MS defense: Boosting Base Station Anonymity in Wireless Sensor Networks

MS Defense

Exploiting Architectural Techniques for Boosting
Base Station Anonymity in Wireless Sensor Networks

Zhong Ren

2:00pm Thursday, 28 April 2011, ITE 346

Wireless Sensor Networks (WSNs) can be deployed to serve mission-critical applications in hostile environments such as battlefield and territorial borders. In these setups, the WSN may be subject to attacks in order to disrupt the network operation. The most effective way for an adversary to do so is by targeting the Base-Station (BS), where the sensor data are collected in the field. By identifying and locating the BS, the adversary can launch attacks to damage or disrupt the operation of the BS. Therefore, maintaining the BS anonymity is of utmost importance in WSNs.

In this thesis we propose three novel approaches to boost the anonymity of the BS nodes to protect them from potential threats. We first explore the deployment of more BS nodes. We compare the BS anonymity of one versus multiple stationary BS under different network topologies. Our results show that having more base-stations can boost both the average and max anonymity of BS nodes. We further provide guidelines on a cost versus anonymity trade-off to determine the most suitable BS count for a network. Second we exploit the mobility of base-stations and explore the effect of relocating some of the existing BS nodes to the lowest anonymity regions. Our results show that having one mobile BS can dramatically boost the anonymity of the network and moving multiple BS does not provide much value. Finally, we propose to pursue dynamic sensor to cluster re-association to confuse the adversary. This can be employed when base-stations cannot safely move.

Committee members:

  • Mohamed Younis (Chair)
  • Yun Peng
  • Charles Nicholas

CSEE students presenting at the 2011 Graduate Research Conference

Congratulations to the record number of CSEE graduate students who will make oral or poster presentations at the 2011 UMBC Graduate Research Conference on Friday April 29th. The presentations will take place in two sessions, one 9:00 to 10:50 and another 11:00 to 12:50. Poster sessions will be on the seventh floor of the library and oral presentations in UC 312. See the GRC site for a program booklet with abstracts and the session schedules.

Oral presentations:

  • Yousef Ebrahimi, Increasing Transmission Power for Higher Base-station Anonymity in Wireless Sensor Network
  • Zamon Granger, Stabilizing Air Pressure in a Hermetic Environment with Embedded Technology
  • Congchong Liu, Optimizing MapReduce Programming Model through Adaptive Load Balance
  • Kavita Krishnaswamy, Path planning a robotic arm efficiently
  • Varish Mulwad, Generating knowledge from tables
  • Darshana Dalvi, Genome-based Clinical Decision Support System
  • Ashwini Lahane, Detection of unsafe actions in laparoscopic cholecystectomy surgical videos
  • Karuna Pande Joshi, Lifecycle of virtualized services on the cloud
  • Jon Ward, ICF: A Physical Layer Metric for Measuring Anonymity in Wireless Sensor Networks
  • Theoplis E. Stewart Sr., Smart Grid: What are some underlying implications to overlaying digital technology onto the electric power grids?

Poster presentations:

  • Sai Ma, Tom Eichele and Nicolle M. Correa, Hierarchical and graphical analysis of fMRI network connectivity in healthy and schizophrenic groups.
  • Shiming Yang , Near Real"time Data Assimilation for the HYSPLIT Aerosol Dispersion Model.
  • Yu Wang , A Framework for GPU 3D Model Reconstruction using Structure-from-Motion
  • Akshaya Iyengar, Estimating Temporal Boundaries of Events using Social Media Data
  • Brice Cannon, Paveen Apiratikul and John Hryniewicz, Characterization of semiconductor optical waveguides
  • Brian White Jr., The Mobile Memory
  • Xing Chen, Standoff photoacoustic chemical detection using quantum cascade lasers
  • Yi Xin, On Gas Detection and Concentration Estimation via Mid-IR-based Gas Detection System Analysis Model
  • Robert J. Weiblen, Calculation of the expected bandwidth for a mid-infrared supercontinuum source based on As2S3 chalcogenide photonic crystal fibers
  • Pramod Jagtap, Privacy Preservation in Context Aware Geo-social Networking Applications

MS defense: Privacy Preservation in Context-Aware Systems

Mobile devices will provide better services if then can model, recognize and adapt to their users' context.

MS Defense

Privacy Preservation in Context-Aware Systems

Pramod Jagtap

1:00pm Wednesday, 27 April 2011, ITE 210

Recent years have seen a confluence of two major trends – the increase of mobile devices such as smart phones as the primary access point to networked information and the rise of social media platforms that connect people. Their convergence supports the emergence of a new class of context-aware geosocial networking applications. While existing systems focus mostly on location, our work centers on models for representing and reasoning about a more inclusive and higher-level notion of context, including the user’s location and surroundings, the presence of other people and devices, feeds from social networking systems they use, and the inferred activities in which they are engaged. A key element of our work is the use of collaborative information sharing where devices share and integrate knowledge about their context. This introduces the need for privacy and security mechanisms. We present a framework to provide users with appropriate levels of privacy to protect the personal information their mobile devices are collecting including the inferences that can be drawn from the information. We use Semantic Web technologies to specify high-level, declarative policies that describe user’s information sharing preferences. We have built a prototype system that aggregates information from a variety of sensors on the phone, online sources, and sources internal to the campus intranet, and infers the dynamic user context. We show how our policy framework can be effectively used to devise better privacy control mechanisms to control information flow between users in such dynamic mobile systems.

Presentation

Thesis Committee:

  • Dr. Anupam Joshi (chair)
  • Dr. Tim Finin
  • Dr. Yelena Yesha
  • Dr. Laura Zavala

 

MS defense: A Framework for GPU 3D Model Reconstruction Using Structure-from-Motion

MS Defense

A Framework for GPU 3D Model Reconstruction
Using Structure-from-Motion

Yu Wang

10:00am Thursday, 28 April 2011, ITE 352

A framework for three-dimensional (3D) model reconstruction is described in this thesis. The primary application is scanning forest canopies and assisting scientific applications such as fire hazard evaluation and vegetation biomass estimation, using photos taken from a radio-controlled helicopter, although the methods apply to any series of photographs taken along a path. The approach is based on the fact that the photos are taken in a continuous path, thus taking advantage of the adjacency between images. The major contributions of this project are 1) introduce a linear time complexity algorithm that reduces number of image pairs to match for datasets obtained in a continuous path. 2) present an optimized high performance framework for GPU 3D reconstruction using structure-from-motion.

Thesis Committee:

  • Dr. Marc Olano, Chair
  • Dr. Penny Rheingans
  • Dr. Erle Ellis

MS defense: eXtensible Dynamic Form (XDF) for Supplier Discovery

MS Thesis Defense

eXtensible Dynamic Form (XDF) for Supplier Discovery

Yan Kang

1:00PM Tuesday, 26 April 2011, ITE 346

Discovery of suppliers (supplier discovery) is essential for building a flexible network of suppliers in a supply chain. The first step for supplier discovery is to collect manufacturing capabilities of suppliers and requirements of customers. In traditional e-marketplaces, online form interfaces are typically used to collect the requirements and capabilities. However, those forms are mostly lack of flexibility to capture a variety of requirements and capabilities in a structured way. In this thesis, we propose new innovative form architecture called eXtensible Dynamic Form (XDF) to facilitate data collection process of supplier discovery.

This architecture provides several key innovations including: 1) architecture for users (suppliers or customers) to create new structure of form for their own contents; 2) an intelligent search engine facilitating users to reuse the existing form components 3) hierarchical representation of the requirements and capabilities as XML instances. Experimental results demonstrate that the proposed architecture is valuable for facilitating the supplier discovery process.

Thesis Committee:

  • Dr. Charles Nicholas
  • Dr. Yun Peng (Chair)
  • Dr. Yelena Yesha

MS defense: Recovering from Soft Node Failures in Wireless Sensor Networks using Neural Networks

MS Thesis Defense

Recovering from Soft Node Failures in
Wireless Sensor Networks using Neural Networks

Shivvasangari Subramani

9:00am Tuesday, 26 April 2011, ITE 346

In the past few years, wireless sensor networks (WSNs) have become important in different applications because of their robustness in hostile environments. WSNs need to perform in a timely manner in the face of interference, attacks, accidents, and failures. Being a battery operated system, there is a trade-off between performance and energy utilization. In this thesis we focus on WSN accuracy and consider ways to improve the performance of WSNs when sensors become damaged, resulting in poor input signal quality. When all other components of the sensor like the processor, memory, and battery are working, our proposed solution is to learn to undo the damage in a node by training on neighbors sensor values.

Thesis Committee:

  • Dr. Anupam Joshi
  • Dr. Tim Oates (chair)
  • Dr. Mohamed Younis

MS defense: Graph-Theoretic Approach to Collusion Detection in Multi-Agent Systems

MS Thesis Defense

A Graph-Theoretic Approach to
Collusion Detection in Multi-Agent Systems

Peter Hamilton

9:00am Thursday, 28 April 28 2011, ITE 325B

The study of trust and cooperation is a major component of multi-agent systems research. Such work often focuses on how best to estimate the reliability of a specific agent, or how to create strategies and protocols that engender the most cooperation from the most agents. However, when cooperation is not a desired aspect of a multi-agent system, these actions define collusive behavior, which can have a significant impact on the dynamics of the system.

This thesis defines a generic, graph-theoretic approach to collusion detection known as CODING. This approach detects group-based collusion, targeting two basic collusion mechanisms that rely on large numbers of colluding agents for success. CODING analyzes and classifies agent interactions from the system and constructs a series of interaction graphs from this data. These graphs are processed for structures that correspond to collusion mechanisms; the agents composing these structures are reported as colluders. CODING is applied to a game theory domain, in which it must detect agents adhering to group strategies in round-robin tournaments composed of single-player strategies.

Thesis Committee:

  • Dr. Marie desJardins (chair)
  • Dr. Tim Finin
  • Dr. Tim Oates

 

MS defense: Feature Extraction using a Hierarchical Growing Neural Gas

M.S. Thesis Defense Announcement

Feature Extraction using a Hierarchical Growing Neural Gas

Roger Guseman

12:00pm 25 April 2011, ITE 210

Unsupervised, data-driven, automatic feature extraction from image data is an interesting and difficult problem. High dimensional data, such as images, often contain less information than they do data. For an agent to better reason about this data, finding the "interesting" features in the data is helpful. A current technique, known as the Growing Neural Gas (GNG), is a neural network approach to feature extraction. There are, however, adaptations that can be made to the Growing Neural Gas in order to increase its performance.

Contributions of this work include development of a new neural network algorithm extending the Growing Neural Gas framework, known as the Hierarchical Growing Neural Gas (HGNG), identification of how the parameters of the HGNG affect feature extraction performance, and theoretical and empirical comparisons of performance between the normal GNG and the HGNG neural networks.

Thesis Committee:

  • Dr. Tim Oates (chair)
  • Dr. Tim Finin
  • Dr. Marie desJardins

 

MS defense: Problem selection of program tracing tasks in an intelligent tutoring system

Master's Thesis Defense Announcement

Problem Selection of Program Tracing Tasks in an Intelligent
Tutoring System and Visual Programming Environment

David Walser

2:00pm Thursday, 28 April 2011, ITE 325b

Intelligent tutoring systems (ITSs) have been shown to be an effective supplementary teaching tool or aid for many domains. Applying ITSs in open-ended domains such as computer programming is especially challenging, most notably when trying to assist with the process of programming itself. Existing ITSs for programming focus on a very limited set of problems and concepts and are only useful early in an introductory CS course and a few limited places afterward. Visual programming environments are another tool that have been used in introductory CS courses to help students learn basic concepts. The key idea behind my work is the recognition of the importance of students' ability to read, understand, and trace code in order to write programs successfully. A broader goal of my work is to show that an ITS based on a visual programming environment can be used to support students throughout an entire introductory CS course, without being severely constrained and limited to a small number of concepts and to low-level, simple tasks. In my system, called RUR-ITS, students are given a program and are asked to predict the robot's behavior when running this program in a given environment. RUR-ITS allows each problem to be assigned a difficulty level and multiple concepts that it involves within the conceptual model. RUR-ITS can then use a problem selection algorithm to choose a problem that is most able to help the student master the concepts that they have not yet mastered.

Thesis Committee:

  • Dr. Marie desJardins, Chair
  • Dr. Tim Finin
  • Dr. Tim Oates

     

Maryland Cyber Conference and Challenge (MDC3)

The Maryland Cyber Challenge and Conference site is up and student teams can now register for the competition, with the first qualifying round early in September. It is a chance to demonstrate your ability to work in a team and your cybersecurity and problem solving skills.

MDC3 is a joint effort between SAIC, UMBC, DBED, TCM and NCSA to bring people together to promote Maryland's commitment to cybersecurity and STEM education. The competition includes three levels: high school, collegiate and professionals from industry/government, providing opportunities to network with cybersecurity professionals, researchers, and scholars.

There will be orientation sessions at the UMBC Technology Center (1450 South Rolling Rd., 21224) on May 2, May 18 and June 21 at 4:30pm for professionals and 6:00pm for students.

1 32 33 34 35 36