This project is developing techniques for secured real-time services for cyber-physical systems. In particular, the research is incorporating real-time traffic modeling techniques into the security service, consequently enhancing both system security and real-time capabilities in an adverse environment. While this proposed methodology has not yet been fully tested, it is potentially transformative.
To defend against traffic analysis attacks, the research is developing algorithms that can effectively mask the actual operational modes of cyber-physical applications without compromising the guaranteed quality of service. This is achieved by using the traffic modeling theory, developed by the PIs, to precisely manage the network traffic at the right time and the right place. This traffic modeling theory can also help in develop efficient attack detection and suppression methods that can identify and restrain an attack in real-time.
The proposed methods are expected to be more effective, efficient, and scale-able than traditional methods.
Normal 0 false false false EN-US X-NONE X-NONE During the period of this project, we developed a traffic modeling technique in network security for cyber-physical system. By using our traffic moldering theory, we developed an algorithm to effectively mask the actual operation mode to avoid the analysis attack in the network. For security attacks, our traffic modeling theory can help to develop efficient attack detection and suppression methods that can identify and restrain an attack in real-time. In addition, we also concentrated on developing energy-efficient wireless sensor networks. We investigated dynamic control and optimization strategies in wireless sensor networks. Specifically, we applying analytical method to derive energy consumption and sensor performance measures and further obtain optimizing admission control of data packets. The broader impacts resulting from the proposed activity are equally multifaceted. 1) Our results have been disseminated to communities of interests by different ways: publishing them on academic journals and proceedings; presenting them in academic conferences, workshops and NSF PI meeting; placing them in the website for public accesses. 2) We have recruited two undergraduate students to this project. This gave them first time academic research experience. They obtained not only the knowledge related cyber-physical system, but also the general scientific research skills, including searching papers, wring report and presenting ideas. 3) We have Included some contents of the security of cyber-physical system into class room teaching. Almost ninety percentages of these students are from the under-represented minorities. These educational efforts and activities increased awareness of careers in CPS and its security and helped attract woman and under-presented minorities to this field.