Center for Wireless Network Security
WiNSeC
- Dr. Patrick White
- Assoc. Director – WiNSeC
Office: 201-216-5028 pw hite1@ stevens-tech.edu October 29, 2003
WiNSeC Dr. Patrick White Assoc. Director WiNSeC Office: - - PowerPoint PPT Presentation
Center for Wireless Network Security WiNSeC Dr. Patrick White Assoc. Director WiNSeC Office: 201-216-5028 October 29, 2003 pw hite1@ stevens-tech.edu Wireless Network Security Center (WiNSeC) Principal areas of focus: Secure,
Office: 201-216-5028 pw hite1@ stevens-tech.edu October 29, 2003
Homeland Defense and Security:
– Physical layer vulnerabilities, including anti-jamming/eavesdropping – Spectrally efficient communications – Interoperability of wireless systems – Energy efficient sensor networks – Wireless cyber counter measures
– Visualization of sensor data – Decision aids
facilities for First Responders
Initial funding from DoD – administered by Picatinny Arsenal
MARI TI ME URBAN SUBURBAN
Ferry 1 Ferry 2 Ferry 3 Ferry 4 Ferry 5
L-Band Satellite MTS
Sports Field
Stevens Police
CDMA - Verizon Network
Teletype Hand- Held Applications
Ferry
Bluetooth
Networked Sensors Unmanned Sensor Control Ferry Pier
Satellite Network
Campus Wireless Network Internet Network Stevens Network
GPS Satellite
Situational Awareness Tools & Decision Aids Robust physical layer Upper mm λ, Free-space
spreading, etc Cyber Security detection & mitigation tools
Sensor Networking
information sharing
Networking
Interference Suppression
Tools
Applications
Management and Detection: Chaotic Direct Sequence Spread Spectrum
Tools
and Evaluation
CLIENT Wishes to compute statistics of servers’ data SERVERS Each holds large database
– Client learns desired statistics, but learns nothing else about data (including individual values or partial computations for each database – Servers do not learn which fields are queried, or any information about other servers’ data – Computation and communications are very efficient
5 10 15 20 25 30 20,000 40,000 60,000 80,000 100,000
Database size Time (minutes)
Total time
Confidential e-mail Problem: Data leaving owners environment has limited protection
encryption to maintain owner control
– Data protected by type and encryption – Copy operations on local and/or remote machines controlled by type checking
Hoc Sensor network fields to a variety of cyber and/or combination (cyber/physical) attacks that disrupt routing tables:
– Disconnect network nodes – Degrade good-put – Hi-jack traffic to/from selected nodes – Force traffic through a limited number (1?) of nodes to degrade performance, deplete power, etc.
Noisy Input Data Clean Data
Facial Reconstruction Facial Feature Line-Based Grids
– No digging required – install, aim and go
heavy fog
Funded by DARPA
no strong differences for classical NIR systems. Fog concentration increased with time
strongest losses (> 40dB)
losses (~40dB)
losses (~3dB)
15:07 15:21 15:36 15:50 16:04 16:19
Transmission losses [dB] Time
W avelength: 830 nm 1.3 µm 1.55 µm 8 µm
greater 10 GHz !
electrical noise and free radiation
5 GHz
0.1 1 10
Background
Modulation response [dB] Frequency [GHz]
point-to-point Ethernet up to 1km
beams cover small areas (less beam divergence, more limited propagation)
provide in-building security; e.g., confine propagation to room.
guaranteeing relatively clean signal reception.
more sensitive to heavy rain
Fiber Optic Backbones
UTP 5 User Terminal Transparent Software Integration Layer 802.11b, 802.11a Satellite Coaxial Fiber optic UTP 5 User Terminal 802.11b, 802.11a Satellite Coaxial Fiber optic Authentication Accounting Wide Area Network Gateway Authorization Transparent Software Integration Layer CDMA, GPRS FSO, Microwave FSO, Microwave CDMA, GPRS Authentication Accounting Wide Area Network Gateway Authorizationnetworks
best available capability
Coverage
energy efficiency
in security
networks – interoperability with national coverage, minimal dead spots
performance
deployment interval