 MASSACHUSETTS AVE CAMBRIDGE MA US 02139-4301 (617)253-1000 |
Sponsor Congressional District: |
|
Primary Place of Performance: |
77 Massachusetts Avenue Cambridge MA US 02139-4307 |
Primary Place of
Performance Congressional District: |
|
Unique Entity Identifier (UEI): |
|
Parent UEI: |
|
NSF Program(s): |
Special Projects - CNS, NextG Network Research |
Primary Program Source: |
4082PYXXDB NSF TRUST FUND 01002324DB NSF RESEARCH & RELATED ACTIVIT 01002223DB NSF RESEARCH & RELATED ACTIVIT |
Program Reference Code(s): |
|
Program Element Code(s): |
|
Award Agency Code: | 4900 |
Fund Agency Code: | 4900 |
Assistance Listing Number(s): | 47.070 |
ABSTRACT
New generations of wireless networks aim to provide responsive, ubiquitous service in a way that is reliable and secure. Currently underutilized parts of the spectrum, at very high frequencies, can provide massive bandwidth, and new possibilities for services that require high responsiveness, such as self-driving cars or augmented/virtual reality (AR/VR). Such services are, in addition, critical and sensitive, requiring thus high security. Traditional approaches to ensuring security exploit cryptographic approaches that can add non-negligible delay because of their complexity; some are even being steadily undermined by the fast progress of quantum computing. The existing security techniques that are post-quantum secure are even slower and more onerous, rendering them less attractive for delay-critical applications. This project addresses these challenges in an integrated way by making active and synergistic use of the characteristics of operating at very high frequencies and of recent mathematical developments in systems that remain secure under quantum computing attacks. The approach also offers low complexity and is therefore compatible with low-delay, highly responsive system requirements.
At high frequencies, the location of an eavesdropper deeply affects their ability to listen in on private communications when the appropriate hardware, namely antennas, are used. With the right antennas, a legitimate receiver can be given an edge, even a slight one, over the eavesdropper and that edge can be turned into a key advantage through mathematical transformations. The approach relies on mathematically pre-processing data in such a way that an eavesdropping intercepting part of the communication cannot recover the missing data, unless 100% of it is available, thus thwarting the effort. Furthermore, wireless communications are often subjected to noise and interference, ranging from a microwave oven to a neighboring user's activity. In order to combat those effects, the data encoding mechanism must be robust, while still maintaining security. Very new developments in techniques for combatting noise lend themselves well to work with the sort of security approaches to be developed in this project. The outcomes of this project will be high speed, low delay, cost-effective, energy efficient communications that can remain secure even to sophisticated, powerful attackers.
This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.
PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH
Note:
When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external
site maintained by the publisher. Some full text articles may not yet be available without a
charge during the embargo (administrative interval).
Some links on this page may take you to non-federal websites. Their policies may differ from
this site.
Please report errors in award information by writing to: awardsearch@nsf.gov.