Award Abstract # 0644238
CAREER: Practical Scheme Design for Supporting Secure and Resilient Resource-Constrained Wireless Networks

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: IOWA STATE UNIVERSITY OF SCIENCE AND TECHNOLOGY
Initial Amendment Date: December 21, 2006
Latest Amendment Date: May 31, 2011
Award Number: 0644238
Award Instrument: Continuing Grant
Program Manager: Nina Amla
namla@nsf.gov
 (703)292-7991
CNS
 Division Of Computer and Network Systems
CSE
 Direct For Computer & Info Scie & Enginr
Start Date: January 1, 2007
End Date: December 31, 2013 (Estimated)
Total Intended Award Amount: $320,000.00
Total Awarded Amount to Date: $447,000.00
Funds Obligated to Date: FY 2007 = $80,000.00
FY 2008 = $115,000.00

FY 2009 = $172,000.00

FY 2011 = $80,000.00
History of Investigator:
  • Yong Guan (Principal Investigator)
    yguan@iastate.edu
Recipient Sponsored Research Office: Iowa State University
1350 BEARDSHEAR HALL
AMES
IA  US  50011-2103
(515)294-5225
Sponsor Congressional District: 04
Primary Place of Performance: Iowa State University
1350 BEARDSHEAR HALL
AMES
IA  US  50011-2103
Primary Place of Performance
Congressional District:
04
Unique Entity Identifier (UEI): DQDBM7FGJPC5
Parent UEI:
NSF Program(s): ADVANCED NET INFRA & RSCH,
CYBER TRUST,
TRUSTWORTHY COMPUTING
Primary Program Source: 0100999999 NSF RESEARCH & RELATED ACTIVIT
01000809DB NSF RESEARCH & RELATED ACTIVIT

01000809RB NSF RESEARCH & RELATED ACTIVIT

01000910DB NSF RESEARCH & RELATED ACTIVIT

01001112DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 1045, 7363, 9178, 9218, 9251, HPCC
Program Element Code(s): 4090, 7371, 7795, H284
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

A wide range of resource-constrained wireless networks including wireless sensor networks have shown considerable promise in bringing many envisioned applications and services to reality, such as healthcare, search and rescue operations, watch-my-child/aging-parent, power grid control and operations, battlefield surveillance, etc. However, due to the nature of their resource-constrained design and ways of being deployed and used, they are vulnerable to attacks. The failure of these applications may cause catastrophic damage or unwanted impacts that affect public safety, personal privacy, homeland security, the economy and society. The objective of this project is to develop methodologies for providing practical solutions in support of secure and resilient data-centric applications and services for resource-constrained wireless networks. The project will focus on addressing fundamental security and resilience problems and challenging issues due to the resource-constrained device design and the complicated situations brought by the use of network coding techniques. The proposed research will provide efficient, provably secure, and resilient solutions for filtering false data reports, localization verification, and dynamic sensor revoking and re-tasking. This project has immediate and significant impacts. The developed solutions can serve as an important foundation to effectively provide secure and resilient support for data-centric applications and services. Integrated educational activities are another important part of this proposal and will expose a large number of students at various levels and the general public to this new knowledge. Accordingly, this project benefits society in a variety of meaningful ways.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

Chunwang Gao, Zhen Yu, Yawen Wei, Steve Russell, and Yong Guan "A Statistical Indoor Localization Method for Supporting Location-based Access Control,? ACM/Springer Mobile Networks and Applications (MONET), Accepted to appear." ACM/Springer Mobile Networks and Applications (MONET) , 2009

PROJECT OUTCOMES REPORT

Disclaimer

This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.

The objective of our research is to develop a suite of security schemes and toolkits for resource-constrained wireless networks.

Recent advances in wireless communications and electronics have enabled the development of low-cost, low-power, multi-functional wireless devices, and the deployment of a wide range of wireless networks using them for real-world applications. These have revolutionized the way people work and live, and have already shown promise in bringing many envisioned applications and services to reality, such as healthcare, search and rescue operations, watch-my-child/aging-parent, battlefield surveillance, power grid operations, real-time monitoring environmental changes, seismic activity, wild fire disaster, structural integrity of buildings, semiconductor fabrication processes, etc. However, due to the nature of their resource-constrained design and ways and environments of being used, they are vulnerable to attacks and failures. The failure of these networks and applications may cause catastrophic damage or unwanted consequences with impacts affecting public safety, homeland security, personal privacy, economy and the society at large.

In this project, we have developed several important theoretical foundation and practical solutions. The results include lightweight authentication protocol, pairwise key pre-distribution scheme, dynamic en-route false data filtering scheme, secure localization, location verification, secure network coding schemes against passive and active attacks, mutual authentication and ownership transfer protocols for low-cost RFID systems, time-advantage-based pairing protocols, and several algorithmic designs for distributed network monitoring on key network statistics and dynamics. These research results have been published in networking and security conferences and journals such as INFOCOM, ICDCS, MONETS, SECURECOMM, IPSN, CNS, Globecomm, IEEE TPDS, IEEE ToN, etc.

Several of these results and other educational efforts were invited to be presented to industry collaborators and at forums open to the general public. The PI has involved minority and female students in the research and education efforts of this project and trained more than 20 graduate and undergraduate students during the last six years. Also, several results have been developed and integrated into the course teaching at Iowa State. 


Last Modified: 05/02/2014
Modified by: Yong Guan