- Security in Wireless Sensor Networks
- Network Security and Intrusion Detection
- Smart Grid Security and Resilience
- Mobile Ad Hoc Networks
- Adversarial Robustness in Machine Learning
- Energy Efficient Wireless Sensor Networks
- Advanced Malware Detection Techniques
- Distributed Control Multi-Agent Systems
- Vehicular Ad Hoc Networks (VANETs)
- Cryptography and Data Security
- Cooperative Communication and Network Coding
- Information and Cyber Security
- Anomaly Detection Techniques and Applications
- Reinforcement Learning in Robotics
- Air Traffic Management and Optimization
- Privacy-Preserving Technologies in Data
- Internet Traffic Analysis and Secure E-voting
- Security and Verification in Computing
- Chaos-based Image/Signal Encryption
- Opportunistic and Delay-Tolerant Networks
- Advanced Authentication Protocols Security
- User Authentication and Security Systems
- Formal Methods in Verification
- RFID technology advancements
- Cryptographic Implementations and Security
University of Washington
2015-2024
Seattle University
2014-2024
Worcester Polytechnic Institute
2016-2021
Yıldız Technical University
2012
University of California, Irvine
2011
Siemens (Germany)
2010
University of Maryland, College Park
1997-2003
In many applications of wireless sensor networks (WSN), sensors are deployed un-tethered in hostile environments. For location-aware WSN applications, it is essential to ensure that can determine their location, even the presence malicious adversaries. this paper we address problem enabling location an un-trusted environment. Since localization schemes based on distance estimation expensive for resource constrained sensors, propose a range-independent algorithm called SeRLoc. SeRLoc...
Communication messages in vehicular ad hoc networks (VANET) can be used to locate and track vehicles. While tracking beneficial for vehicle navigation, it also lead threats on location privacy of user. In this paper, we address the problem mitigating unauthorized vehicles based their broadcast communications, enhance user VANET. Compared other mobile networks, VANET exhibits unique characteristics terms mobility constraints, application requirements such as a safety message period, network...
We consider a scenario where sophisticated jammer jams an area in single-channel wireless sensor network. The controls the probability of jamming and transmission range to cause maximal damage network terms corrupted communication links. action ceases when it is detected by monitoring node network, notification message transferred out region. at monitor employing optimal detection test based on percentage incurred collisions. On other hand, computes channel access effort minimize plus time....
Many distributed monitoring applications of Wireless Sensor Networks (WSNs) require the location information a sensor node. In this article, we address problem enabling nodes to determine their in an untrusted environment, known as secure localization problem. We propose novel range-independent algorithm called SeRLoc that is well suited resource constrained environment such WSN. based on two-tier network architecture allows sensors passively without interacting with other sensors. show...
We address the problem of secure location determination, known as localization, and verifying claim a node, verification, in wireless sensor networks (WSN). propose robust positioning system we call ROPE that allows sensors to determine their without any centralized computation. In addition, provides verification mechanism verifies claims before data collection. show bounds ability an attacker spoof sensors' locations, with relatively low density deployment reference points. confirm...
Technology, science, and engineering continue to redefine physical world capabilities. Take mobility of humans, for example. In the 20th century, transportation systems moved us unimaginable distances, speeds on earth made set foot Moon. Star Trek popularized teleportation, a fictitious technology that instantly allows "go where no person has gone before." Before end Internet wireless networking helped create parallel "cyber world," virtually "teleporting" great distances interact with...
In this paper, we address the problem of robustly estimating position randomly deployed nodes a wireless sensor network (WSN), in presence security threats. We propose range-independent localization algorithm called high-resolution (HiRLoc), that allows sensors to passively determine their location with high resolution, without increasing number reference points, or complexity hardware each point. HiRLoc, based on intersection areas covered by beacons transmitted multiple points. By...
In wireless networks, the location tracking of devices and vehicles (nodes) based on their identifiable locatable broadcasts, presents potential threats to privacy users. While nodes can be mitigated an extent by updating identifiers decorrelate traversed locations, such approach is still vulnerable methods that utilize predictability node movement limit provided identifier updates. On other hand, since each user may need at different locations times, a user-centric needed enable...
We investigate the problem of energy-efficient broadcast routing over wireless static ad hoc network where host mobility is not involves. define lifetime a as duration time until first node failure due to battery depletion. provide globally optimal solution maximizing through graph theoretic approach. also extensive comparative simulation studies.
A century of revolutionary growth in aviation has made global travel a reality daily life. Aircraft and air transport overcame number formidable challenges hostilities the physical world. Success this arduous pursuit was not without leveraging advances "cyber" layer, i.e., digital computing, data storage networking, software, hardware, infrastructures, humans, processes, within airframe, space, on ground. The world, however, is evolving continuously 21st century, contributing traffic...
We study the problem of coverage in planar heterogeneous sensor networks. Coverage is a performance metric that quantifies how well field interest monitored by deployment. To derive analytical expressions for networks, we formulate as set intersection problem, studied integral geometry. Compared to previous results, our formulation allows us consider network model where sensors are deployed according an arbitrary stochastic distribution; sensing areas need not follow unit disk but can have...
Deep neural networks are known to be vulnerable adversarial examples, i.e., images that maliciously perturbed fool the model. Generating examples has been mostly limited finding small perturbations maximize model prediction error. Such images, however, contain artificial make them somewhat distinguishable from natural images. This property is used by several defense methods counter applying denoising filters or training robust perturbations. In this paper, we introduce a new class of namely...
In many applications of multi-agent systems (MAS), a set leader agents acts as control inputs to the remaining follower agents. this paper, we introduce an analytical approach selecting in order minimize total mean-square error agent states from their desired value steady-state presence noisy communication links. We show that, for link weights based on second-order noise statistics, problem choosing leaders can be solved using supermodular optimization techniques, leading efficient...
Social media platforms provide an environment where people can freely engage in discussions. Unfortunately, they also enable several problems, such as online harassment. Recently, Google and Jigsaw started a project called Perspective, which uses machine learning to automatically detect toxic language. A demonstration website has been launched, allows anyone type phrase the interface instantaneously see toxicity score [1]. In this paper, we propose attack on Perspective detection system...
We consider a scenario where sophisticated jammer jams an area in which single-channel random-access-based wireless sensor network operates. The controls the probability of jamming and transmission range order to cause maximal damage terms corrupted communication links. action ceases when it is detected by (namely monitoring node), notification message transferred out jammed region. employing optimal detection test based on percentage incurred collisions. On other hand, defends itself...
Aircraft data communications and networking are key enablers for civilian air transportation systems to meet projected aviation demands of the next 20 years beyond. In this paper, we show how envisioned e-enabled aircraft plays a central role in streamlining system modernization efforts. We why performance targets such as safety, security, capacity, efficiency, environmental benefit, travel comfort, convenience will heavily depend on communications, cyber-physical security capabilities...
Convolutional Neural Networks (CNNs) have achieved state-of-the-art performance on a variety of computer vision tasks, particularly visual classification problems, where new algorithms reported to achieve or even surpass the human performance. In this paper, we examine whether CNNs are capable learning semantics training data. To end, evaluate negative images, since they share same structure and as regular images humans can classify them correctly. Our experimental results indicate that when...
On-line Social Networks (OSNs) are increasingly influencing the way people communicate with each other and share personal, professional political information. Like cyberspace in Internet, OSNs attracting interest of malicious entities that trying to exploit vulnerabilities weaknesses OSNs. Increasing reports security privacy threats is researchers detect mitigate individual users. With many having tens or hundreds million users collectively generating billions personal data content can be...
Software defined networking (SDN) is a new paradigm that in recent years has revolutionized network architectures. At its core, SDN separates the data plane, which provides forwarding functionalities, and control implements logic. The separation of these two components virtually centralized point network, at same time abstracts complexity underlying physical infrastructure. Unfortunately, while promising, approach also introduces attacks vulnerabilities. Indeed, previous research shows that,...
Google has recently introduced the Cloud Vision API for image analysis. According to demonstration website, "quickly classifies images into thousands of categories, detects individual objects and faces within images, finds reads printed words contained images." It can be also used "detect different types inappropriate content from adult violent content." In this paper, we evaluate robustness input perturbation. particular, show that by adding sufficient noise image, generates completely...
Networked control systems consist of distributed sensors and actuators that communicate via a wireless network. The use an open medium unattended deployment leaves these vulnerable to intelligent adversaries whose goal is disrupt the system performance. In this paper, we study wormhole attack on networked system, in which adversary establishes link between two geographically distant regions network by using either high-gain antennas, as out-of-band wormhole, or colluding nodes in-band...