Florida International University  |  College of Engineering and Computing
Apply Online
Contact Us
Panthersoft
Webmail

Network Security Publications | Laboratories | Other Divisions

Niki Pissinou, Ph.D.
University of Southern California
Tenured Professor and Director

Email: pissinou-at-fiu.edu
Phone Number: 305-348-3716

 

Network security is an interesting area to study. The worldwide growth of Internet in the last 10 years combined with the advancement in silicon technology have introduced several challenges in the area of network security. In addition, wireless security has attracted tremendous attention of the researchers as well as of industry.

We are currently focussing our research in the area of wireless security. Some of our research areas are:

  • Routing security in mobile ad-hoc and sensor networks
  • Key distribution in mobile ad-hoc networks
 

Selected Projects

Security issues in ad-hoc networks have attracted attention of the researchers in the recent past. Ad-hoc networks pose more serious threats than conventional networks in many respects. The serious nature of these threats are due to some inherent features of an ad-hoc network like use of wireless links, lack of infrastructure and physical security and dynamic change in configuration. Modern implementations of ad-hoc networks like sensor networks in military applications or in a rescue mission need to be secured to the fullest extent to prevent any type of external or internal damage.

Although security issues in ad-hoc networks have drawn considerable attention over the past few years, not much work is being done to make the routing protocols secured in an ad-hoc scenario. In this research we intends to find a secure route in an ad-hoc network application which can withstand the attack of any malicious entity or a compromised node. Our protocol should be robust against any internal attack within the network tending to inject malicious routing information and disrupting the network operation. We intend to find a secure and efficient route to a destination based on collaborative effort of all the nodes.

Ad-hoc networks have given rise to active research issues since the recent past. The research community has been actively working on various challenges and problems that arise out of the effective implementation of ad-hoc networks. Most of the research, so far, has been done on the area of routing protocols. Thus the security issues in ad-hoc networks have been left mostly unexplored. As the ad-hoc nodes are characterized by minimum trust for each other, key management and distribution has been a challenging research issue. Most of the work on key distribution in ad-hoc networks is based on threshold cryptography and they assume the use of public key cryptosystem. The use of public key cryptography in ad-hoc networks is very limited due to the limited computational abilities of the nodes and hence is better to avoid. Thus, key distribution and efficient key management in an ad-hoc scenario are challenging research issues which are to be addressed with extreme sophistication. The motivation of our research is based on the above. We intend to find out an efficient algorithm for secured key distribution in an ad-hoc network characterized by minimum level of trust among the nodes, their limited computational power and lack of physical security.

For our publications, feel free to visit our Publications page.