CEC High Impact / en Researchers receive over $1.5 million from DARPA to optimize security and energy tradeoff /news/2021-02/researchers-receive-over-15-million-darpa-optimize-security-and-energy-tradeoff <span>Researchers receive over $1.5 million from DARPA to optimize security and energy tradeoff</span> <span><span>Anonymous (not verified)</span></span> <span><time datetime="2021-02-02T12:47:20-05:00" title="Tuesday, February 2, 2021 - 12:47">Tue, 02/02/2021 - 12:47</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3051" hreflang="en">Cyber Security Research</a></div> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/6861" hreflang="en">Department of Electrical and Computer Engineering</a></div> <div class="field__item"><a href="/taxonomy/term/7011" hreflang="en">5G</a></div> <div class="field__item"><a href="/taxonomy/term/2076" hreflang="en">Military</a></div> <div class="field__item"><a href="/taxonomy/term/19046" hreflang="en">C-TASC</a></div> <div class="field__item"><a href="/taxonomy/term/19211" hreflang="en">WCC</a></div> <div class="field__item"><a href="/taxonomy/term/19146" hreflang="en">CEC faculty research</a></div> <div class="field__item"><a href="/taxonomy/term/20421" hreflang="en">CEC High Impact</a></div> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/bmark" hreflang="und">Brian Mark</a></div> <div class="field__item"><a href="/profiles/kkhasawn" hreflang="und">Khaled Khasawneh</a></div> <div class="field__item"><a href="/profiles/kzeng2" hreflang="und">Kai Zeng</a></div> <div class="field__item"><a href="/profiles/spudukot" hreflang="und">Sai Manoj Pudukotai Dinakarrao</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:feature_image" data-inline-block-uuid="5bc55496-6015-4a54-bcca-baf67f3c4bbc" class="block block-feature-image block-layout-builder block-inline-blockfeature-image caption-below"> <div class="feature-image"> <div class="narrow-overlaid-image"> <img src="/sites/g/files/yyqcgq291/files/styles/feature_image_medium/public/2021-02/Copy%20of%20Untitled.png?itok=Kw_L3Vcg" srcset="/sites/g/files/yyqcgq291/files/styles/feature_image_small/public/2021-02/Copy%20of%20Untitled.png?itok=kt5g-r7o 768w, /sites/g/files/yyqcgq291/files/styles/feature_image_medium/public/2021-02/Copy%20of%20Untitled.png?itok=Kw_L3Vcg 1024w, /sites/g/files/yyqcgq291/files/styles/feature_image_large/public/2021-02/Copy%20of%20Untitled.png?itok=Tz-GhR5X 1280w" sizes="(min-width: 1024px) 80vw,100vw" alt="Collage of four professors, Sai, Kai, Khaled and Brian. "> </div> </div> <div class="feature-image-caption"> <div class="field field--name-field-feature-image-caption field--type-text-long field--label-hidden field__item"><p>Sai Manoj&nbsp;Pudukotai&nbsp;Dinakarrao,&nbsp;Kai Zeng,&nbsp;Khaled&nbsp;Khasawneh, and&nbsp;Brian Mark are collaborating with researchers at Virginia Tech to optimize the safety and energy-efficient tradeoff.&nbsp;&nbsp;</p></div> </div> </div><div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p>The capabilities and reach of 5G&nbsp;are&nbsp;expanding, but with new capabilities&nbsp;come&nbsp;new security challenges. Four Âé¶ąĘÓƵ Engineering researchers&nbsp;received a $1.6 million grant from DARPA to tackle one of the many security issues that 5G poses as part of a larger <a href="https://www.darpa.mil/">DARPA</a> initiative called <a href="https://www.darpa.mil/program/open-programmable-secure-5g">Open, Programmable, Secure 5G&nbsp;(OPS-5G)</a>.&nbsp;</p> <p>The <a href="https://volgenau.gmu.edu/research/grants">grant</a>, entitled&nbsp;EPIC&nbsp;SWaPD: Energy Preserving&nbsp;Internet of Things (IoT)&nbsp;Cryptography for Small Weight and Power Devices, aims to&nbsp;optimize&nbsp;the security and energy efficiency tradeoff by creating a low-energy security architecture for various types of&nbsp;IoT&nbsp;devices.&nbsp;&nbsp;</p> <p>“In a network, there are many different devices of different sizes and capabilities. Many of these devices don’t have much computing power or battery life,&nbsp;and a common cybersecurity attack on these devices is to drain their battery life,” says <a href="https://volgenau.gmu.edu/profiles/bmark">Brian Mark</a>, co-principal investigator on the grant.&nbsp;&nbsp;</p> <p>Mark, <a href="https://volgenau.gmu.edu/profiles/kkhasawn">Khaled&nbsp;Khasawneh</a>, <a href="https://volgenau.gmu.edu/profiles/kzeng2">Kai Zeng,</a> and <a href="https://volgenau.gmu.edu/profiles/spudukot">Sai Manoj&nbsp;Pudukotai&nbsp;Dinakarrao</a>&nbsp;in the <a href="https://ece.gmu.edu/">Department of Electrical and Computer Engineering</a> are collaborating&nbsp;with&nbsp;the company&nbsp;Kryptowire&nbsp;and Assistant Professor Matthew Hicks from <a href="https://vt.edu/">Virginia Tech</a> for the project.&nbsp;&nbsp;</p> <p>These small IoT devices could be as simple as a thermometer or humidity sensor that is part of a larger smart home system. “These sensors&nbsp;can be&nbsp;very tiny,&nbsp;and&nbsp;they have limited&nbsp;computation and&nbsp;communication capabilities. The first step for each of these types of sensors would be to&nbsp;bootstrap, or link,&nbsp;a secure&nbsp;connection&nbsp;to the network, which requires authentication&nbsp;without pre-shared secrets. This is where the vulnerabilities lie,” says Kai Zeng.&nbsp;&nbsp;</p> <p>When sensors or other types of small IoT devices&nbsp;must&nbsp;automatically authenticate themselves, attackers&nbsp;have many paths of attack.&nbsp;They can drain the device's battery, rendering it useless, or steal sensitive information or data from the device.&nbsp;Because of the many pathways that attackers could&nbsp;use to&nbsp;harm these devices, the team is&nbsp;combining&nbsp;cryptography, network protocol design,&nbsp;and machine learning to assure&nbsp;the&nbsp;success and scalability of their efforts.&nbsp;&nbsp;</p> <p>“Something really important for this effort is that&nbsp;the security architecture operates on the principles of zero trust and least privilege,” says Mark. “Zero trust means&nbsp;that when a device comes in and wants to join the network, the assumption is that there is no prior trust&nbsp;or information shared between the devices,&nbsp;while least privilege implies the minimum permissions are granted to the entity to perform its task.&nbsp;So,&nbsp;we needed to bootstrap the security association&nbsp;and grant an entity just enough authority to access the devices or data that it needs but no more than that.”&nbsp;&nbsp;</p> <p>One way they are looking at&nbsp;securing the connection&nbsp;is through gait-inspired authentication, which leverages the kinetic energy generated by a human user. “Every device&nbsp;harvests&nbsp;energy in a different way, and we use the harvesting pattern&nbsp;for authentication&nbsp;of the&nbsp;device,&nbsp;which preserves energy and accomplishes a security task at the same time,” says&nbsp;Dinakarrao.&nbsp;&nbsp;</p> <p>Another approach is to exploit the “always-on” sensors in some devices like smartphones. “We plan to employ always-on sensing to perform the exchange of device identification and cryptographic material,” says&nbsp;Khasawneh.&nbsp;</p> <p>They are also using machine learning&nbsp;to ensure&nbsp;both&nbsp;authentication&nbsp;and&nbsp;authorization of different devices. “We not only have to authenticate the devices&nbsp;and entities&nbsp;that are allowed on a network, but we have to verify their different roles&nbsp;and privileges. I might be granted&nbsp;access to the information that tells me the temperature of a room, but&nbsp;perhaps&nbsp;I might&nbsp;not have the authorization to change the thermostat&nbsp;setting,” says Mark. “Using graph-based&nbsp;models, we&nbsp;can verify&nbsp;the&nbsp;trust&nbsp;relationships of different devices&nbsp;or entities&nbsp;and this process can be accelerated&nbsp;using machine learning techniques,”&nbsp;adds&nbsp;Dinakarrao.&nbsp;&nbsp;</p> <p>Long-term, the team aspires for their security architecture to easily be applied to other devices.&nbsp;“When we talk about the energy and security tradeoff, we have to think about how we can do things in a smart way to conserve energy&nbsp;while enhancing&nbsp;security. But we also need to think about how to make our&nbsp;architecture&nbsp;scalable&nbsp;to larger, more&nbsp;geographically distributed&nbsp;networks.&nbsp;Right&nbsp;now,&nbsp;this work is with smaller devices, but the hope is that&nbsp;our overall security architecture&nbsp;can apply to a variety of devices with different capabilities,”&nbsp;says Mark.&nbsp;</p> </div> </div> </div> </div> </div> Tue, 02 Feb 2021 17:47:20 +0000 Anonymous 97806 at