Download presentation
Presentation is loading. Please wait.
Published byGwen Simon Modified over 9 years ago
1
SMUHACNet 2005 Information Infrastructure for Border and Transportation Security Suku Nair
2
SMUHACNet 2005 Research in HACNet Secure Information Infrastructure: This work involves several sub-areas of research –low-power algorithms to provide secure, non-repudiated communication amongst sensing devices which form a self-configuring mesh –Secure and ubiquitous access to information –Intrusion tolerance through detection and prevention of cyber attacks such as phishing, Distibuted Denial of Service (DDoS) –Threat prediction and attack trace-back –Restoration of network and computer systems after an attack or failure –Dependable architecture for secure grid-computing Application Security – Sub areas of this research include –Software security from design to implementation –Protocol validation Security Engineering - Research in this area involves –security engineering processes (such as application and extension of the Systems Security Engineering Capability Maturity Model, SSE-CMM)SSE-CMM –Enterprise security –Legal and ethical policy issues Nano-security
3
SMUHACNet 2005 Our View of Border and Transportation System
4
SMUHACNet 2005 Enablers for End-to-End System Integrity
5
SMUHACNet 2005 Security and Reliability in Sensor Networks Distributed authentication –Beyond SNEP, TESLA, and µTESLA –Key generation and distribution schemes –Authentication of reverse broadcast Confidentiality –Low cost encryption schemes using chaffing and winnowing based on FEC codes Self-organizing networks –Error detection/correction –Neighbor detection through Interactive Consistency (IC) –Reconfiguration schemes
6
SMUHACNet 2005 Threat Prediction Anomalies/Flags Data Collection and Cleansing EMM Data Mining All data Link Graph Construction N/W Analysis Growth/ Shrinkage Heuristics Recommendations Sequential Data Collection
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.