NSF Org: |
CNS Division Of Computer and Network Systems |
Recipient: |
|
Initial Amendment Date: | December 21, 2006 |
Latest Amendment Date: | May 31, 2011 |
Award Number: | 0644238 |
Award Instrument: | Continuing Grant |
Program Manager: |
Nina Amla
namla@nsf.gov (703)292-7991 CNS Division Of Computer and Network Systems CSE Direct For Computer & Info Scie & Enginr |
Start Date: | January 1, 2007 |
End Date: | December 31, 2013 (Estimated) |
Total Intended Award Amount: | $320,000.00 |
Total Awarded Amount to Date: | $447,000.00 |
Funds Obligated to Date: |
FY 2008 = $115,000.00 FY 2009 = $172,000.00 FY 2011 = $80,000.00 |
History of Investigator: |
|
Recipient Sponsored Research Office: |
1350 BEARDSHEAR HALL AMES IA US 50011-2103 (515)294-5225 |
Sponsor Congressional District: |
|
Primary Place of Performance: |
1350 BEARDSHEAR HALL AMES IA US 50011-2103 |
Primary Place of Performance Congressional District: |
|
Unique Entity Identifier (UEI): |
|
Parent UEI: |
|
NSF Program(s): |
ADVANCED NET INFRA & RSCH, CYBER TRUST, TRUSTWORTHY COMPUTING |
Primary Program Source: |
01000809DB NSF RESEARCH & RELATED ACTIVIT 01000809RB NSF RESEARCH & RELATED ACTIVIT 01000910DB NSF RESEARCH & RELATED ACTIVIT 01001112DB NSF RESEARCH & RELATED ACTIVIT |
Program Reference Code(s): |
|
Program Element Code(s): |
|
Award Agency Code: | 4900 |
Fund Agency Code: | 4900 |
Assistance Listing Number(s): | 47.070 |
ABSTRACT
A wide range of resource-constrained wireless networks including wireless sensor networks have shown considerable promise in bringing many envisioned applications and services to reality, such as healthcare, search and rescue operations, watch-my-child/aging-parent, power grid control and operations, battlefield surveillance, etc. However, due to the nature of their resource-constrained design and ways of being deployed and used, they are vulnerable to attacks. The failure of these applications may cause catastrophic damage or unwanted impacts that affect public safety, personal privacy, homeland security, the economy and society. The objective of this project is to develop methodologies for providing practical solutions in support of secure and resilient data-centric applications and services for resource-constrained wireless networks. The project will focus on addressing fundamental security and resilience problems and challenging issues due to the resource-constrained device design and the complicated situations brought by the use of network coding techniques. The proposed research will provide efficient, provably secure, and resilient solutions for filtering false data reports, localization verification, and dynamic sensor revoking and re-tasking. This project has immediate and significant impacts. The developed solutions can serve as an important foundation to effectively provide secure and resilient support for data-centric applications and services. Integrated educational activities are another important part of this proposal and will expose a large number of students at various levels and the general public to this new knowledge. Accordingly, this project benefits society in a variety of meaningful ways.
PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH
Note:
When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
PROJECT OUTCOMES REPORT
Disclaimer
This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.
The objective of our research is to develop a suite of security schemes and toolkits for resource-constrained wireless networks.
Recent advances in wireless communications and electronics have enabled the development of low-cost, low-power, multi-functional wireless devices, and the deployment of a wide range of wireless networks using them for real-world applications. These have revolutionized the way people work and live, and have already shown promise in bringing many envisioned applications and services to reality, such as healthcare, search and rescue operations, watch-my-child/aging-parent, battlefield surveillance, power grid operations, real-time monitoring environmental changes, seismic activity, wild fire disaster, structural integrity of buildings, semiconductor fabrication processes, etc. However, due to the nature of their resource-constrained design and ways and environments of being used, they are vulnerable to attacks and failures. The failure of these networks and applications may cause catastrophic damage or unwanted consequences with impacts affecting public safety, homeland security, personal privacy, economy and the society at large.
In this project, we have developed several important theoretical foundation and practical solutions. The results include lightweight authentication protocol, pairwise key pre-distribution scheme, dynamic en-route false data filtering scheme, secure localization, location verification, secure network coding schemes against passive and active attacks, mutual authentication and ownership transfer protocols for low-cost RFID systems, time-advantage-based pairing protocols, and several algorithmic designs for distributed network monitoring on key network statistics and dynamics. These research results have been published in networking and security conferences and journals such as INFOCOM, ICDCS, MONETS, SECURECOMM, IPSN, CNS, Globecomm, IEEE TPDS, IEEE ToN, etc.
Several of these results and other educational efforts were invited to be presented to industry collaborators and at forums open to the general public. The PI has involved minority and female students in the research and education efforts of this project and trained more than 20 graduate and undergraduate students during the last six years. Also, several results have been developed and integrated into the course teaching at Iowa State.
Last Modified: 05/02/2014
Modified by: Yong Guan