1 / 40

Networking and Security Research Center nsrc.cse.psu/

Networking and Security Research Center http://nsrc.cse.psu.edu/. Professor Thomas F. La Porta, Director Department of Computer Science and Engineering. Networking and Security Research Center. Large group of networking, security and systems experts 10 faculty Approximately 50 students

Download Presentation

Networking and Security Research Center nsrc.cse.psu/

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Networking and Security Research Center http://nsrc.cse.psu.edu/ Professor Thomas F. La Porta, Director Department of Computer Science and Engineering

  2. Networking and Security Research Center • Large group of networking, security and systems experts • 10 faculty • Approximately 50 students • Ph.D., M.S. and Schreyer Honors College Seniors • 8 Ph.D. graduates • 3 Labs in addition to individual research groups • Diverse Expertise • Wireless networking and communications • Performance • Software systems • Routing • Distributed algorithms • All aspects of security: networking, protocols, systems, access controls and policies • Industrial partners • Telcordia Technologies (Full) • Raytheon (Associate)

  3. Accomplishments • Research Results (details later) • 14 major journal publications • Over 30 conference publications • ACM Conference on Computer and Communications Security (CCS), ACM MobiHoc, IEEE INFOCOM, IEEE International Conference on Network Protocols (ICNP), International Conference on Distributed Computing Systems (ICDCS), International Conference on Mobile Data Management (MDM), Annual Computer Security Applications Conference (ACSAC) • 45 NSRC Technical Reports • Funding: over $3M in new funding in 2005 • 8 NSF Grants: CyberTrust (3), Networking (2), Computer Systems, Research Infrastructure, Communications • Department of Defense • Army Research Office (ARO) • The Technology Collaborative (3) • Industry: Cisco, Motorola, IBM • New Member: Trent Jaeger from IBM T.J. Watson • operating systems security mechanisms and policies, access control, hypervisor security, source code analysis for security, operating systems, mobile code security

  4. Accomplishments • Awards (Faculty and Students) • Thomas Alva Edison Patent Award • IBM Faculty Award • IEEE Computer Society Golden Core Award • IEEE Computer Society Meritorious Service • AT&T Wireless Fellowship • Appointments • General Co-Chair, ACM Mobicom • General Chair, Financial Cryptography • Program Chair, USENIX Security • Program Co-Chair, IEEE Infocom 2007 • Program Co-Chair, IEEE MASS • Editorial Boards and Steering Committees: IEEE TMC, TWC, ToN • Next Generation Networks Task Force for the President’s National Security Telecommunications Advisory Panel

  5. SIIS Laboratory (http://siis.cse.psu.edu) • Faculty Prof. Trent Jaeger (tjaeger@cse.psu.edu) operating systems security, policy design and analysis, source code analysis Prof. Patrick McDaniel (mcdaniel@cse.psu.edu) network security, security modeling, critical infrastructure, security-typed languages, formal security policy Prof. Sencun Zhu (szhu@cse.psu.edu) ad hoc and sensor networks, buffer-overflow and worm, p2p security • Ongoing Projects: • LAN Security • Secure Storage Systems • Language Based Security • SE Linux • Telecommunications Security • Self-healing Sensor Networks • Funding: • National Science Foundation • Army Research Office/DOD • CISCO • Motorola (SERC) • Raytheon (NSRC) • Students (8 PhD , 4 MS) • Factoids: Established September 2004, (15 major publications, 6 TRs), Location - 344 IST Building - contact siislab@cse.psu.edu

  6. Mobile Computing and Networking (MCN) Lab (http://mcn.cse.psu.edu/) MCN lab conducts research in many areas of wireless networks and mobile computing, with an emphasis on designing and evaluating mobile systems, protocols, and applications. • Projects • secure sensor networks, collaborative data access in mobile P2P networks, mobile sensor networks, data centric sensor networks, resource management in wireless networks • Students: 7 PhD, 3 MS, and 3 honor BS students • Alumni: 3 Ph.D. • Faculty members at Iowa State University and Florida International University • Motorola Research • 9 MS students went to various companies • Support: NSF (CAREER, ITR, NeTS/NOSS, CT, CNS), Army Research Office, DARPA, Telcordia (NSRC), PDG/TTC and member companies Cisco, IBM and 3ETI • Contact: Prof. Guohong Cao, gcao@cse.psu.edu

  7. Wireless Communication and Networking Laboratory (http://labs.ee.psu.edu/labs/wcan) • The Wireless Communication and Networking Lab performs fundamental research on wireless communication network design • Students (all from Electrical Engineering) • 4 Ph.D., 3 MS, 1 senior • Support • Three awards from the National Science Foundation (NSF) • Pittsburgh Digital Green House (PDG) • Pennsylvania Infrastructure for Technology Alliance (PITA) • Networking and Security Research Center - Telcordia • Academic collaborators • Penn State (NSRC), UMD, Lehigh • Industrial Partners • Telcordia (via NSRC) • 7 PDG member companies • Contact: Prof. Aylin Yener, yener@ee.psu.edu WCAN @PSU

  8. Two new dangers: Very open environment Passage into SS7 network Research Areas: Telecom Security • Tom La Porta and Patrick McDaniel • Exploiting open interfaces to wireless services • GSM Short Message Service • Toolkits for detecting possible attacks on 3G networks • Map migration of data corruption across networks • Maintaining privacy when providing Location-Based Services (with IBM) • Tune security and flexibility Current Cellular Next Generation Home Location Registers IP Services Closed Control Network (SS7) Servers Mobile Switching Centers 3G Cellular/ All-IP 2G Cellular Closed Network Attacks are possible, but rare

  9. Research Areas: Secure Sensor Networks Adversary injecting & modifying data Powerful nodes with better comm capabilities No central controller Simple nodes with limited power • Sencun Zhu, Guohong Cao, and Tom La Porta • Security and privacy in data centric networks • Share data between authorized applications and users • Network access control in ad hoc networks • Neighbor and location verification • Hybrid security solutions for sensor networks (with 3ETI) • Leverage powerful nodes and backbone connectivity when possible

  10. 16 organizations delegate 80% of addresses Delegations must be authorized efficiently Current address use in the Internet Research Areas: Internet Security • Patrick McDaniel, Sencun Zhu and Trent Jaeger • BGP Security (with AT&T) • Combats attacks on origins and paths • ARP Security • Combats impersonation attacks enabled by the use of ARP • Linux IPSec (with IBM) • Per packet access controls

  11. Research Areas: Security Test Beds and Tools Large scale BGP simulation – up to 20,000 autonomous systems will be simulated on the DETER test bed • George Kesidis, Chita Das and Patrick McDaniel • Evaluation Methods for Internet Security Technology (EMIST) • Framework for thoroughly evaluating defenses against worms, DDoS and attacks on routing (BGP) • Tools for TCP • Focus on attacks that exploit TCP congestion control

  12. <Alice, Window, Create>? X server Policy Server Yes/No Security-enhanced Operating System Research Areas: Trusted Computing and Systems Hook effectiveness Hook placement Hook execution • Trent Jaeger and Patrick McDaniel • Automatic placement of authorization hooks in Linux Security Modules • Authenticate “operations” • Mandatory Access Control in Xen-Linux Systems • Enforce security goals • Multi-level security in remote storage (with Raytheon) • Grant access in distributed manner; compatible with SCSI • Language-based tools for information flow control (with Motorola) • Language ensures data of different security levels do not interact • Trusted computing (with Intel) • Novel approach to client puzzles to combat DDoS attacks

  13. Research Areas: P2P/Overlay Networks • Wang-Chien Lee, Guohong Cao and Sencun Zhu • Collaborative data access in mobile P2P networks • Reduce latency of data access by intelligent sharing • Security mechanisms for overlay networks • Integration of key management and access controls • Semantic small world • Efficient p2p structure to reduce search path length and cost

  14. Research Areas: Algorithms and Protocols for Sensor Networks sink sink S2 S2 S1 S1 S4 S4 S3 S3 Second mission: target tracking First mission: perimeter monitoring • Guohong Cao, Tom La Porta and George Kesidis • Controllable node mobility for mission oriented sensor networks • Leverage mobility for coverage, fault recovery, routing and application-specific functions • Energy efficient data collection in sensor networks (with Telcordia) • Cross layer energy optimization scheme to increase network lifetime and connectivity of wireless sensor networks • Stateless routing for location aware sensor networks • Voluntary forwarding • Mobility prediction • Improve effectiveness of cluster algorithms

  15. Research Areas: Wireless and Mobile Networks Group2 Cell 1 1 GW BS 2 GW 2 Orthogonal links GW 1 2 Orthogonal networks 1 Group1 1 • Aylin Yener, Tom La Porta and Guohong Cao • Wireless relay networks • Improve overall network performance by forwarding to nodes with best wireless backhaul • Consider different relay and forwarding and power control strategies • Channel assignment algorithms • RFID (with 3ETI and Vocollect) • Improved media access protocols • Mobile ML-IPSec (with 3ETI, Accipiter and Cisco) • Enable wireless-specific performance enhancements in a secure network

  16. Networking Research Center

  17. Networking and Security Research Center • For Penn State • Build relationships with Industry • Define interesting and realistic research problems • Diversify research collaborators • Expose students to industrial research environments • Increase impact of research • For companies • Build relationship with Professors and students • Develop new collaborations to solve interesting problems • Partner on proposals • Access to wide area of expertise • Members • Telcordia Technologies (Full) • Raytheon (Associate)

  18. Remainder of the day… • Lunch • Poster and demonstrations (outside Cybertorium, 344B) • Faculty Talks • Cybertorium – 1:30-3:00 • Center Discussion/Feedback • Room 333 – Center Faculty, PSU Admin, and Industry guests only

  19. Tom La Porta – Professor, CSE • Education • PhD, Columbia University, Electrical Engineering • Background • Director of Mobile Networking Research at Bell Labs until 2002 • Professional Activities • Founding Editor-in-Chief, IEEE Transactions on Mobile Computing • Past Editor-in-Chief (Senior Advisor), IEEE Personal Communications • General Co-Chair: ACM Mobicom 2005 • Program Co-Chair: IEEE ICNP 2004 • Awards • Bell Labs Fellow • IEEE Fellow • Bell Labs Distinguished Technical Staff Award • IEEE Computer Society Golden Core Member • Thomas Alva Edison Patent Award • Expertise • Mobile networking, wireless networking, secure telecommunication network signaling and control, protocol design • Support • National Science Foundation • DARPA/ONR MURI (subcontract through ARL) • Technology Collaborative/Pittsburgh Digital Greenhouse • IBM • NSRC

  20. Tom La Porta – Projects • Evolution of all-IP Mobile Networks • Network architectures and protocols for 3G/Mobile Internet interworking • Secure all-IP Mobile Telecommunication Networks • Combat threats (exploit) introduced by interfaces to IP networks • Mobile Multilayered IPSec • Improves security and performance in wireless, mobile networks • Secure Data Dissemination for sensor networks • Efficient key distribution in constrained environments • Heterogeneous ad hoc relay networks of agile radios • New architecture to improve performance and capacity • Node mobility for Robust Mission-Oriented Sensor Networks • Deployment and relocation strategies for sensors

  21. Guohong Cao – Associate Professor, CSE • Education • PhD, Ohio State University, Computer Science • Professional Activities • Associate Editor, IEEE Transactions on Mobile Computing • Associate Editor, IEEE Transactions on Wireless Communications • Guest Editor, ACM MONET special issues on Heterogeneous Wireless Networks, 2005 • Program Vice Chair: IEEE Int'l Conf. on Mobile Ad-hoc and Sensor Systems (MASS), 2005 • Program committee of IEEE ICDCS, ACM MOBICOM, IEEE ICNP and IEEE INFOCOM • Awards • Presidential Fellowship at the Ohio State University • NSF CAREER, 2001 • Expertise • Mobile computing, wireless networks, sensor networks, wireless network security, distributed fault-tolerant computing, resource management and data dissemination in mobile environments • Support • NSF (ITR, CAREER, NeTs/NOSS, CT, CNS) • Army Research Office • PDG/TTC • DARPA/ONR MURI (subcontract through ARL)

  22. Guohong Cao – Projects • Collaborative Data Access in Mobile Peer-to-Peer Networks • Improves performance in constrained environments through collaboration. • Controllable Node mobility for Mission-Oriented Sensor Networks • Deployment and relocation strategies for sensors • Secure Wireless Sensor Networks • Defend against node compromises; self-healing mechanisms for sensor networks • Mobile Multi-layered IP Security • Improves security and performance in wireless, mobile networks • A Data-Centric Framework for Target Tacking and Data Dissemination in Sensor Networks • New architecture for wireless sensor networks • Designing Efficient Resource Management Schemes to Support Integrated Services in Mobile Computing Systems • Consider both power issues and QoS issues • Efficient Power Aware Data Access in Pervasive Computing Environment • Consider both single-hop and multi-hop models

  23. Wang-Chien Lee – Associate Professor, CSE • Education • PhD, Ohio State University • Background • 1996 - 2001, GTE/Version Research Laboratories, Inc. • Research group at Penn State (2002-Present): Pervasive Data Access Research Group (http://www.cse.psu.edu/pda) • Awards • Excellence Award: GTE/Verizon Laboratories Incorporated (1997, 1999, 2000). • Achievement Award: GTE/Verizon Laboratories Incorporated (1999). • Professional Activities • Guest Editor, IEEE Transaction on Computer, IEEE Personal Communication Magazine, ACM Mobile Networks and Applications (MONET), ACM Wireless Networks (WINET) • Technical Program Chair: International Conference on Mobile Data Access (1999); International Workshop on Pervasive Computing (2000); International Workshop on Wireless Networks and Mobile Computing (2000/2001). • Industrial Program Chair: International Conference on Mobile Data Management (2001-2002). • Steering Committee: International Conference on Mobile Data Management • TPC Member (2005): ICNP, ICDE, ICDCS, SAC, VLDB (Demo), DASFAA, MDM, NetDB • Expertise • Pervasive Computing, Wireless Networks, Network Services, Data Management, TMN • Current & Past Support • NSF, ARDA, GENUITY, RGC (Hong Kong)

  24. Wang-Chien Lee - Projects • Location-Based Information Access in Pervasive Computing • Investigate new ways of indexing and caching spatial data in support of location based services in pervasive computing environments. • Semantic Small World: A Multi-Dimensional Overlay Network • Design of a multi-dimensional overlay network, called semantic small world (SSW), that facilitates efficient semantic based search in P2P systems. • SSW is adaptive to distribution of data and locality of interest; is very resilient to failures; and has great load balancing property. • Protocols and Services for Location-Aware Wireless Sensor Networks • Design of a suite of protocols, algorithms and services to provide energy-aware, time-efficient, robust and scalable location-aware wireless sensor networks. • Tackled research issues include communication collisions, communication voids, packet losses, location errors, scalability, service latency and validity of services. • Automata-Based XML Access Control for Networked Computing • Design of a new XML access control mechanism, called QFILTER, for Internet-scale networked information systems. • Secure Wireless Data Broadcast • Development of new air indexing and key management techniques to address the security concerns in wireless data broadcast systems.

  25. Patrick McDaniel – Assistant Professor, CSE • Director of the Systems and Internet Infrastructure Security Lab: http://siis.cse.psu.edu • Education • PhD, University of Michigan, Electrical Engineering and Computer Science • Professional Activities • Program Chair, 15th USENIX Security Symposium, August 2005. • Vice-Chair, Security and Privacy Track, 14th World Wide Web Conference (WWW), May 2005. • General Chair, Financial Cryptography 2006, February 2006 • Program Chair, Industry Track, 11th ACM Conference on Computer and Communications Security (CCS), November 2004. • Guest editor, Journal of Computer Networks, Special issue on Web Security, Summer 2005. • Associate editor, ACM Transactions on Internet Technology (TOIT), April 2004-present. • Program Committee Member (2005): ESORICS, ACSAC, CCS (I&G), ICIS, ACM ECSACMAT, SNS, ACNS, USENIX Secuity, USENIX Technical • Expertise • Systems security, security policy, network security, digital rights management, digital content and public policy, network management, applied cryptography, privacy • Past and Current Support • NSF (EMIST), NSF (Distributed Type-Secure Programming) • DARPA (Dynamic Coalitions Program) • USAF (P2INGS) • Industry: Motorola, CISCO

  26. Patrick McDaniel – Projects • Exploiting Open Functionality in SMS-Capable Cellular Networks • Understanding and fixing evolving threats in cellular phone systems • Understanding Mutable Internet Pathogens • Predicting and counteracting next-generation malware • Analysis of Communities of Internet in Data Networks • Understanding interrelationships between users, hosts, and service locality • Path Validation in Interdomain Routing • Design and application of efficient constructions for secure path discovery and validation on the Internet • Internet Origin Disturbances • Route announcement wave-fronts cause odd oscillation, explanation and characterization • Collaborative Research: Flexible, Decentralized Information-flow Control for Dynamic Environments • Extending strong language type-safety to distributed environments

  27. Trent Jaeger – Associate Professor, CSE • Co-Director of the Systems and Internet Infrastructure Security Lab: http://siis.cse.psu.edu • Education • PhD, University of Michigan, Electrical Engineering and Computer Science • Professional Activities • Program Chair, Industry Track, 10th ACM Conference on Computer and Communications Security (CCS), November 2003. • Program Chair, 6th ACM Symposium on Access Control Models and Technologies (SACMAT), June 2001. • Steering Committee, ACM Symposium on Access Control Models and Technologies • Program Committee Member (2005): USENIX Security, ACSAC, ACM CCS (I&G), ACM SACMAT, WWW Conference, SELinux Symposium • Program Committee Member (past): IEEE Security & Privacy, ACM CCS, ESORICS • Expertise • operating systems security mechanisms and policies, access control, hypervisor security, source code analysis for security, operating systems, mobile code security

  28. Trent Jaeger – Projects • Linux Security Analysis • Develop source code and policy analysis tools to verify security properties in the Linux kernel, system software, and security policies • Network Mandatory Access Control • Extend the Linux Security Modules framework and policy languages to enable mandatory access control among a coalition of machines • (Mostly) Automatic Generation of Reference Monitors • Source code analyses to place complete, optimized reference monitor interfaces within applications that enforce security properties (e.g., Xwindows, Apache, OpenSGL) • Hypervisor-Based Mandatory Access Control • Enable hypervisors (e.g., Xen) to enforce mandatory access controls update its resources and enable effective control of higher level resources (e.g., network) via restricted Linux partitions • Hardware-based Integrity Measurement Architectures • Research approaches to apply the Trusted Computing Group’s Trusted Platform Module to enable remote parties to verify the integrity of a system

  29. Sencun Zhu – Assistant Professor, CSE and IST • Education • Ph.D. in Information Technology from George Mason University (Aug. 2004) • Professional activities • TPC members for ACM SASN’04, SASN’05, IEEE ICPADS’05, IEEE MASS’05 • Expertise • Network and systems security, applied cryptography • Wireless ad hoc and sensor networks • Peer-to-peer computing • Performance evaluation • Current Support • Army Research Office (ARO), NSF Cybertrust, DoD

  30. Sencun Zhu – Current Projects • Security and reliability for sensor networks • Key management framework that supports in-network processing as well as localizes the impact of node compromises • Secure sensor data aggregation • Security and privacy for data-centric sensor networks • Source location anonymity • Applications of sensor networks to public safety • Security for ad hoc networks • Network access control for combating resource consumption attacks • Traceback of compromised nodes in mobile ad hoc networks • Security for Overlay Network • Efficient key managements and DDoS attack prevention • Detection and identification of malicious nodes • Preventing email worm spreading • Countering buffer overflow attacks

  31. George Kesidis – Associate Professor, EE and CSE • Education • Ph.D. in EECS from U.C. Berkeley • Background • 1992-2000: prof. in E&CE Dept, University of Waterloo, Canada • 1999: sabbatical with Nortel Networks, Ottawa • 2001: part-time technical staff at Mahi Networks • Professional Activities • IEEE INFOCOM’07 TPC co-chair • Expertise • queuing, optimization, scheduling, traffic shaping, quick simulation, performance evaluation and testing, traffic and network measurement and modeling • Support • NSF ITR Routing of Dynamic SLAs: Internet economics, pricing, billing, traffic control • NSF ITR Surveillance networks • DARPA/ONR Emerging Surveillance Plexsus (ESP): mobile sensor networking • DHS/NSF Evaluation Methods for Internet Security Technology (EMIST) • Cisco Ltd URP (2003): Internet forensics

  32. George Kesidis - Projects • Dynamic SLAs: Internet economics, pricing, billing, traffic control • Evaluation Methods for Internet Security Technology (EMIST) (ongoing) • Testbed and methods – part of a major NSF initiative • Dynamic quarantine of misbehaving flows • Detect and isolate non-conforming TCP flows • Surveillance networks (ongoing) • Emerging Surveillance Plexsus (ESP): mobile sensor networking (ongoing) • Other • residential broadband access, wireless relay systems, Internet forensics

  33. Aylin Yener – Assistant Professor, Electrical Engineering • Education • PhD, Wireless Information Network Laboratory (WINLAB), Rutgers University • Background • NSF CAREER Award, 2003 • Research group: Wireless Communications and Networking Laboratory: WCAN@PennState(http://labs.ee.psu.edu/labs/wcan) • Professional Activities • 2001- Present, Editor, IEEE Transactions on Wireless Communications • Co-chair, Asilomar Conference Communications Track (2005); Co-chair, WirelessCom Symposium on Information Theory (2005); TPC member in IEEE Globecom, IEEE ICC, IEEE VTC (yearly) • Expertise • Physical layer optimization; cross-layer design; CDMA; MIMO; relay networks; physical layer security • Support • National Science Foundation • CAREER (CCF) • CCF • CNS • Pittsburgh Digital Greenhouse • Pennsylvania Infrastructure Technology Alliance • NSRC/Telcordia • Past support: USMC, AT&T Foundation, BenFranklin

  34. Aylin Yener – Projects • Multiuser MIMO systems • Design of transceivers to realize the potential capacity that multiple antenna systems offer in an environment where multiple simultaneous MIMO users transmit. • Throughput/Capacity enhancement for single and multiple antenna CDMA systems • Performance enhancement techniques that employ adaptive beamwidth directional antennas • Performance optimization of MIMO-CDMA uplink by signature and beamformer design. • Throughput enhancement for data-centric downlink via user scheduling. • Secure physical layer design for multiuser systems • Transmit waveform, multiaccess strategy, and power allocation for secure wireless communications. User strategies in response to various jammer and eavesdropper capabilities. • Relay networks/Hybrid networks and cooperative communications • Physical layer design for networks that relay information on behalf of other nodes, network formation, transmission strategies, impact of physical layer on MAC/routing. • Distributed resource allocation algorithms. • User cooperation strategies, multiuser relay networks. • Cross-layer design for AdHoc wireless networks and wireless sensor networks • Power control for multi-hop AdHoc networks, the impact of optimum physical layer design on MAC and network layers for AdHoc networks • Physical layer inspired techniques for lifetime maximization for sensor networks. • RFID networks • Algorithm design to dramatically reduce tag collisions and interference for low power RFID networks with communication delay constraints.

  35. Chita Das - Professor, CSE • Education • Ph.D., University of Louisiana • Background • IIT Kharagpur (India) • Joined Penn State in 1986 • Awards • IEEE Fellow • Best Paper Awards (ICPP, ICDCS, PRDC) • CSE Dept Teaching Award • Expertise • communication networks & communication mechanisms; resource management (scheduling); QoS support in clusters and Internet; mobile computing; performance evaluation; parallel distributed computer architectures; clusters; fault-tolerant computing • Support • NSF (scheduling, QoS, Infrastructure), Unisys (performance)

  36. Chita Das - Projects • Dynamic Quarantine of Unresponsive TCP Flows • Detect and isolate non-conforming TCP flows • Adaptive AQM Schemes for Internet and Wireless Networks • Improve performance of Internet and limited wireless networks • QoS Provisioning in InfiniBand Architecture (IBA) for System Area Networks • Design and analysis of IBA-style SANs • Scalable and Efficient Scheduling Techniques for Clusters • Aims at developing practical scheduling techniques for large clusters • Performance Analysis with Commercial Workloads • Analysis of TPC-C workloads • Design of Cluster-based Datacenters • Design of 3-tier data centers on cluster platforms • Design and Analysis of System-on-Chip (SoC) Interconnects • Design of on-chip interconnects considering area, power and reliability constraints

  37. John Metzner - Professor, CSE and EE • Education • Eng. Sc. D., New York University • Background • Acting director of the Computer Engineering Program in Electrical Engineering (two years) • Acting Dean, School of Engineering and Computer Science, Oakland University, Rochester 1974-1980 • Professor, Electrical Engineering, Wayne State University, Detroit, Michigan • Associate Professor, Electrical Engineering New York University • Associate Professor, Polytechnic Institute of New York • Research Scientist, Electrical Engineering Department, New York University • Awards • IEEE Fellow • Fellowships: Link Aviation, National Science Foundation, David Sarnoff • IEEE Computer Society Distinguished Speaker/Visitor • Expertise • ARQ protocols for reliable and efficient data communication, methods for efficient comparison of remote replicated data files, efficient reliable and secure multicasting, improved utilization of ALOHA in multi-access, error correction techniques, efficient use of wireless network resources • Support • Many previous grants from NSF

  38. John Metzner - Projects • Secure Reliable Multicasting (SAM) (Poster) • Simple acknowledgment and key changing for combined secure and reliable multicast in moderate size groups • Reliable multicasting • Efficient methods of gathering acknowledgments with a tree topology and a virtual ring • Increased value of hop-by-hop versus end-to-end error control in multicasting • Improved efficiency by cooperation of local network stations in receiving a satellite or other multicast transmission • Ultra wideband or light traffic ALOHA • Communication from a mobile to a network of cooperating base stations or to other stations in an Ad Hoc network for minimal interference and energy utilization. • Vector Symbol decoding extensions • Study of interaction of inner codes and outer vector symbol code • Correcting combinations of erasures and errors • Further studies of convolutional vector symbol codes • Applications to multi-reception code combining with vector symbol codes

  39. Raj Acharya – Head and Professor, CSE • Education • PhD, University of Minnesota, Mayo Graduate School of Medicine • Background • Research Scientist, Mayo Clinic • Research Scientist, GE (Thomson) • Faculty Fellow, Night Vision Laboratory, Fort Belvoir, Washington, D.C. • NASA-ASEE Faculty Fellow, Johnson Space Center, Houston, TX • Director, Advanced Laboratory for Information Systems and Analysis • Professional Activities • General Chair, SPIE International Conference on Physiology and Function from Multidimensional Images • Co-Chair, IEEE Workshop on Biomedical Image Analysis • General Chair, SPIE Conference on Biomedical Image Processing • Associate Editor, International Journal of Computerized Medical Imaging and Graphics • Expertise • Net-centric computing, resource management for ad hoc networks, information fusion, bioinformatics, data mining • Support • NSF ITR

  40. Raj Acharya - Projects • Service level agreements using bandwidth brokers • Quality of service in wireless ad hoc networks (Poster)

More Related