Department of Computer Science and Engineering and the South Carolina Information Technology Institute - PowerPoint PPT Presentation

About This Presentation
Title:

Department of Computer Science and Engineering and the South Carolina Information Technology Institute

Description:

... Secure VANET communication Computer Science and ... Department of Computer Science and Engineering and the South Carolina Information Technology ... – PowerPoint PPT presentation

Number of Views:568
Avg rating:3.0/5.0
Slides: 14
Provided by: bue6
Learn more at: https://cse.sc.edu
Category:

less

Transcript and Presenter's Notes

Title: Department of Computer Science and Engineering and the South Carolina Information Technology Institute


1

Information Assurance Research Department of
Computer Science and Engineering University of
South Carolina, Columbia
2
Faculty in Information Assurance
  • 3 faculty members with primary interest in IA
  • Csilla Farkas Information assurance, web data
    security and privacy, damage and social
    vulnerability analysis of cyber attacks
  • Chin-Tser Huang Intrusion detection, wireless
    security, network protocols
  • Wenyuan Xu Wireless networking and security,
    sensor networks, jamming detection and avoidance
  • 6 faculty members with IA-related research
  • Duncan Buell, Caroline Eastman, Stephen Fenner,
    Michael Huhns, Manton Matthews, and John Rose

3
Csilla Farkas
  • Associate Professor (2000 present)

4
Research Directions
  • Semantic Web security
  • Data and meta-data security
  • Secure information sharing
  • Web application security
  • Critical Infrastructure Protection
  • Economic and social aspects of cyber attacks
  • SCADA systems security
  • Other Research
  • Policy Compliance
  • Online Privacy
  • Open source intelligence
  • Secure VANET communication

5
Secure Semantic Web
  • Web Data and Metadata Security
  • Semantic-Aware XML access control
  • RDF security policy
  • Stream data security
  • Web Services (WS) Security
  • Service-level security across heterogeneous
    domains
  • Identity and trust management
  • Execution correctness, WS transactions

6
Damage Assessment and Social Vulnerability
  • Damage Estimation and Social Vulnerability
  • Damage of the target may not reflect the real
    amount of damage
  • Services may rely on the attacked service,
    causing a cascading and escalating damage
  • Identify characteristics to evaluate
    vulnerability of different social strata for
    cyber attack consequences
  • Support decision makers to
  • Evaluate risk and consequences of cyber attacks
  • Support methods to prevent, deter, and mitigate
    consequences of attacks

7
Chin-Tser Huang
  • Assistant Professor (2003 present)

8
Wenyuan Xu
  • Associate Professor (2007 present)

9
Wireless networking and security
  • Interested in non-traditional security and
    privacy issues for emerging wireless systems
  • Vehicular networks, Sensor networks..
  • Like to deal with real systems, play with cool
    gadgets.
  • Like to break thing first, then build a solution

Computer Science and Engineering
10
Radio Interference/Jamming Attacks in Wireless
Networks
  • Wireless networks
  • Communicate via shared media
  • Channel access protocol carrier sense based
  • Threats
  • Unintentional radio interference 802.11b/g,
    cordless phone, Bluetooth, Microwave oven share
    the same frequency band
  • Intentional jamming A transmitter overrides any
    signal with enough power
  • Research
  • Jamming detection distinguish between radio
    interference scenario from normal network
    dynamics, including congestion, hardware failure,
    mobility
  • Jamming defenses resume network connectivity in
    the presence of jamming
  • Channel Surfing
  • Timing channel

Computer Science and Engineering
11
Security Analysis of TPMS
  • TPMS - Tire Pressure Monitoring Systems
  • Monitoring the air pressure inside tires in
    automobiles.
  • All cars made after 2008 are mandated to install
    TPMS
  • Any secure or any privacy issues?
  • Can we eavesdrop?
  • Can we inject fake packets?
  • Not much TPMS information available in public
    domains.
  • gt Reverse engineered communication protocols

12
Privacy Issues in Wireless Networks
  • Content-Oriented Security and Privacy
  • Issues that arise because an adversary can
    observe and manipulate the exact content in a
    sensor message.
  • Best addressed through cryptography and network
    security.
  • Context-Oriented Privacy (what we are
    interested)
  • Issues that arise because an adversary observes
    the context surrounding creation and transmission
    of a sensor message.
  • Example sink location privacy in sensor networks.

ATM
12
13
  • Contact Information
  • Center for Information Assurance Engineering
  • http//www.cse.sc.edu/research/isl
Write a Comment
User Comments (0)
About PowerShow.com