Overview



Security has varying degrees of importance and endless applications: from idioglossia and encrypted message passing to padlock combinations and nuclear codes. At the heart of all these applications is information. Throughout history, people have developed new ways to share information with only the intended audience keeping those on the outside from learning what is shared. With the emergence of the Information Age and the constant improvements to performance and capabilities in computing, protecting information is more crucial than ever. It is estimated that 51% of the world’s population is connected to the Internet, making cyber security invaluable at both the consumer and industry sectors in addition to the government and military. The Information and Intelligent Security Lab has been established to investigate new methods of securing information, educating its members and enabling the implementation of emerging technologies to create more intelligent solutions.

Deep Reinforcement Learning for Vehicle-to-Everything (V2X)



Deep learning technology is developing very quickly. One of the representative branches of advanced deep learning is Policy gradient based reinforcement learning. There are two neural networks: Actor and Critic. Critic is trained to predict a reward from the given states and actions. Then, Actor is trained to generate appropriate actions from the states to maximize the result of Critic. The key point of this methodology is that deep learning can derive unpredictable actions from human or simulations. The use of this deep learning methodology is unlimited. This project utilizes the method to solve a problem of Non Orthogonal Multiple Access in Vehicle to Everything (NOMA-V2X), one of the most challenging issues in 5G wireless communication.

Security and Privacy Issues in VANET



As the number of vehicles on the road and the size of the autonomous vehicle market sharply increase, the importance of Vehicular networks that can assist drivers is also significantly increasing. Vehicular ad hoc networks (VANETs) is a special research topic that lends itself to both the automotive industry as well as self-organizing wireless networking. In VANET, diverse traffic information is shared among vehicles such as accidents and congestions to provide enhanced driving experience. In this communication process, securing the privacy of vehicles as well as reliability of communication is imperative. This project aims to establish a secured communication network based on cryptographic methods and simulations to provide solutions for better driving environments.

Anomaly Detection



Network security is a concern for anyone that uses the Internet. Users want assurance that their information isn’t being stolen for nefarious purposes, and it has become very challenging to give users a guarantee that their network is secure, especially since many breaches happen due to user action. The aim of this project is to address the network security concern via a behavior analysis approach, which will assist security analysts better address network security issues and react quicker to various threats, e.g., zero-day attacks that include direct attacks on a network and newer attack methods such as the one caused by social engineering. This project considers and tests a broad spectrum of machine learning algorithms to train models on user behavior and to detect anomaly within a network.

Detecting Malware Employs a Cipher


Trulli
Malware steals personal data. Digital image. Consolidated Technologies Blog. 31 January 2019. https://consoltech.com/blog/what-happens-if-your-computer-is-infected-by-malware/

As more users and devices connect to the internet (Cisco estimates some 480 million new users and 4.2 billion new devices by 2022), the number of potential victims grows. Malware or malicious software is a serious security risk as it hides itself as harmless software and to the average, layman user this may have serious consequences. As new security techniques develop, so too does the complexity of malware. Attackers have begun employing encryption to hide the malicious actions of their software. DarkComet (a tool that made international news when used during the conflicts in Syria), for example, encrypts its data using RC4. In a world where personal data is becoming increasingly digitized, we must continue to find new ways to thwart vulnerabilities.

Blockchain and Smart Contracts


Trulli

In 2008, with Bitcoin, Satoshi Nakamoto promoted the concept of Blockchain. Blockchain is a distributed ledger in which users can only append new transactions and read data from previous transactions. For new transactions to be added, they need to be processed and validated first; that process is handled through sets of instructions which are executed on top of the distributed ledger. These sets of instructions are commonly known as smart contracts. Blockchain and smart contracts offer possibilities to solve problems in different domains such as banking, healthcare, food industry, etc. The aim of our research is to look at previous solutions in different domains using blockchain and smart contracts and to devise new research directions.