<

Research Interests

  • Aviation security

  • Designed a physical layer authentication for NextGen ADS-B messages. ADS-B messages are broadcasted by aircraft which has its location, velocity, and other identification information. These are proposed to replace the present RADAR system when NextGen is implemented. Proposed to use Doppler spread value extracted from wireless signal to verify the embedded value of location and velocity in the ADS-B message.


  • Cyber security's interaction with social networks

  • Addressed the problem of modeling and analyzing cyber attacks using a multimodal graph approach. The main idea was to formulate the stages, actors, victims, and outcomes of cyber attacks as a multimodal graph, where several graphs of various modalities were combined to represent the attributes of the attack. Multimodal graph nodes included cyberattack victims, adversaries, autonomous systems (ASes) used to perpetrate the attacks, and the observed cyber events. To formulate multimodal graphs, single-modality graphs were interconnected according to their interaction during the cyber attack. Once the graph model was constructed, we applied community and centrality analysis to obtain in-depth insights into the attack. In community analysis, we clustered those multimodal graph nodes that exhibit "strong" inter-modal ties. We further used centrality to rank the graph nodes according to their importance in the attack. By classifying nodes according to centrality, we deduced the progression of the attack from the attacker nodes to the targeted nodes. Using these results, we applied our methods to two popular case studies, namely GhostNet and Putter Panda and demonstrated a clear distinction in the attack stages.


  • IoT security

  • Designed a physical layer pairing protocol for IoT devices. IoT devices when introduced in a network to connect to a hub such as the wireless router, do not share a secret with the hub. Proposed a technique to authentication and key-exchange between IoT device and the hub with a helper of a pre-paired device. Also proposed group pairing protocol to pair multiple devices in a single session.


  • Secure voting algorithm

  • Voting algorithms are used by wireless systems when a group of wireless nodes needs to come to a definitive decision. General voting algorithms are implemented on higher layers of OSI model with cryptography. Hence, it takes longer time and higher overhead. Proposed a secure voting algorithm in which energy is injected on different subcarriers in OFDM, such that adversary cannot change the voting outcome.