Wireless and Communication Security

Wireless communication provides flexibility and power for communication while at the same time gives much more power to attackers to break into the systems. Sensors are small low powered devices that are used for applications such as monitoring environmental factors and identification. A sensor networks consists of a collection of sensor, connected through wireless communication with the aim of providing a specific service. Security of sensor networks not only includes protection against traditional attacks but also new attacks that are specific to sensors including easy loss of sensors and the need to use weaker security primitives to cope with low sensor power.

Sensor Security and RFID

Ad hoc and sensor networks are fast becoming an integral part of information and computing systems. A sensor network consists of small, programmable elements that is in a variety of applications including battlefield, infrastructure protection, surveillance and medical monitoring, and finer data collection (e.g., in an sporting event). Sensors usually have limited power supplies, small memory sizes land low communication range.

Securing sensor networks presents many challenges nges resulting from the ease of capturing and tampering with them, and their processing limitations that makes implementation of strong security measures not possible.

Radio Frequency IDentification (RFID) tags are seen to become the most numerous computing device in near future. RFIDs provide many challenges to not only security of data but also privacy of individuals.

In sensor networks we work on application of cryptographic and non-cryptographic techniques  for providing security, and also design of intrusion detection systems to detect mis-behaving nodes. Of high is modeling security properties of RFIDs and design of systems with provable security that achieve the stated requirements.


Spam, modern-day junk mail, is unfortunately all too familiar to anyone with an email address. No longer limited to the marketing of questionable pharmaceuticals, spam is a medium for the spread of malicious software, and is widely used for fraud, like phishing and advance fee scams. Our work suggests that more convincing spam is in the offing, once spammers take full advantage of data they already have access to, and the scale at which spammers operate can put defenders at a disadvantage. We are examining these problems and looking at ways we can begin addressing them.