Center Overview - Institute for Networking and Security Research
Download
Report
Transcript Center Overview - Institute for Networking and Security Research
Networking and Security Research Center
http://nsrc.cse.psu.edu/
Professor Thomas F. La Porta, Director
Department of Computer Science and Engineering
Penn State, 10-5-05
0
Networking and Security Research Center
Large group of networking, security and systems experts
– 10 faculty
– Approximately 50 students
• Ph.D., M.S. and Schreyer Honors College Seniors
• 8 Ph.D. graduates
– 3 Labs in addition to individual research groups
Diverse Expertise
– Wireless networking and communications
– Performance
– Software systems
– Routing
– Distributed algorithms
– All aspects of security: networking, protocols, systems, access controls and policies
Industrial partners
– Telcordia Technologies (Full)
– Raytheon (Associate)
Penn State, 10-5-05
1
Accomplishments
Research Results (details later)
– 14 major journal publications
– Over 30 conference publications
• ACM Conference on Computer and Communications Security (CCS), ACM MobiHoc, IEEE INFOCOM,
IEEE International Conference on Network Protocols (ICNP), International Conference on Distributed
Computing Systems (ICDCS), International Conference on Mobile Data Management (MDM), Annual
Computer Security Applications Conference (ACSAC)
– 45 NSRC Technical Reports
Funding: over $3M in new funding in 2005
– 8 NSF Grants: CyberTrust (3), Networking (2), Computer Systems, Research Infrastructure,
Communications
– Department of Defense
– Army Research Office (ARO)
– The Technology Collaborative (3)
– Industry: Cisco, Motorola, IBM
New Member: Trent Jaeger from IBM T.J. Watson
– operating systems security mechanisms and policies, access control, hypervisor security, source
code analysis for security, operating systems, mobile code security
Penn State, 10-5-05
2
Accomplishments
Awards (Faculty and Students)
– Thomas Alva Edison Patent Award
– IBM Faculty Award
– IEEE Computer Society Golden Core Award
– IEEE Computer Society Meritorious Service
– AT&T Wireless Fellowship
Appointments
– General Co-Chair, ACM Mobicom
– General Chair, Financial Cryptography
– Program Chair, USENIX Security
– Program Co-Chair, IEEE Infocom 2007
– Program Co-Chair, IEEE MASS
– Editorial Boards and Steering Committees: IEEE TMC, TWC, ToN
– Next Generation Networks Task Force for the President’s National Security Telecommunications
Advisory Panel
Penn State, 10-5-05
3
SIIS Laboratory (http://siis.cse.psu.edu)
Faculty
Prof. Trent Jaeger ([email protected])
operating systems security, policy design and analysis, source code analysis
Prof. Patrick McDaniel ([email protected])
network security, security modeling, critical infrastructure, security-typed languages, formal security
policy
Prof. Sencun Zhu ([email protected])
ad hoc and sensor networks, buffer-overflow and worm, p2p security
Funding:
Ongoing Projects:
National Science Foundation
LAN Security
Army Research Office/DOD
Secure Storage Systems
CISCO
Language Based Security
Motorola (SERC)
SE Linux
Raytheon (NSRC)
Telecommunications Security
Self-healing Sensor Networks
Students (8 PhD , 4 MS)
Factoids: Established September 2004, (15 major publications, 6 TRs),
Location - 344 IST Building - contact [email protected]
Penn State, 10-5-05
4
Mobile Computing and Networking (MCN) Lab
(http://mcn.cse.psu.edu/)
MCN lab conducts research in many areas of wireless networks and mobile
computing, with an emphasis on designing and evaluating mobile systems,
protocols, and applications.
Projects
– secure sensor networks, collaborative data access in mobile P2P networks, mobile sensor
networks, data centric sensor networks, resource management in wireless networks
Students: 7 PhD, 3 MS, and 3 honor BS students
– Alumni: 3 Ph.D.
• Faculty members at Iowa State University and Florida
International University
• Motorola Research
• 9 MS students went to various companies
Support: NSF (CAREER, ITR, NeTS/NOSS, CT, CNS), Army
Research Office, DARPA, Telcordia (NSRC), PDG/TTC
and member companies Cisco, IBM and 3ETI
Contact: Prof. Guohong Cao, [email protected]
Penn State, 10-5-05
5
Wireless Communication and Networking Laboratory
(http://labs.ee.psu.edu/labs/wcan)
The Wireless Communication and Networking Lab performs fundamental research on
wireless communication network design
Students (all from Electrical Engineering)
– 4 Ph.D., 3 MS, 1 senior
Support
– Three awards from the National Science Foundation (NSF)
– Pittsburgh Digital Green House (PDG)
– Pennsylvania Infrastructure for Technology Alliance (PITA)
– Networking and Security Research Center - Telcordia
Academic collaborators
– Penn State (NSRC), UMD, Lehigh
Industrial Partners
– Telcordia (via NSRC)
– 7 PDG member companies
Contact: Prof. Aylin Yener, [email protected]
Penn State, 10-5-05
WCAN
@PSU
6
Research Areas: Telecom Security
Current Cellular
Next Generation
Home Location
Registers
Mobile
Switching
Centers
IP Services
Closed
Control
Network (SS7)
Closed Network
Attacks are possible, but rare
Servers
2G Cellular
3G Cellular/
All-IP
Two new dangers:
Very open environment
Passage into SS7 network
Tom La Porta and Patrick McDaniel
–
Exploiting open interfaces to wireless services
•
GSM Short Message Service
– Toolkits for detecting possible attacks on 3G networks
• Map migration of data corruption across networks
– Maintaining privacy when providing Location-Based Services (with IBM)
• Tune security and flexibility
Penn State, 10-5-05
7
Research Areas: Secure Sensor Networks
Adversary injecting &
modifying data
Powerful nodes
with better
comm
capabilities
Simple nodes
with limited
power
No central
controller
Sencun Zhu, Guohong Cao, and Tom La Porta
– Security and privacy in data centric networks
• Share data between authorized applications and users
– Network access control in ad hoc networks
• Neighbor and location verification
– Hybrid security solutions for sensor networks (with 3ETI)
• Leverage powerful nodes and backbone connectivity when possible
Penn State, 10-5-05
8
Research Areas: Internet Security
16
organizations
delegate
80% of
addresses
Delegations
must be
authorized
efficiently
Current address use in the Internet
Patrick McDaniel, Sencun Zhu and Trent Jaeger
– BGP Security (with AT&T)
• Combats attacks on origins and paths
– ARP Security
• Combats impersonation attacks enabled by the use of ARP
– Linux IPSec (with IBM)
• Per packet access controls
Penn State, 10-5-05
9
Research Areas: Security Test Beds and Tools
Large scale BGP simulation – up to 20,000 autonomous systems will
be simulated on the DETER test bed
George Kesidis, Chita Das and Patrick McDaniel
– Evaluation Methods for Internet Security Technology (EMIST)
• Framework for thoroughly evaluating defenses against worms, DDoS and attacks on routing (BGP)
– Tools for TCP
• Focus on attacks that exploit TCP congestion control
Penn State, 10-5-05
10
Research Areas: Trusted Computing and Systems
<Alice, Window, Create>?
Yes/No
Hook placement
X server
Policy
Server
Security-enhanced Operating System
Hook
effectiveness
Hook execution
Trent Jaeger and Patrick McDaniel
– Automatic placement of authorization hooks in Linux Security Modules
• Authenticate “operations”
– Mandatory Access Control in Xen-Linux Systems
• Enforce security goals
– Multi-level security in remote storage (with Raytheon)
• Grant access in distributed manner; compatible with SCSI
– Language-based tools for information flow control (with Motorola)
• Language ensures data of different security levels do not interact
– Trusted computing (with Intel)
• Novel approach to client puzzles to combat DDoS attacks
Penn State, 10-5-05
11
Research Areas: P2P/Overlay Networks
Wang-Chien Lee, Guohong Cao and Sencun Zhu
– Collaborative data access in mobile P2P networks
• Reduce latency of data access by intelligent sharing
– Security mechanisms for overlay networks
• Integration of key management and access controls
– Semantic small world
• Efficient p2p structure to reduce search path length and cost
Penn State, 10-5-05
12
Research Areas: Algorithms and Protocols for
Sensor Networks
sink
sink
S2
S2
S1
S1
S4
S3
First mission: perimeter monitoring
S4
S3
Second mission: target tracking
Guohong Cao, Tom La Porta and George Kesidis
– Controllable node mobility for mission oriented sensor networks
• Leverage mobility for coverage, fault recovery, routing and application-specific functions
– Energy efficient data collection in sensor networks (with Telcordia)
• Cross layer energy optimization scheme to increase network lifetime and connectivity of wireless
sensor networks
– Stateless routing for location aware sensor networks
• Voluntary forwarding
– Mobility prediction
• Improve effectiveness of cluster algorithms
Penn State, 10-5-05
13
Research Areas: Wireless and Mobile Networks
Group2
1
GW
BS
Orthogonal
links
GW
GW
2
2
1
1
Cell
1
2
Orthogonal
networks
Group1
1
Aylin Yener, Tom La Porta and Guohong Cao
– Wireless relay networks
• Improve overall network performance by forwarding to nodes with best wireless backhaul
• Consider different relay and forwarding and power control strategies
• Channel assignment algorithms
– RFID (with 3ETI and Vocollect)
• Improved media access protocols
– Mobile ML-IPSec (with 3ETI, Accipiter and Cisco)
• Enable wireless-specific performance enhancements in a secure network
Penn State, 10-5-05
14
Networking Research Center
Faculty
Raj Acharya
Guohong Cao
Chita Das
Trent Jaeger
George Kesidis
Department/College
Computer Science and Engineering
(CSE)/College of Engineering (COE)
CSE/COE
CSE/COE
CSE/COE
CSE & Electrical Engineering/COE
Thomas La Porta,
Director
Wang-Chien Lee
CSE/COE
Patrick McDaniel
John Metzner
CSE/COE
CSE & EE/COE
Aylin Yener
EE/COE
Sencun Zhu
CSE/COE and IST
Penn State, 10-5-05
CSE/COE
Expertise
QoS
Mobility, Distributed Systems
Network Performance
Secure operating systems
Network Performance,
Modeling, Pricing, Security
Mobility, Networking
Software, Telecommunications
Pervasive computing, Network
Services, Data Management
Network Security
Coding, Reliable Data
Communication
Wireless Communications,
Physical Layer Optimization,
Cross-layer Design
Network Security
15
Networking and Security Research Center
For Penn State
– Build relationships with Industry
– Define interesting and realistic research problems
– Diversify research collaborators
– Expose students to industrial research environments
– Increase impact of research
For companies
– Build relationship with Professors and students
– Develop new collaborations to solve interesting problems
– Partner on proposals
– Access to wide area of expertise
Members
– Telcordia Technologies (Full)
– Raytheon (Associate)
Penn State, 10-5-05
16
Remainder of the day…
Lunch
– Poster and demonstrations (outside Cybertorium, 344B)
Faculty Talks
– Cybertorium – 1:30-3:00
Center Discussion/Feedback
– Room 333 – Center Faculty, PSU Admin, and Industry guests only
Penn State, 10-5-05
17
Tom La Porta – Professor, CSE
Education
– PhD, Columbia University, Electrical Engineering
Background
– Director of Mobile Networking Research at Bell Labs until 2002
Professional Activities
– Founding Editor-in-Chief, IEEE Transactions on Mobile Computing
– Past Editor-in-Chief (Senior Advisor), IEEE Personal Communications
– General Co-Chair: ACM Mobicom 2005
– Program Co-Chair: IEEE ICNP 2004
Awards
–
–
–
–
–
Bell Labs Fellow
IEEE Fellow
Bell Labs Distinguished Technical Staff Award
IEEE Computer Society Golden Core Member
Thomas Alva Edison Patent Award
Expertise
– Mobile networking, wireless networking, secure telecommunication network signaling and control, protocol design
Support
–
–
–
–
–
National Science Foundation
DARPA/ONR MURI (subcontract through ARL)
Technology Collaborative/Pittsburgh Digital Greenhouse
IBM
NSRC
Penn State, 10-5-05
18
Tom La Porta – Projects
•
Evolution of all-IP Mobile Networks
– Network architectures and protocols for 3G/Mobile Internet interworking
•
Secure all-IP Mobile Telecommunication Networks
– Combat threats (exploit) introduced by interfaces to IP networks
•
Mobile Multilayered IPSec
– Improves security and performance in wireless, mobile networks
•
Secure Data Dissemination for sensor networks
– Efficient key distribution in constrained environments
•
Heterogeneous ad hoc relay networks of agile radios
– New architecture to improve performance and capacity
•
Node mobility for Robust Mission-Oriented Sensor Networks
– Deployment and relocation strategies for sensors
Penn State, 10-5-05
19
Guohong Cao – Associate Professor, CSE
Education
– PhD, Ohio State University, Computer Science
Professional Activities
– Associate Editor, IEEE Transactions on Mobile Computing
– Associate Editor, IEEE Transactions on Wireless Communications
– Guest Editor, ACM MONET special issues on Heterogeneous Wireless Networks, 2005
– Program Vice Chair: IEEE Int'l Conf. on Mobile Ad-hoc and Sensor Systems (MASS), 2005
– Program committee of IEEE ICDCS, ACM MOBICOM, IEEE ICNP and IEEE INFOCOM
Awards
– Presidential Fellowship at the Ohio State University
– NSF CAREER, 2001
Expertise
–
Mobile computing, wireless networks, sensor networks, wireless network security, distributed
fault-tolerant computing, resource management and data dissemination in mobile environments
Support
– NSF (ITR, CAREER, NeTs/NOSS, CT, CNS)
– Army Research Office
–
PDG/TTC
–
DARPA/ONR MURI (subcontract through ARL)
Penn State, 10-5-05
20
Guohong Cao – Projects
•
Collaborative Data Access in Mobile Peer-to-Peer Networks
– Improves performance in constrained environments through collaboration.
•
Controllable Node mobility for Mission-Oriented Sensor Networks
– Deployment and relocation strategies for sensors
•
Secure Wireless Sensor Networks
– Defend against node compromises; self-healing mechanisms for sensor networks
•
Mobile Multi-layered IP Security
– Improves security and performance in wireless, mobile networks
•
A Data-Centric Framework for Target Tacking and Data Dissemination in Sensor
Networks
– New architecture for wireless sensor networks
•
Designing Efficient Resource Management Schemes to Support Integrated Services
in Mobile Computing Systems
– Consider both power issues and QoS issues
•
Efficient Power Aware Data Access in Pervasive Computing Environment
– Consider both single-hop and multi-hop models
Penn State, 10-5-05
21
Wang-Chien Lee – Associate Professor, CSE
Education
– PhD, Ohio State University
Background
– 1996 - 2001, GTE/Version Research Laboratories, Inc.
– Research group at Penn State (2002-Present): Pervasive Data Access Research Group
(http://www.cse.psu.edu/pda)
Awards
– Excellence Award: GTE/Verizon Laboratories Incorporated (1997, 1999, 2000).
– Achievement Award: GTE/Verizon Laboratories Incorporated (1999).
Professional Activities
– Guest Editor, IEEE Transaction on Computer, IEEE Personal Communication Magazine, ACM
Mobile Networks and Applications (MONET), ACM Wireless Networks (WINET)
– Technical Program Chair: International Conference on Mobile Data Access (1999); International
Workshop on Pervasive Computing (2000); International Workshop on Wireless Networks and
Mobile Computing (2000/2001).
– Industrial Program Chair: International Conference on Mobile Data Management (2001-2002).
– Steering Committee: International Conference on Mobile Data Management
– TPC Member (2005): ICNP, ICDE, ICDCS, SAC, VLDB (Demo), DASFAA, MDM, NetDB
Expertise
– Pervasive Computing, Wireless Networks, Network Services, Data Management, TMN
Current & Past Support
– NSF, ARDA, GENUITY, RGC (Hong Kong)
Penn State, 10-5-05
22
Wang-Chien Lee - Projects
• Location-Based Information Access in Pervasive Computing
– Investigate new ways of indexing and caching spatial data in support of location based
services in pervasive computing environments.
• Semantic Small World: A Multi-Dimensional Overlay Network
– Design of a multi-dimensional overlay network, called semantic small world (SSW), that
facilitates efficient semantic based search in P2P systems.
– SSW is adaptive to distribution of data and locality of interest; is very resilient to failures; and
has great load balancing property.
• Protocols and Services for Location-Aware Wireless Sensor Networks
– Design of a suite of protocols, algorithms and services to provide energy-aware, time-efficient,
robust and scalable location-aware wireless sensor networks.
– Tackled research issues include communication collisions, communication voids, packet
losses, location errors, scalability, service latency and validity of services.
• Automata-Based XML Access Control for Networked Computing
– Design of a new XML access control mechanism, called QFILTER, for Internet-scale
networked information systems.
• Secure Wireless Data Broadcast
– Development of new air indexing and key management techniques to address the security
concerns in wireless data broadcast systems.
23
Penn State, 10-5-05
Patrick McDaniel – Assistant Professor, CSE
Director of the Systems and Internet Infrastructure Security Lab: http://siis.cse.psu.edu
Education
– PhD, University of Michigan, Electrical Engineering and Computer Science
Professional Activities
– Program Chair, 15th USENIX Security Symposium, August 2005.
– Vice-Chair, Security and Privacy Track, 14th World Wide Web Conference (WWW), May 2005.
– General Chair, Financial Cryptography 2006, February 2006
– Program Chair, Industry Track, 11th ACM Conference on Computer and Communications Security (CCS),
November 2004.
– Guest editor, Journal of Computer Networks, Special issue on Web Security, Summer 2005.
– Associate editor, ACM Transactions on Internet Technology (TOIT), April 2004-present.
– Program Committee Member (2005): ESORICS, ACSAC, CCS (I&G), ICIS, ACM EC SACMAT, SNS, ACNS,
USENIX Secuity, USENIX Technical
Expertise
– Systems security, security policy, network security, digital rights management, digital content and public policy,
network management, applied cryptography, privacy
Past and Current Support
– NSF (EMIST), NSF (Distributed Type-Secure Programming)
– DARPA (Dynamic Coalitions Program)
– USAF (P2INGS)
– Industry: Motorola, CISCO
Penn State, 10-5-05
24
Patrick McDaniel – Projects
•
Exploiting Open Functionality in SMS-Capable Cellular Networks
– Understanding and fixing evolving threats in cellular phone systems
•
Understanding Mutable Internet Pathogens
– Predicting and counteracting next-generation malware
•
Analysis of Communities of Internet in Data Networks
– Understanding interrelationships between users, hosts, and service locality
•
Path Validation in Interdomain Routing
– Design and application of efficient constructions for secure path discovery and
validation on the Internet
•
Internet Origin Disturbances
– Route announcement wave-fronts cause odd oscillation, explanation and
characterization
•
Collaborative Research: Flexible, Decentralized Information-flow Control for
Dynamic Environments
– Extending strong language type-safety to distributed environments
Penn State, 10-5-05
25
Trent Jaeger – Associate Professor, CSE
Co-Director of the Systems and Internet Infrastructure Security Lab: http://siis.cse.psu.edu
Education
– PhD, University of Michigan, Electrical Engineering and Computer Science
Professional Activities
– Program Chair, Industry Track, 10th ACM Conference on Computer and Communications
Security (CCS), November 2003.
– Program Chair, 6th ACM Symposium on Access Control Models and Technologies (SACMAT),
June 2001.
– Steering Committee, ACM Symposium on Access Control Models and Technologies
– Program Committee Member (2005): USENIX Security, ACSAC, ACM CCS (I&G), ACM
SACMAT, WWW Conference, SELinux Symposium
– Program Committee Member (past): IEEE Security & Privacy, ACM CCS, ESORICS
Expertise
– operating systems security mechanisms and policies, access control, hypervisor security,
source code analysis for security, operating systems, mobile code security
Penn State, 10-5-05
26
Trent Jaeger – Projects
•
Linux Security Analysis
– Develop source code and policy analysis tools to verify security properties in the Linux
kernel, system software, and security policies
•
Network Mandatory Access Control
– Extend the Linux Security Modules framework and policy languages to enable
mandatory access control among a coalition of machines
•
(Mostly) Automatic Generation of Reference Monitors
– Source code analyses to place complete, optimized reference monitor interfaces within
applications that enforce security properties (e.g., Xwindows, Apache, OpenSGL)
•
Hypervisor-Based Mandatory Access Control
– Enable hypervisors (e.g., Xen) to enforce mandatory access controls update its
resources and enable effective control of higher level resources (e.g., network) via
restricted Linux partitions
•
Hardware-based Integrity Measurement Architectures
– Research approaches to apply the Trusted Computing Group’s Trusted Platform
Module to enable remote parties to verify the integrity of a system
Penn State, 10-5-05
27
Sencun Zhu – Assistant Professor, CSE and IST
Education
– Ph.D. in Information Technology from George Mason University
(Aug. 2004)
Professional activities
– TPC members for ACM SASN’04, SASN’05, IEEE ICPADS’05, IEEE
MASS’05
Expertise
– Network and systems security, applied cryptography
– Wireless ad hoc and sensor networks
– Peer-to-peer computing
– Performance evaluation
Current Support
– Army Research Office (ARO), NSF Cybertrust, DoD
Penn State, 10-5-05
28
Sencun Zhu – Current Projects
•
Security and reliability for sensor networks
– Key management framework that supports in-network processing as well as
localizes the impact of node compromises
– Secure sensor data aggregation
– Security and privacy for data-centric sensor networks
– Source location anonymity
– Applications of sensor networks to public safety
•
Security for ad hoc networks
– Network access control for combating resource consumption attacks
– Traceback of compromised nodes in mobile ad hoc networks
•
Security for Overlay Network
– Efficient key managements and DDoS attack prevention
– Detection and identification of malicious nodes
•
Preventing email worm spreading
•
Countering buffer overflow attacks
Penn State, 10-5-05
29
George Kesidis – Associate Professor, EE and CSE
Education
– Ph.D. in EECS from U.C. Berkeley
Background
– 1992-2000: prof. in E&CE Dept, University of Waterloo, Canada
– 1999: sabbatical with Nortel Networks, Ottawa
– 2001: part-time technical staff at Mahi Networks
Professional Activities
– IEEE INFOCOM’07 TPC co-chair
Expertise
– queuing, optimization, scheduling, traffic shaping, quick simulation, performance
evaluation and testing, traffic and network measurement and modeling
Support
–
–
–
–
–
NSF ITR Routing of Dynamic SLAs: Internet economics, pricing, billing, traffic control
NSF ITR Surveillance networks
DARPA/ONR Emerging Surveillance Plexsus (ESP): mobile sensor networking
DHS/NSF Evaluation Methods for Internet Security Technology (EMIST)
Cisco Ltd URP (2003): Internet forensics
Penn State, 10-5-05
30
George Kesidis - Projects
•
Dynamic SLAs: Internet economics, pricing, billing, traffic control
•
Evaluation Methods for Internet Security Technology (EMIST) (ongoing)
– Testbed and methods – part of a major NSF initiative
•
Dynamic quarantine of misbehaving flows
– Detect and isolate non-conforming TCP flows
•
Surveillance networks (ongoing)
•
Emerging Surveillance Plexsus (ESP): mobile sensor networking (ongoing)
•
Other
– residential broadband access, wireless relay systems, Internet forensics
Penn State, 10-5-05
31
Aylin Yener – Assistant Professor, Electrical Engineering
Education
– PhD, Wireless Information Network Laboratory (WINLAB), Rutgers University
Background
–
NSF CAREER Award, 2003
–
Research group: Wireless Communications and Networking Laboratory: WCAN@PennState
(http://labs.ee.psu.edu/labs/wcan)
Professional Activities
–
2001- Present, Editor, IEEE Transactions on Wireless Communications
–
Co-chair, Asilomar Conference Communications Track (2005); Co-chair, WirelessCom Symposium on
Information Theory (2005); TPC member in IEEE Globecom, IEEE ICC, IEEE VTC (yearly)
Expertise
–
Physical layer optimization; cross-layer design; CDMA; MIMO; relay networks; physical layer security
Support
–
National Science Foundation
•
•
•
CAREER (CCF)
CCF
CNS
–
Pittsburgh Digital Greenhouse
–
Pennsylvania Infrastructure Technology Alliance
–
NSRC/Telcordia
–
Past support: USMC, AT&T Foundation, BenFranklin
Penn State, 10-5-05
32
Aylin Yener – Projects
•
Multiuser MIMO systems
– Design of transceivers to realize the potential capacity that multiple antenna systems offer in an
environment where multiple simultaneous MIMO users transmit.
•
Throughput/Capacity enhancement for single and multiple antenna CDMA systems
– Performance enhancement techniques that employ adaptive beamwidth directional antennas
– Performance optimization of MIMO-CDMA uplink by signature and beamformer design.
– Throughput enhancement for data-centric downlink via user scheduling.
•
Secure physical layer design for multiuser systems
– Transmit waveform, multiaccess strategy, and power allocation for secure wireless
communications. User strategies in response to various jammer and eavesdropper capabilities.
•
Relay networks/Hybrid networks and cooperative communications
– Physical layer design for networks that relay information on behalf of other nodes, network
formation, transmission strategies, impact of physical layer on MAC/routing.
– Distributed resource allocation algorithms.
– User cooperation strategies, multiuser relay networks.
•
Cross-layer design for AdHoc wireless networks and wireless sensor networks
– Power control for multi-hop AdHoc networks, the impact of optimum physical layer design on
MAC and network layers for AdHoc networks
– Physical layer inspired techniques for lifetime maximization for sensor networks.
•
RFID networks
– Algorithm design to dramatically reduce tag collisions and interference for low power RFID
networks with communication delay constraints.
Penn State, 10-5-05
33
Chita Das - Professor, CSE
Education
– Ph.D., University of Louisiana
Background
– IIT Kharagpur (India)
– Joined Penn State in 1986
Awards
– IEEE Fellow
– Best Paper Awards (ICPP, ICDCS, PRDC)
– CSE Dept Teaching Award
Expertise
– communication networks & communication mechanisms; resource management
(scheduling); QoS support in clusters and Internet; mobile computing; performance
evaluation; parallel distributed computer architectures; clusters; fault-tolerant
computing
Support
– NSF (scheduling, QoS, Infrastructure), Unisys (performance)
Penn State, 10-5-05
34
Chita Das - Projects
•
Dynamic Quarantine of Unresponsive TCP Flows
– Detect and isolate non-conforming TCP flows
•
Adaptive AQM Schemes for Internet and Wireless Networks
– Improve performance of Internet and limited wireless networks
•
QoS Provisioning in InfiniBand Architecture (IBA) for System Area Networks
– Design and analysis of IBA-style SANs
•
Scalable and Efficient Scheduling Techniques for Clusters
– Aims at developing practical scheduling techniques for large clusters
•
Performance Analysis with Commercial Workloads
– Analysis of TPC-C workloads
•
Design of Cluster-based Datacenters
– Design of 3-tier data centers on cluster platforms
•
Design and Analysis of System-on-Chip (SoC) Interconnects
– Design of on-chip interconnects considering area, power and reliability constraints
Penn State, 10-5-05
35
John Metzner - Professor, CSE and EE
Education
– Eng. Sc. D., New York University
Background
– Acting director of the Computer Engineering Program in Electrical Engineering (two years)
– Acting Dean, School of Engineering and Computer Science, Oakland University, Rochester
1974-1980
– Professor, Electrical Engineering, Wayne State University, Detroit, Michigan
– Associate Professor, Electrical Engineering New York University
– Associate Professor, Polytechnic Institute of New York
– Research Scientist, Electrical Engineering Department, New York University
Awards
– IEEE Fellow
– Fellowships: Link Aviation, National Science Foundation, David Sarnoff
– IEEE Computer Society Distinguished Speaker/Visitor
Expertise
– ARQ protocols for reliable and efficient data communication, methods for efficient comparison of
remote replicated data files, efficient reliable and secure multicasting, improved utilization of
ALOHA in multi-access, error correction techniques, efficient use of wireless network resources
Support
– Many previous grants from NSF
Penn State, 10-5-05
36
John Metzner - Projects
•
Secure Reliable Multicasting (SAM) (Poster)
– Simple acknowledgment and key changing for combined secure and reliable
multicast in moderate size groups
•
Reliable multicasting
– Efficient methods of gathering acknowledgments with a tree topology and a virtual
ring
– Increased value of hop-by-hop versus end-to-end error control in multicasting
– Improved efficiency by cooperation of local network stations in receiving a satellite or
other multicast transmission
•
Ultra wideband or light traffic ALOHA
– Communication from a mobile to a network of cooperating base stations or to other
stations in an Ad Hoc network for minimal interference and energy utilization.
•
Vector Symbol decoding extensions
– Study of interaction of inner codes and outer vector symbol code
– Correcting combinations of erasures and errors
– Further studies of convolutional vector symbol codes
– Applications to multi-reception code combining with vector symbol codes
Penn State, 10-5-05
37
Raj Acharya – Head and Professor, CSE
Education
– PhD, University of Minnesota, Mayo Graduate School of Medicine
Background
– Research Scientist, Mayo Clinic
– Research Scientist, GE (Thomson)
– Faculty Fellow, Night Vision Laboratory, Fort Belvoir, Washington, D.C.
– NASA-ASEE Faculty Fellow, Johnson Space Center, Houston, TX
– Director, Advanced Laboratory for Information Systems and Analysis
Professional Activities
– General Chair, SPIE International Conference on Physiology and Function from Multidimensional
Images
– Co-Chair, IEEE Workshop on Biomedical Image Analysis
– General Chair, SPIE Conference on Biomedical Image Processing
– Associate Editor, International Journal of Computerized Medical Imaging and Graphics
Expertise
– Net-centric computing, resource management for ad hoc networks, information fusion,
bioinformatics, data mining
Support
– NSF ITR
Penn State, 10-5-05
38
Raj Acharya - Projects
• Service level agreements using bandwidth brokers
• Quality of service in wireless ad hoc networks (Poster)
Penn State, 10-5-05
39