Stevens Researcher Wins Army Research Office Grant to Ensure Secure Wireless Communication
Research provides resilient encryption in the absence of supporting infrastructure
Hoboken, NJ, August 08, 2013 --(PR.com)-- In order to strengthen the security of wireless communications in the battlefield, Dr. Yingying Chen of the Department of Electrical and Computer Engineering at Stevens Institute of Technology has been awarded a three-year grant from the Army Research Office (ARO). Her innovative research on mobile wireless security will aid mobile nodes operating outside supporting infrastructure—for instance soldiers or vehicles performing mission-critical tactical tasks in hostile battlefield environments—which provide significant challenges to secure communication.
Dr. Chen has formulated new methods of authentication that can generate secret keys based on hard-to-falsify physical properties, potentially ensuring secure wireless communication for the armed forces. The processes can also be applied to civilian uses, allowing members of an organization to work securely even when they are outside the bounds of that organization’s supporting infrastructure.
“With the rapid advancement of wireless technologies, over-the-air communication has played a crucial role in supporting numerous military and civilian applications,” says Dr. Michael Bruno, Dean of the Charles V. Schaefer, Jr. School of Engineering and Science. “Technologies that can guarantee the security of wireless transmissions in remote surroundings would go a long way toward ensuring the effectiveness of military missions and the safety of the servicemen and women who carry them out.”
Wireless transmitters and receivers need to be able to assure secure and reliable data delivery in order to enable proper response to scenarios that threaten the availability of wireless communications. However, effective user authentication and secure communication for ad hoc networks in the battlefield remain challenging due to the lack of specialized security devices. Mobile nodes must collaborate in order to provide secure data exchange, and the establishment of keys in this manner is vulnerable to eavesdropping.
Dr. Chen has proposed the establishment of a holistic framework that allows communicating nodes to make inferences of physical properties of a network transmission to enhance wireless security. In networking, the physical layer defines the parameters for sending raw bits in a network—what medium is used, the electrical connectors, the frequencies for transmission, etc. Since wireless transmissions travel through the air rather than the more controlled environment within a wire, physical layer properties in wireless communication vary over time and include a degree of randomness from the environment. The use of these physical properties for authentication is an attractive option because it would eliminate the need for supporting encryption infrastructure by supplementing properties that have already been implemented rather than creating a new system.
“As wireless communications become increasingly prevalent in our society, Dr. Chen stands at the forefront of wireless technology security researchers who are scrutinizing and adapting information security for the future,” says Dr. Yu-Dong Yao, Director of the Department of Electrical and Computer Engineering.
Dr. Yingying (Jennifer) Chen co-authored the book Securing Emerging Wireless Systems in 2009 and published over 70 journal articles and referred conference papers. She is the director of Data Analysis and Information Security (DAISY) Lab at Stevens. She is the recipient of the NSF CAREER Award 2010 and Google Research Award 2010. She was honored with a New Jersey Inventors Hall of Fame Innovators Award 2012. Her research has been reported in numerous media outlets including the Wall Street Journal, MIT Technology Review, Inside Science, NPR, and CNET.
About Electrical and Computer Engineering
Stevens Department of Electrical and Computer Engineering is home to a distinguished faculty conducting research on cutting edge hardware and software, supporting new horizons in wireless and multimedia networking, cognitive radio, and signal processing. Complementary instructional and hands-on lab facilities facilitate thorough theoretical and applied learning experiences at both the undergraduate and graduate levels. Funded research on campus and active partnerships between departments and regional institutions provide students with rich opportunities to explore problems on the horizon in electronic and data technologies.
Learn more: www.stevens.edu/ses/ece
Dr. Chen has formulated new methods of authentication that can generate secret keys based on hard-to-falsify physical properties, potentially ensuring secure wireless communication for the armed forces. The processes can also be applied to civilian uses, allowing members of an organization to work securely even when they are outside the bounds of that organization’s supporting infrastructure.
“With the rapid advancement of wireless technologies, over-the-air communication has played a crucial role in supporting numerous military and civilian applications,” says Dr. Michael Bruno, Dean of the Charles V. Schaefer, Jr. School of Engineering and Science. “Technologies that can guarantee the security of wireless transmissions in remote surroundings would go a long way toward ensuring the effectiveness of military missions and the safety of the servicemen and women who carry them out.”
Wireless transmitters and receivers need to be able to assure secure and reliable data delivery in order to enable proper response to scenarios that threaten the availability of wireless communications. However, effective user authentication and secure communication for ad hoc networks in the battlefield remain challenging due to the lack of specialized security devices. Mobile nodes must collaborate in order to provide secure data exchange, and the establishment of keys in this manner is vulnerable to eavesdropping.
Dr. Chen has proposed the establishment of a holistic framework that allows communicating nodes to make inferences of physical properties of a network transmission to enhance wireless security. In networking, the physical layer defines the parameters for sending raw bits in a network—what medium is used, the electrical connectors, the frequencies for transmission, etc. Since wireless transmissions travel through the air rather than the more controlled environment within a wire, physical layer properties in wireless communication vary over time and include a degree of randomness from the environment. The use of these physical properties for authentication is an attractive option because it would eliminate the need for supporting encryption infrastructure by supplementing properties that have already been implemented rather than creating a new system.
“As wireless communications become increasingly prevalent in our society, Dr. Chen stands at the forefront of wireless technology security researchers who are scrutinizing and adapting information security for the future,” says Dr. Yu-Dong Yao, Director of the Department of Electrical and Computer Engineering.
Dr. Yingying (Jennifer) Chen co-authored the book Securing Emerging Wireless Systems in 2009 and published over 70 journal articles and referred conference papers. She is the director of Data Analysis and Information Security (DAISY) Lab at Stevens. She is the recipient of the NSF CAREER Award 2010 and Google Research Award 2010. She was honored with a New Jersey Inventors Hall of Fame Innovators Award 2012. Her research has been reported in numerous media outlets including the Wall Street Journal, MIT Technology Review, Inside Science, NPR, and CNET.
About Electrical and Computer Engineering
Stevens Department of Electrical and Computer Engineering is home to a distinguished faculty conducting research on cutting edge hardware and software, supporting new horizons in wireless and multimedia networking, cognitive radio, and signal processing. Complementary instructional and hands-on lab facilities facilitate thorough theoretical and applied learning experiences at both the undergraduate and graduate levels. Funded research on campus and active partnerships between departments and regional institutions provide students with rich opportunities to explore problems on the horizon in electronic and data technologies.
Learn more: www.stevens.edu/ses/ece
Contact
Stevens Institute of Technology
Christine del Rosario
201-216-5561
http://research.stevens.edu/index.php/chen-wireless-authentication-army
Contact
Christine del Rosario
201-216-5561
http://research.stevens.edu/index.php/chen-wireless-authentication-army
Categories