NSF Org: |
CNS Division Of Computer and Network Systems |
Recipient: |
|
Initial Amendment Date: | January 24, 2022 |
Latest Amendment Date: | April 12, 2024 |
Award Number: | 2144645 |
Award Instrument: | Continuing Grant |
Program Manager: |
Sol Greenspan
sgreensp@nsf.gov (703)292-7841 CNS Division Of Computer and Network Systems CSE Direct For Computer & Info Scie & Enginr |
Start Date: | July 1, 2022 |
End Date: | June 30, 2027 (Estimated) |
Total Intended Award Amount: | $551,775.00 |
Total Awarded Amount to Date: | $322,997.00 |
Funds Obligated to Date: |
FY 2023 = $108,582.00 FY 2024 = $110,860.00 |
History of Investigator: |
|
Recipient Sponsored Research Office: |
2550 NORTHWESTERN AVE # 1100 WEST LAFAYETTE IN US 47906-1332 (765)494-1055 |
Sponsor Congressional District: |
|
Primary Place of Performance: |
305 N University Street West Lafayette IN US 47907-2107 |
Primary Place of Performance Congressional District: |
|
Unique Entity Identifier (UEI): |
|
Parent UEI: |
|
NSF Program(s): | Secure &Trustworthy Cyberspace |
Primary Program Source: |
01002425DB NSF RESEARCH & RELATED ACTIVIT 01002223DB NSF RESEARCH & RELATED ACTIVIT |
Program Reference Code(s): |
|
Program Element Code(s): |
|
Award Agency Code: | 4900 |
Fund Agency Code: | 4900 |
Assistance Listing Number(s): | 47.070 |
ABSTRACT
The inevitable integration of many individual system components programmed independently into the Internet of Things (IoT) systems has brought new challenges that require urgent attention. The main challenge is to produce proofs of correctness that ensure the composite behavior of IoT devices in physical spaces - the environment in which they operate - adheres to desired safety and security policies. Recent research in systems security introduced methods to synthesize IoT implementations that guarantee a range of safety and security policies. These approaches focus either on policy specification and verification of individual components in isolation of each other or ensure security through models solely abstracted from the source code of programs. Despite the success of past research, there is a significant gap in developing theory and practice that indicates how the behavior of each device can be unified to formally reason about the safety and security of IoT systems in practice. This project integrates research activities aimed at designing and developing algorithms and tools that formally produce the composite behavior of an IoT system and a rigorous foundation for reasoning about an IoT environment's global safety and security. The results of this project will ultimately enhance the current verification and validation practices of IoT systems and build trust in national infrastructure and protect citizens.
The specific goals of the project are divided into three research thrusts. The first thrust focuses on constructing a novel composite model by unifying the behavior of individual system components through a combination of static analysis and system identification techniques to represent an IoT system's global behavior. The second thrust aims to establish a rigorous foundation for identifying physical behavior-based policies and developing formal analysis techniques that ensure an IoT system adheres to safety and security policies. The last thrust seeks to establish a series of techniques to make model construction and policy validation scalable and exhaustive in diverse IoT systems. A common theme in all research directions is the adaptive creation and disposal of system components that allow for flexible configuration of added, removed, and updated IoT devices, programs, and environmental changes. Thus, the research activities will apply to existing software systems and guide future system designs.
This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.
PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH
Note:
When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
Please report errors in award information by writing to: awardsearch@nsf.gov.