Award Abstract # 2144645
CAREER: Compositional IoT Safety and Security in Physical Spaces

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: PURDUE UNIVERSITY
Initial Amendment Date: January 24, 2022
Latest Amendment Date: April 12, 2024
Award Number: 2144645
Award Instrument: Continuing Grant
Program Manager: Sol Greenspan
sgreensp@nsf.gov
 (703)292-7841
CNS
 Division Of Computer and Network Systems
CSE
 Direct For Computer & Info Scie & Enginr
Start Date: July 1, 2022
End Date: June 30, 2027 (Estimated)
Total Intended Award Amount: $551,775.00
Total Awarded Amount to Date: $322,997.00
Funds Obligated to Date: FY 2022 = $103,555.00
FY 2023 = $108,582.00

FY 2024 = $110,860.00
History of Investigator:
  • Zeynel Celik (Principal Investigator)
    zcelik@purdue.edu
Recipient Sponsored Research Office: Purdue University
2550 NORTHWESTERN AVE # 1100
WEST LAFAYETTE
IN  US  47906-1332
(765)494-1055
Sponsor Congressional District: 04
Primary Place of Performance: Purdue University
305 N University Street
West Lafayette
IN  US  47907-2107
Primary Place of Performance
Congressional District:
04
Unique Entity Identifier (UEI): YRXVL4JYCEF5
Parent UEI: YRXVL4JYCEF5
NSF Program(s): Secure &Trustworthy Cyberspace
Primary Program Source: 01002324DB NSF RESEARCH & RELATED ACTIVIT
01002425DB NSF RESEARCH & RELATED ACTIVIT

01002223DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 025Z, 1045
Program Element Code(s): 806000
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

The inevitable integration of many individual system components programmed independently into the Internet of Things (IoT) systems has brought new challenges that require urgent attention. The main challenge is to produce proofs of correctness that ensure the composite behavior of IoT devices in physical spaces - the environment in which they operate - adheres to desired safety and security policies. Recent research in systems security introduced methods to synthesize IoT implementations that guarantee a range of safety and security policies. These approaches focus either on policy specification and verification of individual components in isolation of each other or ensure security through models solely abstracted from the source code of programs. Despite the success of past research, there is a significant gap in developing theory and practice that indicates how the behavior of each device can be unified to formally reason about the safety and security of IoT systems in practice. This project integrates research activities aimed at designing and developing algorithms and tools that formally produce the composite behavior of an IoT system and a rigorous foundation for reasoning about an IoT environment's global safety and security. The results of this project will ultimately enhance the current verification and validation practices of IoT systems and build trust in national infrastructure and protect citizens.

The specific goals of the project are divided into three research thrusts. The first thrust focuses on constructing a novel composite model by unifying the behavior of individual system components through a combination of static analysis and system identification techniques to represent an IoT system's global behavior. The second thrust aims to establish a rigorous foundation for identifying physical behavior-based policies and developing formal analysis techniques that ensure an IoT system adheres to safety and security policies. The last thrust seeks to establish a series of techniques to make model construction and policy validation scalable and exhaustive in diverse IoT systems. A common theme in all research directions is the adaptive creation and disposal of system components that allow for flexible configuration of added, removed, and updated IoT devices, programs, and environmental changes. Thus, the research activities will apply to existing software systems and guide future system designs.

This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

Ozmen, Muslum Ozgur and Li, Xuansong and Chu, Andrew and Celik, Z. Berkay and Hoxha, Bardh and Zhang, Xiangyu "Discovering IoT Physical Channel Vulnerabilities" ACM SIGSAC Conference on Computer and Communications Security (CCS) , 2022 https://doi.org/10.1145/3548606.3560644 Citation Details
Muller, Raymond "DRIVETRUTH: Automated Autonomous Driving Dataset Generation for Security Applications" Workshop on Automotive and Autonomous Vehicle Security (AutoSec) , 2022 Citation Details
Man, Yanmao and Muller, Raymond and Li, Ming and Celik, Celik and Gerdes, Ryan "That Person Moves Like A Car: Misclassification Attack Detection for Autonomous Systems using Spatiotemporal Consistency" USENIX Security Symposium , 2023 Citation Details
Farrukh, Habiba and Ozmen, Muslum Ozgur and Kerem Ors, Faik and Celik, Z. Berkay "One Key to Rule Them All: Secure Group Pairing for Heterogeneous IoT Devices" IEEE Symposium on Security and Privacy (IEEE S&P) , 2023 https://doi.org/10.1109/SP46215.2023.10179369 Citation Details
Ozmen, Muslum OzguR and Farrukh, Habiba and Kim, Hyungsub and Bianchi, Antonio and Celik, Z. Berkay "Rethinking Secure Pairing in Drone Swarms" Vehicle Security and Privacy (VehicleSec) , 2023 Citation Details
Ozmen, Muslum Ozgur and Song, Ruoyu and Farrukh, Habiba and Celik, Z. Berkay "Evasion Attacks and Defenses on Smart Home Physical Event Verification" Network and Distributed System Security Symposium (NDSS) , 2023 https://doi.org/10.14722/ndss.2023.23070 Citation Details
Song, Ruoyu and Ozmen, M. Ozgur and Kim, Hyungsub and Muller, Raymond and Celik, Bianchi "Discovering Adversarial Driving Maneuvers against Autonomous Vehicles" USENIX Security Sympoisum , 2023 Citation Details
Farrukh, Habiba and Mohamed, Reham and Nare, Aniket and Bianchi, Antonio and Celik, Z. Berkay "LocIn: Inferring Semantic Location from Spatial Maps in Mixed Reality" USENIX Security Symposium , 2023 Citation Details
Mohamed, Reham and Farrukh, Habiba and Lu, Yidong and Wang, He and Celik, Z. Berkay "iSTELAN: Disclosing Sensitive User Information by Mobile Magnetometer from Finger Touches" Proceedings on Privacy Enhancing Technologies , v.2023 , 2023 https://doi.org/10.56553/popets-2023-0042 Citation Details
Muller, Raymond and Man, Yanmao and Celik, Z. Berkay and Li, Ming and Gerdes, Ryan "Physical Hijacking Attacks against Object Trackers" ACM SIGSAC Conference on Computer and Communications Security (CCS) , 2022 https://doi.org/10.1145/3548606.3559390 Citation Details

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page