5G / en Message manipulation tricks text thieves /news/2022-12/message-manipulation-tricks-text-thieves <span>Message manipulation tricks text thieves</span> <span><span lang="" about="/user/1011" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Tama Moni</span></span> <span>Mon, 12/12/2022 - 11:30</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/kzeng2" hreflang="und">Kai Zeng</a></div> <div class="field__item"><a href="/profiles/bmark" hreflang="und">Brian Mark</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><figure role="group" class="align-left"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2022-12/Text-safety-news-story_600x600_0.jpg?itok=h1urHmyy" width="350" height="350" alt="A shot of a woman's hands texting on a blue phone and she's wearing a yellow sweater" loading="lazy" typeof="foaf:Image" /></div> </div> <figcaption>Photo courtesy of iStock images</figcaption></figure><p>When you send a text, you have a reasonable expectation that your transmission is secure. But what if it was intercepted by a malicious actor? Perhaps a holiday recipe gets pilfered or an unflattering picture is in rogue hands. In scarier scenarios, you may have valuable personal information stolen.  </p> <p>It is this sort of worst-case scenario that concerns officials when they consider the security of texts between entities like the police, military, and intelligence agents. If mission-critical information gets stolen or blocked, the consequences can be considerable.   </p> <p>Researchers at AV’s <a href="https://cec.gmu.edu/" target="_blank">College of Engineering and Computing</a> are partnering with Ericsson, AT&T, Michigan State University, and Morgan State University on what they’re calling Windtexter, after the famous Navajo code talkers (also called “windtalkers”) who aided the United States’ war effort in World War II. Windtexter’s covertness trick is making important texts look like mundane messages, hiding amidst throngs of others. The <a href="https://www.nsf.gov/awardsearch/showAward?AWD_ID=2226423&HistoricalAwards=false" target="_blank">project</a> is co-funded by the National Science Foundation’s <a href="https://beta.nsf.gov/funding/initiatives/convergence-accelerator" target="_blank">Convergence Accelerator</a> and the Department of Defense, Office of the Under Secretary of Defense for Research and Engineering.  </p> <p>One thing Mason’s researchers are looking at is using natural language processing to confuse an interceptor by sending some messages that serve as red herrings, allowing the critical, relevant messages to hide in plain sight. <a href="https://ece.gmu.edu/profiles/bmark" target="_blank">Brian Mark</a>, a professor in the Electrical and Computer Engineering department and a researcher on the project, notes, “Hiding information in text is not that simple – the so-called cover text has to be, for example, grammatically correct, such that an eavesdropper wouldn’t be able to tell it came from some automated device.” The critical texts will also hide among countless consumer messages flying around cyberspace.  </p> <p>What the project is doing goes beyond encryption, Mark continues. “Encryption makes it hard for the eavesdropper to find out what the message is, but covertness means the eavesdropper wouldn’t even know you’re sending anything of importance.”  </p> <p>In addition, the researchers are looking at ways to avoid bad actors altogether. <a href="https://ece.gmu.edu/profiles/kzeng2" target="_blank">Kai Zeng</a>, an associate professor in Mason’s Electrical and Computer Engineering Department, says that the military, for example, may use something called a VPN tunnel – an encrypted link between a computer or mobile device and an outside network – for securing messages. But a savvy attacker can sit in the middle of that “tunnel” and according to Zeng, “Even if they can’t decode the message, they can block the transmission, causing a denial of service.”  </p> <p>Using a device from Ericsson that supports multiple SIM cards and connecting to various carrier networks, the data traffic can be distributed among numerous paths; even if one path is jammed by a malicious actor, other paths can provide a clear route for the communication and the critical message can still be recovered.  </p> <p>In addition to the technical work, the team will conduct interviews with at least 12 stakeholders, getting input to guide their research and development. On the list are a Washington, DC police officer, an FBI agent, and someone from the National Security Agency, among others.  </p> <p>NSF and DoD are <a href="https://beta.nsf.gov/news/nsf-dod-partner-advance-5g-technologies?sf170163349=1" target="_blank">funding this project</a> in part to take advantage of augmentations to 5G infrastructure so that military, government, and critical infrastructure operators can operate through public 5G networks whenever possible, but only if they can do so securely. </p> <p>Part of the project involves a socio-economic impact analysis of the proposed techniques, overseen by Ed Oughton, assistant professor in the Mason College of Science. Following the initial goal of technical improvements to help government and service providers prioritize which techniques should receive enhanced resources, the project encourages vendors, operators, and standards bodies to adopt and distribute new security features based on benefit-cost merits. </p> <p>The team is in Phase 1 of the project, along with 15 other teams. A the end of phase 1, the team will submit a phase 2 proposal and participate in a formal pitch. A small number of those teams will advance to Phase 2, which includes an award of up to $5 million for two years. The Mason team will find out if they are chosen to advance in August 2023.</p> <p>For more information about WindTexter, visit <a href="https://wirelesscyber.cec.gmu.edu/WindTexter/" title="WindTexter">this site</a>.</p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3071" hreflang="en">College of Engineering and Computing</a></div> <div class="field__item"><a href="/taxonomy/term/7011" hreflang="en">5G</a></div> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> </div> </div> </div> </div> </div> Mon, 12 Dec 2022 16:30:26 +0000 Tama Moni 103671 at Firefighters get an assist from 5G-equipped drones developed at Mason /news/2022-10/firefighters-get-assist-5g-equipped-drones-developed-mason <span>Firefighters get an assist from 5G-equipped drones developed at Mason</span> <span><span lang="" about="/user/1011" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Tama Moni</span></span> <span>Tue, 10/18/2022 - 16:34</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="intro-text">A team of firefighters ascend the stairs in a high-rise engulfed in flames. The team disperses to put out the fire and search for survivors. Drones hover around the burning building and identify with pinpoint accuracy the location of each firefighter, who is wearing a sensor, sending this information back to a commander who has an “eye in the sky” vantage point. </span></p> <p>The commander communicates with the firefighters, directing their movements, keeping them safe, and helping them extinguish the flames. If one member of the team hasn’t moved in several minutes, the system sends an alert to check on that person’s status. </p> <figure role="group" class="align-right"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2022-10/CEC-CYS-firefighters-thumbnail_600x600.jpg?itok=AWXyIkW3" width="350" height="350" alt="showing someone driving a drone" loading="lazy" typeof="foaf:Image" /></div> </div> <figcaption>Photo by iStock</figcaption></figure><p><span><span><span><span><span>You can imagine this scenario in a big-budget movie, but Vijay Shah, an assistant professor in the Cyber Security Engineering Department in the College of Engineering and Computing at AV is working to make it a reality. If all goes well, firefighters will have a new, important tool like this within five years.   </span></span></span></span></span></p> <p><span><span><span><span><span>Funded by the <a href="https://www.nist.gov/">National Institute of Standards and Technology</a>, Shah is collaborating with colleagues at Virginia Tech and the Arlington, Virginia, County Fire Department on a 5G Indoor Positioning System that may someday be used by fire departments nationwide. Firefighters in Arlington will be testing the technology in a facility starting in 2025. </span></span></span></span></span></p> <p><span><span><span><span><span>Advances in 5G network technology allow for this research because compared to other legacy wireless communications, 5G provides much greater accuracy and does not rely on equipment within the building, which may be damaged during a fire. A key development Shah and colleagues are exploiting is called “network slicing,” sending certain pieces of information over portions of the 5G network. </span></span></span></span></span></p> <p><span><span><span><span><span>“The critical information, such as location of the firefighter, is sent in one ‘slice’ and in a much smaller packet, allowing for virtually no delay in information relay," says Shah. "Transmitting audio/video information requires more data, but any information lost there simply reduces the quality of the audio/video, which is not as important as losing someone’s location. That information would be put in another slice.”   </span></span></span></span></span></p> <p><span><span><span><span><span>Shah notes that 5G has key capabilities, such as support for various timing and angle-based techniques, device-to-device communication, and edge computing, which can be leveraged to locate users precisely and enable reliable communication infrastructure. Together this allows for much greater situational awareness of firefighters—and victims—by knowing their precise location and allowing for seamless communication among the firefighting team.</span></span></span></span></span></p> <p><span><span><span><span><span>The drones add another level of complexity, and at least three will be needed around a building to guarantee high levels of accuracy. The team is working to ensure drone communications are synchronized precisely, as even delays as short as milliseconds may result in improper readings. Shah says that getting the independently flying drones synced up is one of the project’s biggest challenges.</span></span></span></span></span></p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="a0ec68af-0ee8-4bef-b7c8-66f5c61c3019"> <div class="cta"> <a class="cta__link" href="https://cybersecurity.gmu.edu/"> <h4 class="cta__title">Cybersecurity at Mason <i class="fas fa-arrow-circle-right"></i> </h4> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="f675172b-88b8-4a07-9bc9-91f8a5b8823e" class="block block-layout-builder block-inline-blocktext"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><p> </p> <p> </p> </div> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="e0890703-c80b-4de4-921c-4b8d529809d3" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related News</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-a9bd3c8a602e0cee19d9469367c9ed2449e829b342b3ca30ebfcbef89c20d4f4"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"><li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2024-02/mason-competitive-cyber-scores-multiple-wins-cyberforge-2024" hreflang="en">Mason Competitive Cyber scores multiple wins at CyberForge 2024 </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">February 14, 2024</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2024-02/vijay-shah-joins-2m-ntia-funded-project-5g-cybersecurity" hreflang="en">Vijay Shah joins $2M NTIA-funded project on 5G cybersecurity</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">February 8, 2024</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2023-06/mason-teams-shine-three-major-hackathons" hreflang="en">Mason teams shine at three major hackathons</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">June 22, 2023</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2022-10/firefighters-get-assist-5g-equipped-drones-developed-mason" hreflang="en">Firefighters get an assist from 5G-equipped drones developed at Mason</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 18, 2022</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2022-05/mason-students-build-drones-part-commonwealth-cyber-initiative" hreflang="en">Mason students build drones as part of Commonwealth Cyber Initiative </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">June 1, 2022</div></div></li> </ul></div> </div> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/4846" hreflang="en">firefighters</a></div> <div class="field__item"><a href="/taxonomy/term/16751" hreflang="en">Drones</a></div> <div class="field__item"><a href="/taxonomy/term/7011" hreflang="en">5G</a></div> <div class="field__item"><a href="/taxonomy/term/3071" hreflang="en">College of Engineering and Computing</a></div> <div class="field__item"><a href="/taxonomy/term/3051" hreflang="en">Cyber Security Research</a></div> <div class="field__item"><a href="/taxonomy/term/8241" hreflang="en">5G/6G Wireless Communications</a></div> <div class="field__item"><a href="/taxonomy/term/6886" hreflang="en">Department of Cyber Security Engineering</a></div> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> <div class="field__item"><a href="/taxonomy/term/17476" hreflang="en">Spirit Magazine</a></div> <div class="field__item"><a href="/taxonomy/term/17481" hreflang="en">Spirit Spring 2023</a></div> <div class="field__item"><a href="/taxonomy/term/17521" hreflang="en">Inquiring Minds</a></div> <div class="field__item"><a href="/taxonomy/term/19146" hreflang="en">CEC faculty research</a></div> </div> </div> </div> </div> </div> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div> </div> <div> </div> </div> Tue, 18 Oct 2022 20:34:23 +0000 Tama Moni 101011 at Mason partners with COMSovereign and Widelity to advance 5G innovation /news/2021-09/mason-partners-comsovereign-and-widelity-advance-5g-innovation <span>Mason partners with COMSovereign and Widelity to advance 5G innovation</span> <span><span lang="" about="/user/251" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">John Hollis</span></span> <span>Wed, 09/15/2021 - 12:14</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><figure role="group"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/2021-09/210623811.jpg" width="725" height="483" loading="lazy" typeof="foaf:Image" /></div> </div> <figcaption>In June 2021, officials from COMSovereign and Widelity visited Mason’s Cyber Living Innovation Lab following their major equipment donations to increase the lab capabilities.(Editor's note: Masks were not required indoors on Mason campuses at this point in time.) <em>Photo by Shelby Burgess/Strategic Communications</em></figcaption></figure><p><span><span><span><span>For <a href="https://volgenau.gmu.edu/profiles/dwijesek"><span>Duminda Wijesekera</span></a>, AV’s work in cybersecurity of 5G is critical to helping create the 5G-enabling applications that are already propelling businesses, communities and higher education.</span></span></span></span></p> <p><span><span><span><span>“Wireless networking technology has become an important underpinning of the modern world, without which commerce and nearly every other facet of day-to-day life as we know it would be disrupted and even halted,” said Wijesekera, a professor in Mason’s Department of Computer Science and the acting chair of the <a href="https://cybersecurity.gmu.edu/"><span>Department of Cyber Security Engineering</span></a>.  </span></span></span></span></p> <p><span><span><span><span>That is why the Mason’s partnership with COMSovereign Holding Corp. and Widelity Inc. is so significant.</span></span></span></span></p> <p><span><span><span>The joint collaboration aims to research and build 5G-enabling applications and technologies to create new business, community, and higher education engagements and builds on Mason’s work in 5G and the ecosystem of university, industry and government partners collaborating through the <a href="https://www.cci-novanode.org/index.html#home">Northern Virginia Node of the Commonwealth Cyber Initiative (CCI)</a>. </span></span></span></p> <p><span><span><span>The cybersecurity of 5G has been a focus area for CCI since its inception in 2019.</span></span></span></p> <p><span><span><span>“CCI has been a catalyst for connecting industry and government cybersecurity challenges with university faculty with expertise, innovative technologies, and solutions,” said <a href="https://volgenau.gmu.edu/profiles/ldurant2">Liza Wilson Durant</a>, Mason’s associate provost for strategic initiatives and community engagement and the director of the Northern Virginia Node of CCI. “University-industry partnerships such as this one accelerate delivery of new solutions to the innovation ecosystem.”</span></span></span></p> <p><span><span><span>Through the partnership, Mason will provide research and development and concept development of 5G applications, such as connected transport and smart infrastructure.</span></span></span></p> <p><span><span><span>COMSovereign will support the research by providing stand-alone 5G wireless network hardware and related support services that include a complete, turnkey 5G network featuring a 3GPP standardized, 5G Core (5GCN), and 5G gNodeB base station. </span></span></span></p> <p><span><span><span>Widelity will contribute business and engineering services in technology strategy, research and development, network design, lab testing and integration, and network deployment. The collaboration is expected to accelerate advances in cybersecurity of 5G and implementation of 5G in smart communities, which will support the growing innovation ecosystem in the region.</span></span></span></p> <p><span><span><span>Dustin McIntire, the chief technology officer of COMSovereign, said his company was pleased to partner with Mason and Widelity on the cutting-edge 5G smart-campus program.</span></span></span></p> <p><span><span><span>“Our mission remains focused on unlocking the true potential of 5G through the development and commercialization of advanced, American-made wireless infrastructure,” McIntire said. “By leveraging the proven integration capabilities of Widelity with the research capabilities of the Mason team, we believe that not only will we be able to advance 5G technology, but we will greatly expand the potential use cases of this technology for customers across both government and commercial sectors.”</span></span></span></p> <p><span><span><span>Parag Singh, the managing director at Widelity, called the joint effort “an organized digital innovation partnership bringing technology, academia, and integration components to solve complex problems together.”</span></span></span></p> <p><span><span><span>“We believe that 5G/Cyber accelerator program with Mason and COMSovereign will create an organic entrepreneurial ecosystem and serve the regional economy via next-gen research expansion and growth in STEM talent,” Singh said.</span></span></span></p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/116" hreflang="en">Campus News</a></div> <div class="field__item"><a href="/taxonomy/term/7011" hreflang="en">5G</a></div> <div class="field__item"><a href="/taxonomy/term/8241" hreflang="en">5G/6G Wireless Communications</a></div> <div class="field__item"><a href="/taxonomy/term/3071" hreflang="en">College of Engineering and Computing</a></div> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/5396" hreflang="en">Cyber Living Innovation Lab</a></div> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> </div> </div> </div> </div> </div> Wed, 15 Sep 2021 16:14:32 +0000 John Hollis 52591 at Researchers receive over $1.5 million from DARPA to optimize security and energy tradeoff /news/2021-02/researchers-receive-over-15-million-darpa-optimize-security-and-energy-tradeoff <span>Researchers receive over $1.5 million from DARPA to optimize security and energy tradeoff</span> <span><span lang="" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Anonymous (not verified)</span></span> <span>Tue, 02/02/2021 - 12:47</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3051" hreflang="en">Cyber Security Research</a></div> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/6861" hreflang="en">Department of Electrical and Computer Engineering</a></div> <div class="field__item"><a href="/taxonomy/term/7011" hreflang="en">5G</a></div> <div class="field__item"><a href="/taxonomy/term/2076" hreflang="en">Military</a></div> <div class="field__item"><a href="/taxonomy/term/19046" hreflang="en">C-TASC</a></div> <div class="field__item"><a href="/taxonomy/term/19211" hreflang="en">WCC</a></div> <div class="field__item"><a href="/taxonomy/term/19146" hreflang="en">CEC faculty research</a></div> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/bmark" hreflang="und">Brian Mark</a></div> <div class="field__item"><a href="/profiles/kkhasawn" hreflang="und">Khaled Khasawneh</a></div> <div class="field__item"><a href="/profiles/kzeng2" hreflang="und">Kai Zeng</a></div> <div class="field__item"><a href="/profiles/spudukot" hreflang="und">Sai Manoj Pudukotai Dinakarrao</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:feature_image" data-inline-block-uuid="5bc55496-6015-4a54-bcca-baf67f3c4bbc" class="block block-feature-image block-layout-builder block-inline-blockfeature-image caption-below"> <div class="feature-image"> <div class="narrow-overlaid-image"> <img src="/sites/g/files/yyqcgq291/files/styles/feature_image_medium/public/2021-02/Copy%20of%20Untitled.png?itok=Kw_L3Vcg" srcset="/sites/g/files/yyqcgq291/files/styles/feature_image_small/public/2021-02/Copy%20of%20Untitled.png?itok=kt5g-r7o 768w, /sites/g/files/yyqcgq291/files/styles/feature_image_medium/public/2021-02/Copy%20of%20Untitled.png?itok=Kw_L3Vcg 1024w, /sites/g/files/yyqcgq291/files/styles/feature_image_large/public/2021-02/Copy%20of%20Untitled.png?itok=Tz-GhR5X 1280w, " sizes="(min-width: 1024px) 80vw,100vw" alt="Collage of four professors, Sai, Kai, Khaled and Brian. " /></div> </div> <div class="feature-image-caption"> <div class="field field--name-field-feature-image-caption field--type-text-long field--label-hidden field__item"><p>Sai Manoj Pudukotai Dinakarrao, Kai Zeng, Khaled Khasawneh, and Brian Mark are collaborating with researchers at Virginia Tech to optimize the safety and energy-efficient tradeoff.  </p></div> </div> </div><div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p>The capabilities and reach of 5G are expanding, but with new capabilities come new security challenges. Four Mason Engineering researchers received a $1.6 million grant from DARPA to tackle one of the many security issues that 5G poses as part of a larger <a href="https://www.darpa.mil/">DARPA</a> initiative called <a href="https://www.darpa.mil/program/open-programmable-secure-5g">Open, Programmable, Secure 5G (OPS-5G)</a>. </p> <p>The <a href="https://volgenau.gmu.edu/research/grants">grant</a>, entitled EPIC SWaPD: Energy Preserving Internet of Things (IoT) Cryptography for Small Weight and Power Devices, aims to optimize the security and energy efficiency tradeoff by creating a low-energy security architecture for various types of IoT devices.  </p> <p>“In a network, there are many different devices of different sizes and capabilities. Many of these devices don’t have much computing power or battery life, and a common cybersecurity attack on these devices is to drain their battery life,” says <a href="https://volgenau.gmu.edu/profiles/bmark">Brian Mark</a>, co-principal investigator on the grant.  </p> <p>Mark, <a href="https://volgenau.gmu.edu/profiles/kkhasawn">Khaled Khasawneh</a>, <a href="https://volgenau.gmu.edu/profiles/kzeng2">Kai Zeng,</a> and <a href="https://volgenau.gmu.edu/profiles/spudukot">Sai Manoj Pudukotai Dinakarrao</a> in the <a href="https://ece.gmu.edu/">Department of Electrical and Computer Engineering</a> are collaborating with the company Kryptowire and Assistant Professor Matthew Hicks from <a href="https://vt.edu/">Virginia Tech</a> for the project.  </p> <p>These small IoT devices could be as simple as a thermometer or humidity sensor that is part of a larger smart home system. “These sensors can be very tiny, and they have limited computation and communication capabilities. The first step for each of these types of sensors would be to bootstrap, or link, a secure connection to the network, which requires authentication without pre-shared secrets. This is where the vulnerabilities lie,” says Kai Zeng.  </p> <p>When sensors or other types of small IoT devices must automatically authenticate themselves, attackers have many paths of attack. They can drain the device's battery, rendering it useless, or steal sensitive information or data from the device. Because of the many pathways that attackers could use to harm these devices, the team is combining cryptography, network protocol design, and machine learning to assure the success and scalability of their efforts.  </p> <p>“Something really important for this effort is that the security architecture operates on the principles of zero trust and least privilege,” says Mark. “Zero trust means that when a device comes in and wants to join the network, the assumption is that there is no prior trust or information shared between the devices, while least privilege implies the minimum permissions are granted to the entity to perform its task. So, we needed to bootstrap the security association and grant an entity just enough authority to access the devices or data that it needs but no more than that.”  </p> <p>One way they are looking at securing the connection is through gait-inspired authentication, which leverages the kinetic energy generated by a human user. “Every device harvests energy in a different way, and we use the harvesting pattern for authentication of the device, which preserves energy and accomplishes a security task at the same time,” says Dinakarrao.  </p> <p>Another approach is to exploit the “always-on” sensors in some devices like smartphones. “We plan to employ always-on sensing to perform the exchange of device identification and cryptographic material,” says Khasawneh. </p> <p>They are also using machine learning to ensure both authentication and authorization of different devices. “We not only have to authenticate the devices and entities that are allowed on a network, but we have to verify their different roles and privileges. I might be granted access to the information that tells me the temperature of a room, but perhaps I might not have the authorization to change the thermostat setting,” says Mark. “Using graph-based models, we can verify the trust relationships of different devices or entities and this process can be accelerated using machine learning techniques,” adds Dinakarrao.  </p> <p>Long-term, the team aspires for their security architecture to easily be applied to other devices. “When we talk about the energy and security tradeoff, we have to think about how we can do things in a smart way to conserve energy while enhancing security. But we also need to think about how to make our architecture scalable to larger, more geographically distributed networks. Right now, this work is with smaller devices, but the hope is that our overall security architecture can apply to a variety of devices with different capabilities,” says Mark. </p> </div> </div> </div> </div> </div> Tue, 02 Feb 2021 17:47:20 +0000 Anonymous 97806 at