Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Physical Sciences and Mathematics

Trusted Digital Twin Network For Intelligent Vehicles, Asad Malik, Ayan Roy, Sanjay Madria Jan 2024

Trusted Digital Twin Network For Intelligent Vehicles, Asad Malik, Ayan Roy, Sanjay Madria

Computer Science Faculty Research & Creative Works

Vehicle-to-vehicle (V2V) infrastructure facilitates wireless communication among vehicles within close proximity. This allows sharing of contextual information such as speed, location, direction, traffic, route closures, human behavior mental conditions to improve traffic flow, reduce collisions, and enhance safety on the road. However, the assumption of honest peers along with the over-reliability on the information shared in the network can pose a serious threat to human safety. A digital twin is a concept that enables a system to develop a virtual environment that mimics the real-life scenario for any situation. The availability of powerful computing equipment inside vehicles can be leveraged …


Mobilytics: Mobility Analytics Framework For Transferring Semantic Knowledge, Shreya Ghosh, Soumya K. Ghosh, Sajal K. Das, Prasenjit Mitra Jan 2024

Mobilytics: Mobility Analytics Framework For Transferring Semantic Knowledge, Shreya Ghosh, Soumya K. Ghosh, Sajal K. Das, Prasenjit Mitra

Computer Science Faculty Research & Creative Works

The proliferation of sensor-equipped smartphones has led to the generation of vast amounts of GPS data, such as timestamped location points, enabling a range of location-based services. However, deciphering the spatio-temporal dynamics of mobility to understand the underlying motivations behind travel patterns presents a significant challenge. his paper focuses on how individuals' GPS traces (latitude, longitude, timestamp) interpret the connection and correlations among different entities such as people, locations or point-of-interests (POIs), and semantic contexts (trip-purpose). We introduce a mobility analytics framework, named Mobilytics designed to identify trip purposes from individual GPS traces by leveraging a “mobility knowledge graph” (MKG) …


Three Point Encryption (3pe): Secure Communications In Delay Tolerant Networks, Roy Cabaniss, Vimal Kumar, Sanjay Madria Dec 2012

Three Point Encryption (3pe): Secure Communications In Delay Tolerant Networks, Roy Cabaniss, Vimal Kumar, Sanjay Madria

Computer Science Faculty Research & Creative Works

Mobile ad hoc networks (MANET) are a subset of Delay Tolerant Networks (DTNs) composed of several mobile devices. These dynamic environments make conventional security algorithms unreliable, nodes that are far apart may not have access to the other's public key, making secure message exchange difficult. Other security methods rely on requesting the key from a trusted third party, which can be unavailable in DTN. the purpose of this paper is to introduce two message security algorithms capable of delivering messages securely against either eavesdropping or manipulation. the first algorithm, Chaining, uses multiple midpoints to re-encrypt the message for the destination …


Information Flow Security In Cyber-Physical Systems, Thoshitha Gamage, Ravi Akella, Thomas Roth, Bruce Mcmillin Dec 2011

Information Flow Security In Cyber-Physical Systems, Thoshitha Gamage, Ravi Akella, Thomas Roth, Bruce Mcmillin

Computer Science Faculty Research & Creative Works

Preserving the confidentiality of sensitive internal actions is a unique challenge in Cyber-Physical Systems (CPSs) due to the inherent external observability of such systems and the tight coupling between their cyber and physical domains. the far-reaching objective of this work is to develop a science of self-obfuscating systems based on the composition of simple building blocks. a model of Nondeducibility composes the building blocks under information flow security properties. to this end, this paper proposes fundamental theories on external observability for basic regular networks and the concept of "event compensation". Copyright © 2011 ACM.


Providing End-To-End Secure Communications In Wireless Sensor Networks, Wenjun Gu, Neelanjana Dutta, Sriram Chellappan, Xiaole Bai Sep 2011

Providing End-To-End Secure Communications In Wireless Sensor Networks, Wenjun Gu, Neelanjana Dutta, Sriram Chellappan, Xiaole Bai

Computer Science Faculty Research & Creative Works

In many Wireless Sensor Networks (WSNs), providing end to end secure communications between sensors and the sink is important for secure network management. While there have been many works devoted to hop by hop secure communications, the issue of end-to-end secure communications is largely ignored. in this paper, we design an end-to-end secure communication protocol in randomly deployed WSNs. Specifically, our protocol is based on a methodology called differentiated key pre-distribution. the core idea is to distribute different number of keys to different sensors to enhance the resilience of certain links. This feature is leveraged during routing, where nodes route …


Environmental Obfuscation Of A Cyber Physical System - Vehicle Example, Jason Madden, Bruce M. Mcmillin, Anik Sinha Jul 2010

Environmental Obfuscation Of A Cyber Physical System - Vehicle Example, Jason Madden, Bruce M. Mcmillin, Anik Sinha

Computer Science Faculty Research & Creative Works

Cyber-Physical Systems (CPSs) are deeply embedded infrastructures that have significant cyber and physical components that interact with each other in complex ways. These interactions can violate a system's security policy, leading to unintended information flow. The physical portion of such systems is inherently observable, and, as such, many methods of preserving confidentiality are not applicable. This fundamental property of CPSs presents new security challenges. To illustrate this, a vehicle composed of an embedded computer system, its operator, and its environment show how information is disclosed to an observer that is watching from the outside. The example is made of up …


Complexities Of Information Security In Cyber-Physical Power Systems, Bruce Mcmillin Sep 2009

Complexities Of Information Security In Cyber-Physical Power Systems, Bruce Mcmillin

Computer Science Faculty Research & Creative Works

Cyber-Physical Power Systems consist of significant cyber components that mange the physical electric power infrastructure under distributed control of power electronics devices. This represents a departure from more centralized SCADA-type control. NERC Critical Infrastructure Protection standards emphasize the need to protect the power infrastructure from both cyber and physical attacks. Complex interactions between the cyber and physical worlds introduce new vulnerabilities that go beyond those found in the purely computer world. in this paper, some of these new vulnerabilities are described and a direction is suggested to determine and mitigate these vulnerabilities. © 2009 IEEE.


Node Security In Hierarchical Sensor Networks: Distribution Of Functions Versus Keys, Biswajit Panja, Sanjay Madria Sep 2009

Node Security In Hierarchical Sensor Networks: Distribution Of Functions Versus Keys, Biswajit Panja, Sanjay Madria

Computer Science Faculty Research & Creative Works

Secure communication involving cluster heads in a sensor network is vital as they are responsible for data aggregation and for taking important decisions in their groups. in this article, we propose a scheme for secure communication via such nodes in a sensor network. in our approach, the base station provides a function to the cluster head of each group, which is used to compute the key for the secure communication with the base station. the protocol is first elucidated for a fixed cluster head in each group and later it is extended for dynamic cluster heads. Each function is computed …


Generalized Neuron Based Secure Media Access Control Protocol For Wireless Sensor Networks, Raghavendra V. Kulkarni, Ganesh K. Venayagamoorthy, Abhishek V. Thakur, Sanjay Kumar Madria Mar 2009

Generalized Neuron Based Secure Media Access Control Protocol For Wireless Sensor Networks, Raghavendra V. Kulkarni, Ganesh K. Venayagamoorthy, Abhishek V. Thakur, Sanjay Kumar Madria

Electrical and Computer Engineering Faculty Research & Creative Works

Security plays a pivotal role in most applications of wireless sensor networks. It is common to find inadequately secure networks confined only to controlled environments. The issue of security in wireless sensor networks is a hot research topic for over a decade. This paper presents a compact generalized neuron (GN) based medium access protocol that renders a CSMA/CD network secure against denial-of-service attacks launched by adversaries. The GN enhances the security by constantly monitoring multiple parameters that reflect the possibility that an attack is launched by an adversary. Particle swarm optimization, a popular bio-inspired evolutionary-like optimization algorithm is used for …


Localizing Sensor Networks In Un-Friendly Environments, Sriram Chellappan, Vamsi Paruchuri, Dylan Mcdonald, Arjan Durresi Nov 2008

Localizing Sensor Networks In Un-Friendly Environments, Sriram Chellappan, Vamsi Paruchuri, Dylan Mcdonald, Arjan Durresi

Computer Science Faculty Research & Creative Works

In this paper, we study the issue of defending against a wireless sensor network (WSN) that has been deployed by a malicious enemy agent in an area of interest to us. While there can be many approaches to defend against maliciously deployed WSNs, we propose the design of a localization centric approach. Specifically, the problem we address is: given an enemy deployed WSN in an area of interest to us, how can we determine locations of the sensors without co-operating with the sensors themselves during localization. In our approach, we employ a physically mobile agent called the localizer (e.g., a …


Survey Of Supercomputer Cluster Security Issues, George Markowsky, Linda Markowsky Jun 2007

Survey Of Supercomputer Cluster Security Issues, George Markowsky, Linda Markowsky

Computer Science Faculty Research & Creative Works

The authors believe that providing security for supercomputer clusters is different from providing security for stand-alone PCs. The types of programs that supercomputer clusters run and the sort of data available on supercomputer clusters are fundamentally different from the programs and data found on stand-alone PCs. This situation might attract a different type of attacker with different goals and different tactics. This paper discusses the results of a questionnaire sent out to many supercomputer clusters in the United States and relates them to a literature search that was also undertaken. These results suggest approaches that can be taken to further …