- Energy Efficient Wireless Sensor Networks
- Advanced Data Storage Technologies
- Semiconductor materials and devices
- Wireless Networks and Protocols
- Energy Harvesting in Wireless Networks
- Indoor and Outdoor Localization Technologies
- Security and Verification in Computing
- Opportunistic and Delay-Tolerant Networks
- Advanced Malware Detection Techniques
- Advanced Memory and Neural Computing
- Optical Wireless Communication Technologies
- Underwater Vehicles and Communication Systems
- Mobile Ad Hoc Networks
- Security in Wireless Sensor Networks
- Speech and Audio Processing
- IoT Networks and Protocols
- Satellite Communication Systems
- Cryptographic Implementations and Security
- Smart Grid Security and Resilience
- Physical Unclonable Functions (PUFs) and Hardware Security
- Antenna Design and Optimization
- Antenna Design and Analysis
- Digital and Cyber Forensics
- Distributed Sensor Networks and Detection Algorithms
- Network Security and Intrusion Detection
United States Naval Academy
2012-2024
Naval Postgraduate School
2006-2010
Radio tomographic imaging (RTI) has recently been proposed for tracking object location via radio waves without requiring the objects to transmit or receive signals. The position is extracted by inferring which voxels are obstructing a subset of links in dense wireless sensor network. This paper proposes variety modeling and algorithmic improvements RTI scenario roadside surveillance. These include use more physically motivated weight matrix, method mitigating negative (aphysical) data due...
Ransomware is a type of malicious software designed to encrypt user's important data for the purpose extortion, with global annual impact billions dollars in damages. This research proposes side-channel-based ransomware detection method that utilizes microarchitectural side-channel accessed through hardware performance counters. Unlike most research, which relies on virtual machines easily restore system its uncompromised, pre-encrypted state, this work leverages thousands trials collected...
A beamforming approach can be used in a wireless sensor network (WSN) to increase the effective communication range of network. In this paper, impact on array performance node position deviations with respect ideal element locations is examined and distributed algorithm proposed compensate for these deviations. Simulation results are provided demonstrate that solution closely approximates an uniform linear array.
We introduce a hybrid, large-scale wireless sensor network (WSN) for missile defense that consists of terrestrial and satellite nodes. Rather than treating each node as an individual system, we model this system-of-systems with the objective realtime tracking multiple ballistic threats. present hybrid routing algorithm based on combination data centric concepts clustering mechanisms. Through simulation, it is shown performance significantly improves throughput without sacrificing real-time...
Space-based networks have long been proposed to support a myriad of both space-based and terrestrial-based applications. While much research has done on the individual systems that will comprise this network, it was not until recently system examined as whole utilizing tools engineering provide integration optimization. In work, we continue effort by characterizing specific independent associated interfaces allow integration. We analysis availability capacity metrics for network....
Solid-state drives (SSDs) are pervasive in modern computing and have supplanted hard disk many applications. Substantial changes architecture brought about not only improvements speed energy usage but also new security concerns. The presence of proprietary firmware onboard SSD controllers particular raises the possibility that data believed by a user or operating system to be deleted physically remains on drive can thus recovered. This issue has direct application malware detection, digital...
The demand for Solid-State drives (SSDs) has risen as their speed, size, and architecture have improved. SSDs introduce a security risk because they contain separate processor to optimize the SSD's lifespan. lack of transparency operations conducted by this onboard creates challenge users, particularly in digital forensics settings. This paper utilizes non-destructive voltage measurement techniques monitor occurrence read write on an SSD. An automated cross-drive, cross-operating system...
This paper proposes and demonstrates the novel application of a secure wireless sensor network for roadside surveillance vehicular detection using radio tomographic imaging. Network architecture is based on well-established Zigbee standard medium access provided through time division multiple scheme. Wireless security vulnerabilities are considered four-part scheme presented. Field test results to validate both baseline imaging functionality accompanying mechanisms.
Solid State Drives (SSDs) are a form of non-volatile computer memory that have become ubiquitous in the information technology industry, replacing traditional magnetic Hard Disk (HDDs) numerous conventional systems and enabling new applications fields embedded data infrastructure. Compared to HDDs, modern SSDs competitive storage density, faster read write times, lower power consumption, greater impact resistance. However, compared HDD technology, more complex architecture, which...
Solid-state drives (SSDs) have become pervasive in modern computing and are replacing hard disk many applications. However, the mechanism by which SSDs store modify data is intrinsically different from drives. For example, a memory location on SSD must be erased prior to being written. The main contribution of this paper set measurement analysis techniques for inferring behavior observing its power consumption. This measures analyzes energy consumption TRIM command three separate SSDs....
Medium access control for a distributed cooperative wireless sensor network is examined. Using quality-of-service approach, the node traffic (control and data packets) within these networks characterized. A novel medium mechanism, (CWS-MAC), proposed to meet requirements of classes. CWS-MAC couples high throughput TDMA scheme with unique cross-layer, flow-based priority mechanism that enforced across nodes. Design parameters are investigated an implementation strategy presented. Performance...
The energy efficiency trade-offs available between centralized and distributed solutions in unattended wireless sensor network deployments such as those that support remote battlefield monitoring remain an open research question. In this paper, we compare the relative of these two approaches multi-hop networks. We develop a framework includes both total per node expressions apply it to beamforming class using Mica2, MicaZ latest generation Telos motes. A performance threshold is shown exist...
Modern embedded devices are getting cheaper, easier to produce, and smarter. These smarter able store process data locally at a scale that would have been infeasible until recent years. Functions used be performed on more powerful, dedicated systems servers with security features now being pushed these unsecured commercial devices. In the Internet of Things (IoT) space, this problem is manifesting itself almost daily reports compromise network-connected systems. While IoT device insecurity...
In this paper, we formally introduce the novel concept of traffic-adaptive, flow-specific medium access control and show that it outperforms contention, non-contention hybrid schemes. A mechanism is proposed utilizes queue size statistics to select between modes. general model for developed shown as well traditional contention-based schemes can be seen special cases more access. The applied Cooperative Wireless Sensor Network Medium Access Control (CWS-MAC) provide representative simulation results.
Prior work in modeling the satellite-based detection and tracking components of ballistic missile defense system as a large-scale, wireless sensor network relies on medium access scheme that can accommodate large propagation delays encountered these networked satellite systems. While existing systems typically employ form time division multiple access, recent efforts have begun to explore contention-based approaches. In this work, we quantify effect both contention-free solutions propose...
In this paper, we propose and implement a novel covert channel for wireless networks employing the IEEE 802.11 standard. This timing-based trades off data rate to provide that is detectable only at physical layer (layer 1) compatible with all off-the-shelf versions of current Information embedded in interarrival times probe request frames or beacon rates excess 50 bps observed symbol error less than 2% 6.25% controlled environment uncontrolled respectively.
With the increasing demand for faster reliable secondary storage, Solid State Drives (SSDs) have provided a viable replacement Hard Disk (HDDs). SSDs contain NAND flash memory components and processor that executes firmware at device level to optimize performance. The on-board handle operations such as garbage collection encryption with no visibility user. Therefore, classifying SSD internal behavior can help identify compromised devices. This paper utilizes high precision measurements of...
Solid state drives (SSDs) are coming under increased scrutiny as their popularity continues to grow.SSDs differ from hard disk drive predecessors because they include an onboard layer of firmware perform required maintenance tasks related data location mapping, write performance, and lifetime management.This is transparent the user can be difficult characterize despite its clear potential impact behavior.Flaws vulnerabilities in this have become increasingly common.In work, we propose...
Distributed radar systems are a subset of distributed sensor networks. They classified as system due to the processing done at each and by network whole. The potential signal-to-noise (SNR) gains proportional N/sup 2/, where N is number sensors in network. This dependant on an assumption that transmitters receivers synchronized; this paper investigates assumption. focus work frequency, phase, pulse synchronization pulses they interact target. Feedback discussed means maintaining...
Slotted ALOHA is one of the earliest proposed contention-based medium access solutions for wireless networks and it remains a common approach in literature. In this paper, we present throughput delay performance analysis slotted system with periodic server vacations. By this, mean that service governed by fixed cycle composed alternating active inactive periods, representative an energy-efficient solution implements sleep cycles. To our knowledge, ours first work to fully develop analysis.
In this paper, we present a novel energy consumption analysis of the flow-specific Cooperative Wireless Sensor Network Medium Access Control (CWS-MAC) protocol utilizing nine-state radio model that includes both steady state and transient behavior. CWS-MAC is traffic-adaptive, energy-efficient medium access scheme has been shown in literature to outperform traditional contention non-contention-based approaches by providing service on per flow basis. We also formally define quantitatively...