Cyber Security Research / en Firefighters get an assist from 5G-equipped drones developed at Mason /news/2022-10/firefighters-get-assist-5g-equipped-drones-developed-mason <span>Firefighters get an assist from 5G-equipped drones developed at Mason</span> <span><span lang="" about="/user/1011" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Tama Moni</span></span> <span>Tue, 10/18/2022 - 16:34</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="intro-text">A team of firefighters ascend the stairs in a high-rise engulfed in flames. The team disperses to put out the fire and search for survivors. Drones hover around the burning building and identify with pinpoint accuracy the location of each firefighter, who is wearing a sensor, sending this information back to a commander who has an “eye in the sky” vantage point. </span></p> <p>The commander communicates with the firefighters, directing their movements, keeping them safe, and helping them extinguish the flames. If one member of the team hasn’t moved in several minutes, the system sends an alert to check on that person’s status. </p> <figure role="group" class="align-right"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2022-10/CEC-CYS-firefighters-thumbnail_600x600.jpg?itok=AWXyIkW3" width="350" height="350" alt="showing someone driving a drone" loading="lazy" typeof="foaf:Image" /></div> </div> <figcaption>Photo by iStock</figcaption></figure><p><span><span><span><span><span>You can imagine this scenario in a big-budget movie, but Vijay Shah, an assistant professor in the Cyber Security Engineering Department in the College of Engineering and Computing at AV is working to make it a reality. If all goes well, firefighters will have a new, important tool like this within five years.   </span></span></span></span></span></p> <p><span><span><span><span><span>Funded by the <a href="https://www.nist.gov/">National Institute of Standards and Technology</a>, Shah is collaborating with colleagues at Virginia Tech and the Arlington, Virginia, County Fire Department on a 5G Indoor Positioning System that may someday be used by fire departments nationwide. Firefighters in Arlington will be testing the technology in a facility starting in 2025. </span></span></span></span></span></p> <p><span><span><span><span><span>Advances in 5G network technology allow for this research because compared to other legacy wireless communications, 5G provides much greater accuracy and does not rely on equipment within the building, which may be damaged during a fire. A key development Shah and colleagues are exploiting is called “network slicing,” sending certain pieces of information over portions of the 5G network. </span></span></span></span></span></p> <p><span><span><span><span><span>“The critical information, such as location of the firefighter, is sent in one ‘slice’ and in a much smaller packet, allowing for virtually no delay in information relay," says Shah. "Transmitting audio/video information requires more data, but any information lost there simply reduces the quality of the audio/video, which is not as important as losing someone’s location. That information would be put in another slice.”   </span></span></span></span></span></p> <p><span><span><span><span><span>Shah notes that 5G has key capabilities, such as support for various timing and angle-based techniques, device-to-device communication, and edge computing, which can be leveraged to locate users precisely and enable reliable communication infrastructure. Together this allows for much greater situational awareness of firefighters—and victims—by knowing their precise location and allowing for seamless communication among the firefighting team.</span></span></span></span></span></p> <p><span><span><span><span><span>The drones add another level of complexity, and at least three will be needed around a building to guarantee high levels of accuracy. The team is working to ensure drone communications are synchronized precisely, as even delays as short as milliseconds may result in improper readings. Shah says that getting the independently flying drones synced up is one of the project’s biggest challenges.</span></span></span></span></span></p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="a0ec68af-0ee8-4bef-b7c8-66f5c61c3019"> <div class="cta"> <a class="cta__link" href="https://cybersecurity.gmu.edu/"> <h4 class="cta__title">Cybersecurity at Mason <i class="fas fa-arrow-circle-right"></i> </h4> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="f675172b-88b8-4a07-9bc9-91f8a5b8823e" class="block block-layout-builder block-inline-blocktext"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><p> </p> <p> </p> </div> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="e0890703-c80b-4de4-921c-4b8d529809d3" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related News</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-43b9c7c81d2b3e3b6f08fde0396dfa197e12388e7c27fa2a2b33fb553bf469f8"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"><li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2024-11/student-team-wins-first-place-60k-cyber-warfare-challenge" hreflang="en">Student team wins first place, $60k from cyber warfare challenge </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">November 1, 2024</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2024-10/military-5g-gets-security-boost-anti-jamming-research" hreflang="en">Military 5G gets a security boost with anti-jamming research </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 21, 2024</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2024-02/mason-competitive-cyber-scores-multiple-wins-cyberforge-2024" hreflang="en">Mason Competitive Cyber scores multiple wins at CyberForge 2024 </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">February 14, 2024</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2024-02/vijay-shah-joins-2m-ntia-funded-project-5g-cybersecurity" hreflang="en">Vijay Shah joins $2M NTIA-funded project on 5G cybersecurity</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">February 8, 2024</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2023-06/mason-teams-shine-three-major-hackathons" hreflang="en">Mason teams shine at three major hackathons</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">June 22, 2023</div></div></li> </ul></div> </div> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/4846" hreflang="en">firefighters</a></div> <div class="field__item"><a href="/taxonomy/term/16751" hreflang="en">Drones</a></div> <div class="field__item"><a href="/taxonomy/term/7011" hreflang="en">5G</a></div> <div class="field__item"><a href="/taxonomy/term/3071" hreflang="en">College of Engineering and Computing</a></div> <div class="field__item"><a href="/taxonomy/term/3051" hreflang="en">Cyber Security Research</a></div> <div class="field__item"><a href="/taxonomy/term/8241" hreflang="en">5G/6G Wireless Communications</a></div> <div class="field__item"><a href="/taxonomy/term/6886" hreflang="en">Department of Cyber Security Engineering</a></div> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> <div class="field__item"><a href="/taxonomy/term/17476" hreflang="en">Spirit Magazine</a></div> <div class="field__item"><a href="/taxonomy/term/17481" hreflang="en">Spirit Spring 2023</a></div> <div class="field__item"><a href="/taxonomy/term/17521" hreflang="en">Inquiring Minds</a></div> <div class="field__item"><a href="/taxonomy/term/19146" hreflang="en">CEC faculty research</a></div> </div> </div> </div> </div> </div> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div> </div> <div> </div> </div> Tue, 18 Oct 2022 20:34:23 +0000 Tama Moni 101011 at Health Informatics Student Develops 5G-Enabled Telemedicine Technology /news/2021-12/health-informatics-student-develops-5g-enabled-telemedicine-technology <span>Health Informatics Student Develops 5G-Enabled Telemedicine Technology</span> <span><span lang="" about="/user/811" typeof="schema:Person" property="schema:name" datatype="" content="John Brandon Cantrell" xml:lang="">John Brandon C…</span></span> <span>Wed, 12/01/2021 - 16:44</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/721" hreflang="en">internships</a></div> <div class="field__item"><a href="/taxonomy/term/3051" hreflang="en">Cyber Security Research</a></div> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/14051" hreflang="en">Telehealth</a></div> <div class="field__item"><a href="/taxonomy/term/336" hreflang="en">Students</a></div> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> <div class="field__item"><a href="/taxonomy/term/331" hreflang="en">Student Spotlight</a></div> <div class="field__item"><a href="/taxonomy/term/19491" hreflang="en">Tech Talent Investment Program</a></div> <div class="field__item"><a href="/taxonomy/term/20326" hreflang="en">CPH Experience</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><h3><em>Patricia Tran <strong>integrates innovation and clinical experience</strong> as summer intern with Commonwealth Cyber Initiative</em></h3> <figure role="group" class="align-right"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2021-12/spotlight_tran_pic_0.jpg?itok=FcAzWSxy" width="285" height="350" loading="lazy" typeof="foaf:Image" /></div> </div> <figcaption>Tran's research as a CCI intern allowed her to create 5G-enabled wearable technology to detect Atrial fibrillation and support clinical decision making. </figcaption></figure><p><span><span><span><span>Patricia Tran, an alumna of Mason's <a href="https://honorscollege.gmu.edu/" target="_blank">Honors College</a>, recognized the essential roles cybersecurity and health informatics have in health care while working as a nurse. Tran’s first-hand experience with electronic health record (EHR) systems sparked her interest in how new technology could enhance health care organizations’ telemedicine services. She is now pursuing a Master of Science in Health Informatics at Mason, where she integrates her passion for health care and technology to defeat digital threats that compromise the access and quality of care patients receive. </span></span></span></span></p> <p><span><span><span><span> “In a field where every second matters, high latency and poor connectivity can have detrimental effects,” says Tran, who is interested in the way 5G-enabled technology can improve the telemedicine infrastructure. “5G has the potential to address these challenges and transform telemedicine.”</span></span></span></span></p> <p><span><span><span><span>Tran pursued her interest in 5G during the summer of 2021 as one of the first summer interns at </span></span><a href="https://cyberinitiative.org/" target="_blank"><span><span>Commonwealth Cyber Initiative</span></span></a><span class="MsoHyperlink"><span><span><span> (CCI)</span></span></span></span><span><span>. CCI is a Virginia organization with a mission to establish the state as a global leader in cybersecurity while supporting world-class research and preparing future generations for careers in cybersecurity. </span></span></span></span></p> <p><span><span><span><span>“Throughout the summer, we developed a proof-of-concept design for 5G-enabled telemedicine,  incorporating </span></span><a href="https://www.raspberrypi.com/" target="_blank"><span><span>RaspberryPi</span></span></a><span><span>, Apple Watch health data, cloud computing, and </span></span><a href="https://www.open-emr.org/" target="_blank"><span><span>OpenEMR</span></span></a><span><span> to detect Atrial fibrillation and support clinical decision making in real-time,” says Tran. </span></span></span></span><span><span> </span></span></p> <p><span><span><span><span>Developers could also expand Tran’s research on wearable device technology to detect other ailments--a result of her passion for creating innovative, amendable solutions to enhance the quality-of-care patients receive. </span></span></span></span></p> <p><span><span><span><span>Tran and her research team discovered that the current telemedicine infrastructure is not fully-equipped to handle the nuances of Internet of Things (IoT) technology, which are devices that connect to cloud services to access information. She believes that her 5G-enabled technology research can help overcome these obstacles by providing stronger connectivity, enhanced security, and faster speeds to telemedicine technology. </span></span></span></span></p> <p><span><span><span><span>“In health care, 5G is still a relatively new technology and could have tremendous impacts on telemedicine and care delivery, so our research addresses these opportunities for advancement as well as challenges that may arise,” says Tran. </span></span></span></span></p> <p><span><span><span><span>Tran’s clinical background as a nurse, coursework knowledge from her program, and strong work ethic helped her succeed throughout the internship. The many skills she gained throughout the health informatics program, such as database management, data analysis, and programming, allowed her to successfully work with real-world applications in health care. </span></span></span></span></p> <p><span><span><span><span>The CCI internship inspired Tran to encourage other students to pursue research initiatives that interest them. “Research in general can be overwhelming at times, but with the right attitude, you might be surprised at how much you can learn and discover,” says Tran. </span></span></span></span></p> <p><span><span><span><span>Tran aims to work with a leading EHR system as a developer or analyst after graduating with her master’s degree in health informatics to continue discovering innovative ways to address health care technological problems. </span></span></span></span></p> </div> </div> </div> </div> </div> Wed, 01 Dec 2021 21:44:11 +0000 John Brandon Cantrell 60701 at University researchers receive grants from the Commonwealth Cyber Initiative for cyber and arts and design research /news/2021-02/university-researchers-receive-grants-commonwealth-cyber-initiative-cyber-and-arts-and <span>University researchers receive grants from the Commonwealth Cyber Initiative for cyber and arts and design research</span> <span><span lang="" about="/user/326" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Martha Bushong</span></span> <span>Wed, 02/03/2021 - 16:08</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/ldurant2" hreflang="und">Liza Wilson Durant</a></div> <div class="field__item"><a href="/profiles/dwijesek" hreflang="und">Duminda Wijesekera</a></div> <div class="field__item"><a href="/profiles/kzeng2" hreflang="und">Kai Zeng</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span><span><span><span><span>Six research projects led by </span></span><span><span>AV (Mason)</span></span><span><span> faculty and one research project led by </span></span><span><span>James Madison University</span></span><span><span> (JMU) faculty received funding from the </span></span><a href="https://cyberinitiative.org/index.html"><span><span>Commonwealth Cyber Initiative (CCI)</span></span></a><span><span> that will help further the expansion of autonomous systems, AI, 5G applications, and new approaches to security.</span></span></span></span></span></p> <p><span><span><span><span><span>“These projects promise to impact the security of our infrastructure as well as the manufacturing enterprise and leverage expertise in AI, policy and economics to support security of our regional ecosystem. Our multidisciplinary, multi-institutional approach to these challenges will accelerate new defenses and strategies," said </span></span><a href="https://cyberinitiative.org/about/leadership-staff/wilson-durant-liza.html"><span><span>Liza Wilson Durant, CCI Northern Virginia Node Director.</span></span></a></span></span></span></p> <p><span><span><span><span><span>Mason faculty also received funding as part of the CCI Building Bridges Arts and Design Collaboration Program that aims to engage the Virginia community of cyber researchers in arts and design to reimagine and depict the results of cybersecurity research either for scientific or creative arts purposes. </span></span></span></span></span></p> <p><span><span><span><span><span>"It is exciting to fund projects which collide art and design with engineering and computing,” said Durant, associate dean for strategic initiatives and community engagement at Mason. “The artists' perspective will surely broaden our understanding of the data and inspire us to be more creative and shift perspective as we seek solutions to our technical challenges."</span></span></span></span></span></p> <p><span><span><span><span><span>"The portfolio of research initiatives funded in the Northern Virginia Node brings together the unique expertise of multiple nodes across the commonwealth to advance the goals of the CCI Northern Virginia Node's strategic plan,” said </span></span><a href="https://cyberinitiative.org/about/leadership-staff/dasilva-luiz.html"><span><span>Luiz DaSilva, CCI executive director.</span></span></a></span></span></span></p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/3051" hreflang="en">Cyber Security Research</a></div> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> </div> </div> </div> </div> </div> Wed, 03 Feb 2021 21:08:24 +0000 Martha Bushong 44671 at Researchers receive over $1.5 million from DARPA to optimize security and energy tradeoff /news/2021-02/researchers-receive-over-15-million-darpa-optimize-security-and-energy-tradeoff <span>Researchers receive over $1.5 million from DARPA to optimize security and energy tradeoff</span> <span><span lang="" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Anonymous (not verified)</span></span> <span>Tue, 02/02/2021 - 12:47</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3051" hreflang="en">Cyber Security Research</a></div> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/6861" hreflang="en">Department of Electrical and Computer Engineering</a></div> <div class="field__item"><a href="/taxonomy/term/7011" hreflang="en">5G</a></div> <div class="field__item"><a href="/taxonomy/term/2076" hreflang="en">Military</a></div> <div class="field__item"><a href="/taxonomy/term/19046" hreflang="en">C-TASC</a></div> <div class="field__item"><a href="/taxonomy/term/19211" hreflang="en">WCC</a></div> <div class="field__item"><a href="/taxonomy/term/19146" hreflang="en">CEC faculty research</a></div> <div class="field__item"><a href="/taxonomy/term/20421" hreflang="en">CEC High Impact</a></div> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/bmark" hreflang="und">Brian Mark</a></div> <div class="field__item"><a href="/profiles/kkhasawn" hreflang="und">Khaled Khasawneh</a></div> <div class="field__item"><a href="/profiles/kzeng2" hreflang="und">Kai Zeng</a></div> <div class="field__item"><a href="/profiles/spudukot" hreflang="und">Sai Manoj Pudukotai Dinakarrao</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:feature_image" data-inline-block-uuid="5bc55496-6015-4a54-bcca-baf67f3c4bbc" class="block block-feature-image block-layout-builder block-inline-blockfeature-image caption-below"> <div class="feature-image"> <div class="narrow-overlaid-image"> <img src="/sites/g/files/yyqcgq291/files/styles/feature_image_medium/public/2021-02/Copy%20of%20Untitled.png?itok=Kw_L3Vcg" srcset="/sites/g/files/yyqcgq291/files/styles/feature_image_small/public/2021-02/Copy%20of%20Untitled.png?itok=kt5g-r7o 768w, /sites/g/files/yyqcgq291/files/styles/feature_image_medium/public/2021-02/Copy%20of%20Untitled.png?itok=Kw_L3Vcg 1024w, /sites/g/files/yyqcgq291/files/styles/feature_image_large/public/2021-02/Copy%20of%20Untitled.png?itok=Tz-GhR5X 1280w, " sizes="(min-width: 1024px) 80vw,100vw" alt="Collage of four professors, Sai, Kai, Khaled and Brian. " /></div> </div> <div class="feature-image-caption"> <div class="field field--name-field-feature-image-caption field--type-text-long field--label-hidden field__item"><p>Sai Manoj Pudukotai Dinakarrao, Kai Zeng, Khaled Khasawneh, and Brian Mark are collaborating with researchers at Virginia Tech to optimize the safety and energy-efficient tradeoff.  </p></div> </div> </div><div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p>The capabilities and reach of 5G are expanding, but with new capabilities come new security challenges. Four Mason Engineering researchers received a $1.6 million grant from DARPA to tackle one of the many security issues that 5G poses as part of a larger <a href="https://www.darpa.mil/">DARPA</a> initiative called <a href="https://www.darpa.mil/program/open-programmable-secure-5g">Open, Programmable, Secure 5G (OPS-5G)</a>. </p> <p>The <a href="https://volgenau.gmu.edu/research/grants">grant</a>, entitled EPIC SWaPD: Energy Preserving Internet of Things (IoT) Cryptography for Small Weight and Power Devices, aims to optimize the security and energy efficiency tradeoff by creating a low-energy security architecture for various types of IoT devices.  </p> <p>“In a network, there are many different devices of different sizes and capabilities. Many of these devices don’t have much computing power or battery life, and a common cybersecurity attack on these devices is to drain their battery life,” says <a href="https://volgenau.gmu.edu/profiles/bmark">Brian Mark</a>, co-principal investigator on the grant.  </p> <p>Mark, <a href="https://volgenau.gmu.edu/profiles/kkhasawn">Khaled Khasawneh</a>, <a href="https://volgenau.gmu.edu/profiles/kzeng2">Kai Zeng,</a> and <a href="https://volgenau.gmu.edu/profiles/spudukot">Sai Manoj Pudukotai Dinakarrao</a> in the <a href="https://ece.gmu.edu/">Department of Electrical and Computer Engineering</a> are collaborating with the company Kryptowire and Assistant Professor Matthew Hicks from <a href="https://vt.edu/">Virginia Tech</a> for the project.  </p> <p>These small IoT devices could be as simple as a thermometer or humidity sensor that is part of a larger smart home system. “These sensors can be very tiny, and they have limited computation and communication capabilities. The first step for each of these types of sensors would be to bootstrap, or link, a secure connection to the network, which requires authentication without pre-shared secrets. This is where the vulnerabilities lie,” says Kai Zeng.  </p> <p>When sensors or other types of small IoT devices must automatically authenticate themselves, attackers have many paths of attack. They can drain the device's battery, rendering it useless, or steal sensitive information or data from the device. Because of the many pathways that attackers could use to harm these devices, the team is combining cryptography, network protocol design, and machine learning to assure the success and scalability of their efforts.  </p> <p>“Something really important for this effort is that the security architecture operates on the principles of zero trust and least privilege,” says Mark. “Zero trust means that when a device comes in and wants to join the network, the assumption is that there is no prior trust or information shared between the devices, while least privilege implies the minimum permissions are granted to the entity to perform its task. So, we needed to bootstrap the security association and grant an entity just enough authority to access the devices or data that it needs but no more than that.”  </p> <p>One way they are looking at securing the connection is through gait-inspired authentication, which leverages the kinetic energy generated by a human user. “Every device harvests energy in a different way, and we use the harvesting pattern for authentication of the device, which preserves energy and accomplishes a security task at the same time,” says Dinakarrao.  </p> <p>Another approach is to exploit the “always-on” sensors in some devices like smartphones. “We plan to employ always-on sensing to perform the exchange of device identification and cryptographic material,” says Khasawneh. </p> <p>They are also using machine learning to ensure both authentication and authorization of different devices. “We not only have to authenticate the devices and entities that are allowed on a network, but we have to verify their different roles and privileges. I might be granted access to the information that tells me the temperature of a room, but perhaps I might not have the authorization to change the thermostat setting,” says Mark. “Using graph-based models, we can verify the trust relationships of different devices or entities and this process can be accelerated using machine learning techniques,” adds Dinakarrao.  </p> <p>Long-term, the team aspires for their security architecture to easily be applied to other devices. “When we talk about the energy and security tradeoff, we have to think about how we can do things in a smart way to conserve energy while enhancing security. But we also need to think about how to make our architecture scalable to larger, more geographically distributed networks. Right now, this work is with smaller devices, but the hope is that our overall security architecture can apply to a variety of devices with different capabilities,” says Mark. </p> </div> </div> </div> </div> </div> Tue, 02 Feb 2021 17:47:20 +0000 Anonymous 97806 at SANS Technology Institute Cybersecurity Talent 2019 /news/2019-10/sans-technology-institute-cybersecurity-talent-2019 <span>SANS Technology Institute Cybersecurity Talent 2019</span> <span><span lang="" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Anonymous (not verified)</span></span> <span>Fri, 10/25/2019 - 13:39</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p>Body</p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/7136" hreflang="en">Rankings</a></div> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/3051" hreflang="en">Cyber Security Research</a></div> <div class="field__item"><a href="/taxonomy/term/3346" hreflang="en">Cyber Security</a></div> <div class="field__item"><a href="/taxonomy/term/3356" hreflang="en">Cyber Degrees Website</a></div> <div class="field__item"><a href="/taxonomy/term/3351" hreflang="en">cybersecurity bachelor's program</a></div> <div class="field__item"><a href="/taxonomy/term/1661" hreflang="en">Rankings</a></div> </div> </div> </div> </div> </div> Fri, 25 Oct 2019 17:39:40 +0000 Anonymous 7586 at Mason plays a key role in the Commonwealth Cyber Initiative /news/2019-09/mason-plays-key-role-commonwealth-cyber-initiative <span>Mason plays a key role in the Commonwealth Cyber Initiative</span> <span><span lang="" about="/user/231" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Colleen Rich</span></span> <span>Wed, 09/11/2019 - 17:53</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p>Body</p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/3051" hreflang="en">Cyber Security Research</a></div> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/836" hreflang="en">Presidential Search</a></div> <div class="field__item"><a href="/taxonomy/term/116" hreflang="en">Campus News</a></div> </div> </div> </div> </div> </div> Wed, 11 Sep 2019 21:53:48 +0000 Colleen Rich 14631 at Mason professor says Virginia’s international cybersecurity outreach is unique /news/2016-11/mason-professor-says-virginias-international-cybersecurity-outreach-unique <span>Mason professor says Virginia’s international cybersecurity outreach is unique</span> <span><span lang="" about="/user/236" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Melanie Balog</span></span> <span>Tue, 11/22/2016 - 16:15</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/3051" hreflang="en">Cyber Security Research</a></div> </div> </div> </div> </div> </div> Tue, 22 Nov 2016 21:15:51 +0000 Melanie Balog 5561 at