Projects

Mobile phones are one of the essential parts of modern life. Making a phone call is not the main purpose of a smart phone anymore, but merely one of many other features. Online social networking, chatting, short messaging, web browsing, navigating, and photography are some of the other features users enjoy in modern smartphones, most of which are provided by mobile apps.

Emergency Medical Dispatch Protocols are guidelines that a 9-1-1 dispatcher uses to evaluate the nature of emergency, resources to send and the nature of help provided to the 9-1-1 caller. The current Dispatch Protocols are based on voice only calls.

However, the Next Generation 9-1-1 (NG9-1-1) architecture will allow multimedia emergency calls.

People often need help from others to perform tasks. In today's connected world, this help could come from anyone located almost anywhere in the world. However, verifying that the potential helpers are who they say they are can be challenging. Determining how qualified they are to help with the tasks at hand can be challenging as well. Existing physical identity documents and certificates come in several different formats. Each department, organization, or level of government will often have its own format or list of formats.

There is a huge research gap where the legal contracts with the challenges concerning vagueness and ambiguity have not been addressed. This research work is focused on addressing and tackling the open problem caused due to ambiguity and vagueness and how an ambiguous legal contract can be converted into ambiguity and vagueness-free blockchain-based smart legal contract.

One in seven people in the world use online social networking for a variety of purposes -- to keep in touch with friends and family, to share special occasions, to broadcast announcements, and more. The majority of society has been bought into this new era of communication technology, which allows everyone on the internet to share information with friends. Since social networking has rapidly become a main form of communication, holes in privacy have become apparent. It has come to the point that the whole concept of sharing information requires restructuring.

Security administration is an uphill task to implement in an enterprise network providing secured corporate services. With the slew of patches being released by Microsoft, HP and other vendors, system administrators require a barrage of tools for analyzing the risk due to these vulnerabilities. In addition to this, criticalities in patching some end hosts (eg., in hospitals) raises serious security issues about the network to which the end hosts are connected.

Meteorological and hydrological sensors deployed over several hundred kilometers of geographical area comprise an environmental sensor network. Large amounts of data need to be processed in minimal time and transmitted over the available low speed and low bandwidth links. This paper describes algorithms for optimal data collection and data fusion. An inductive model using exponential back-off policy is used to collect optimal amount of data.

Many enterprises are currently are contemplating on moving from traditional phone service to VoIP. Since VoIP isn't inherently secure, it is necessary for companies to strongly consider what can be done to secure VoIP communications. This project deals with four areas that enterprises need to address to provide a complete and secure VoIP setup.

1) Constructing a secured SSL/TLS based proxy server.

2) Configuration VoIP traversal through the existing firewall / NAT

3) Placing VoIP equipment on a separate VLAN from the rest of the network

Voice over IP (VoIP) telephony is emerging as an alternative to traditional public switched telephone systems (PSTN) all over the world. Currently VoIP and PSTN interoperate with each other, where a signal that begins in one may go overa series of VoIP or PSTN network and end up in a destination situated in either one of them. Conversely, liberalization of PSTN networks and growing acceptance of SIGTRAN protocol suite have introduced new and yet to be trusted signaling entities. Thus security threats emerging from one network not only affects itself but other network also.

We are currently trying to answer following questions by doing our research:

  • What are the main vulnerabilities for Drones and  can we apply threat analysis on them?
  • How to identify the operations are valid and can we model the normal drone behavior?
  • How can we understand if any malicious components/activities enabled?
  • How to operate drones in a resilient way in spite of cyber attacks and physical attacks?

Pages