Preserving Privacy and Security in 5G network slicing
The cellular phone system represents the most ubiquitous and trusted communication infrastructure in the world. The cellular system has evolved a lot in the past two decades, starting from a basic audio communication system to the current smart phone system. In the last few months, the COVID pandemic has made us realize the cellular network's enormous importance more, and it has become the most integral part of human life. As the whole nation is looking forward to the jump from 4G to 5G LTE network, we look for the brighter side of 100x faster download speed, 10x decrease in latency, and 100x increase in network capacity. However, with all these advantages comes a greater risk of privacy of the users. The Cybersecurity & Infrastructure Agency (CISA) director Christopher Krebs stated in the August 2020 report “From my perspective, 5G is the single biggest critical infrastructure build that the globe has seen in the last 25 years and, coupled with the growth of cloud computing, automation, and future of artificial intelligence, demands focused attention today to secure tomorrow.” To achieve higher bandwidth and broader coverage, the 5G loosen the network architecture's tight control, which opens several vulnerabilities.
Sustainance against Jamming using Honeynet in Cognitive Radio Network
Open and dynamic spectrum access model brings forth a serious challenge of sustenance among the CRN and makes them more susceptible to jamming-based denial of service (DoS) attacks. Inspired by honeypot in the network security, we propose a honeynet based defense mechanism called CR-honeynet. CR-honeynet aims to avoid attacks on legitimate communications by dedicating a Secondary User (SU) as a honeynode, to deter the attacker from attacking legitimate SUs and attack the honeynode instead.
Neighbor Discovery for Directional Tranceivers
Directional Radio Frequency (RF) / Free-Space Optical (FSO) transceivers have the potential to play a significant role in future generation wireless networks. They are advantageous in terms of improved spectrum utilization, higher data transfer rate, and lower probability of interception from unwanted sources. Despite these advantages, communications using directional transceivers require establishment and maintenance of line-of-sight (LOS). Thus, the establishment of the communication link or neighbor discovery plays a significant role in mobile ad hoc networks with RF/FSO directional transceivers. In this project, we design protocols for discovering LOS of a neighbor for both in-band and out-of-band cases.
Mitigate Jamming using Adaptive Beamforming Antenna
In multihop ad hoc networks, a jammer can drastically disrupt the flow of information by intentionally interfering with links between a subset of nodes. The impact of such attacks can escalate when the jammer is moving. As a countermeasure for such attacks, adaptive beam-forming techniques can be employed for spatial filtering of the jamming signal. This paper investigates the performance of adaptive beam nulling as a mitigation technique against jamming attacks in multihop ad hoc networks. Considering a moving jammer, a distributed beam nulling framework is proposed.
Frequency Agile Radio Testbed
Rampant dynamic spectrum allocation over time leads to the creation of narrow spectrum holes which can be aggregated to fulfill the bandwidth requirements of users. Even though this approach increases the throughput, it comes at the cost of degraded spectrum utilization due to a rise in the number of required guard bands. This project aims at how a transmitter- receiver pair can coordinate among themselves on choosing the correct frequency and bandwidth for actual data communication. The next objective is to optimize the spectrum usage of each transmission such that the nodes can dynamically adapt to the environment and enhance resource utilization.
3D Obstacle Compliant Mobility Models for UAV networks in ns-3
UAV networks are envisioned to play a crucial role in the future generations of wireless networks. Due to the high cost of failures in system-based tests, initial analysis and refinement of designs and algorithms for UAV applications are performed through rigorous simulations. To facilitate such simulations for UAV systems, we presents different mobility models for emulation of a UAV's movement. We further extend these models by considering the effect of large obstacles on movement patterns following the three models. The mobility models are prepared as open-source add-ons for ns-3 network simulator.
Evaluate Performance of WiMAX
In WiMAX deployment, the challenges to service providers lie with the Quality of Service (QoS) under varying fading environment while at the same time maximizing for resource utilization. In this research, a rigorous and comprehensive performance study of mobile WiMAX has been made with respect to adaptive modulation and coding techniques considering the variation in the speed of the mobile, path-loss, scheduling services and application type for comparing with the fixed type of modulations.