Curators' Distinguished Professor
Computer Science
Publications:
Personal Website:
INVESTIGATORS
Sanjay Madria (Dept. of Computer Science, 573-341-4856)
FUNDING SOURCE
NIST
PROJECT DESCRIPTION
In sensor cloud, the security of a sensor network cannot be assessed by simply considering the feasible set of attacks in isolation. To accurately determine the security of a network, one must be able to determine the interdependencies between these attacks and how they can be exploited to execute a multistage attack on the sensor networks. These situations demand the need of risk assessment for a sensor network. Risk assessment using attack graphs will help the security administrators visualize the interdependencies between the various attacks and how they can be used in combination to cause more damage to the network.
With respect to sensor clouds which has two layers, a physical sensor network to perform the actual tasks and a virtualization of this sensor network which is hosted at the cloud platform, in this project, we will design risk modeling on both of these layers with the help of attack graphs and assess the interdependencies between the possible set of attacks on both of these layers and integrate them to assess the overall security of the sensor cloud platform. Attack graphs in a combination with principles like Bayesian networks will also help in estimating which of the given attack sets are most feasible to execute on the physical sensor layer and how that will affect the virtual layer on the cloud platform. We will also be able to determine the cost of implementing the security measures using the aforementioned principles, which will help in implementing network hardening strategies for the sensor cloud platform.
PUBLICATIONS
INVESTIGATORS
Sanjay Madria (Dept. of Computer Science, 573-341-4856)
FUNDING SOURCE
NSF
PROJECT DESCRIPTION
The acceptance of the cloud as an infrastructure to host applications is a growing trend. Facilitating and hosting applications on the cloud reduces support and maintenance costs. However, concerns about the security of these applications is one of the primary reasons organizations avoid complete adoption of cloud services. Although cloud service providers (CSPs) offer standard security, they don't address security with respect to application's security requirements. This project aims to propose an offline risk-assessment framework to evaluate the security offered by a CSP from the perspective (security needs) of an application to be migrated to it. Once the most secure CSP is identified for a given application, the proposed framework performs a cost-benefit trade-off analysis in terms of the security dispensed and service costs to support the formation of an ideal cloud migration plan.
PUBLICATIONS
INVESTIGATORS
Sanjay Madria (Dept. of Computer Science, 573-341-4856)
FUNDING SOURCE
NSF
PROJECT DESCRIPTION
Efficient management of natural and man-made disasters poses technical challenges like energy efficient collection of sensor data, optimizing the network bandwidth, faster analysis of the past data/events and dissemination of timely and correct information using Sensor cloud architecture to the people involved in decision-making.
The outcomes from this project is to assist human operators in their disaster management coordination and planning like directing a medical physician’s team to their nearest cluster of affected people in a region and administer medications as necessary or finding a safe route for evacuation of affected people. Sensor data integrated with microblogs such as Tweets help identifying some local events and people sentiments, which is significantly useful in handling/understanding disaster situations. It will also benefit other applications such as real-time tracking of road/driving conditions in vehicular networks.
PUBLICATIONS
INVESTIGATORS
Sanjay Madria (Dept. of Computer Science, 573-341-4856)
FUNDING SOURCE
AFRL
PROJECT DESCRIPTION
In this project, the focus is to enhance the advanced Information Management (IM) services. There is a need to further improve the exchange of information through message delivery between enterprise and the tactical edge networks and applications, the information management services need to be capable of operating in contested/congested environments and be built upon disruption and fault tolerant techniques and technologies. The objective is to develop and demonstrate opportunistic delay or disruption tolerant networks (DTNs) for rapid access to ISR and to support hybrid and decentralized IM services across enterprise and tactical network infrastructures to enable effective information exchange for shared situational awareness. This will bridge the gap between low bandwidth and high bandwidth data producers and consumers and provide the ability to discover and share data across disparate systems under GOT-IT architecture. In this environment, thus, priority of messages, intelligent caching of mission critical messages using incentives, higher message delivery of unique messages as well as reducing the network traffic is very important for the mission.
PUBLICATIONS
Follow Intelligent Systems Center