14 results on '"Bagchi, Saurabh"'
Search Results
2. Temperature Self-Calibration of Always-On, Field-Deployed Ion-Selective Electrodes Based on Differential Voltage Measurement.
- Author
-
Saha, Ajanta, Yermembetova, Aiganym, Mi, Ye, Gopalakrishnan, Sarath, Sedaghat, Sotoudeh, Waimin, Jose, Wang, Pengcheng, Glassmaker, Nicholas, Mousoulis, Charilaos, Raghunathan, Nithin, Bagchi, Saurabh, Rahimi, Rahim, Shakouri, Ali, Wei, Alexander, and Alam, Muhammad A.
- Published
- 2022
- Full Text
- View/download PDF
3. Distributed State Estimation Over Time-Varying Graphs: Exploiting the Age-of-Information
- Author
-
Mitra, Aritra, Richards, John A., Bagchi, Saurabh, and Sundaram, Shreyas
- Abstract
We study the problem of designing a distributed observer for an LTI system over a time-varying communication graph. The limited existing work on this topic imposes various restrictions either on the observation model or on the sequence of communication graphs. In contrast, we propose a single-time-scale distributed observer that works under mild assumptions. Specifically, our communication model only requires strong-connectivity to be preserved over nonoverlapping, contiguous intervals that are even allowed to grow unbounded over time. We show that under suitable conditions that bound the growth of such intervals, joint observability is sufficient to track the state of any discrete-time LTI system exponentially fast, at any desired rate. We also develop a variant of our algorithm that is provably robust to worst-case adversarial attacks, provided the sequence of graphs is sufficiently connected over time. The key to our approach is the notion of a “freshness-index” that keeps track of the age-of-information being diffused across the network. Such indices enable nodes to reject stale estimates of the state, and, in turn, contribute to stability of the error dynamics.
- Published
- 2022
- Full Text
- View/download PDF
4. Behavioral and Game-Theoretic Security Investments in Interdependent Systems Modeled by Attack Graphs
- Author
-
Abdallah, Mustafa, Naghizadeh, Parinaz, Hota, Ashish R., Cason, Timothy, Bagchi, Saurabh, and Sundaram, Shreyas
- Abstract
In this article, we consider a system consisting of multiple interdependent assets, and a set of defenders, each responsible for securing a subset of the assets against an attacker. The interdependencies between the assets are captured by an attack graph, where an edge from one asset to another indicates that if the former asset is compromised, an attack can be launched on the latter asset. Each edge has an associated probability of successful attack, which can be reduced via security investments by the defenders. In such scenarios, we investigate the security investments that arise under certain features of human decision making that have been identified in behavioral economics. In particular, humans have been shown to perceive probabilities in a nonlinear manner, typically overweighting low probabilities and underweighting high probabilities. We show that suboptimal investments can arise under such weighting in certain network topologies. We also show that pure strategy Nash equilibria exist in settings with multiple (behavioral) defenders, and study the inefficiency of the equilibrium investments by behavioral defenders compared to a centralized socially optimal solution.
- Published
- 2020
- Full Text
- View/download PDF
5. Adversarial attacks on reinforcement learning agents for command and control
- Author
-
Dabholkar, Ahaan, Hare, James Z, Mittrick, Mark, Richardson, John, Waytowich, Nicholas, Narayanan, Priya, and Bagchi, Saurabh
- Abstract
Given the recent impact of deep reinforcement learning in training agents to win complex games such as StarCraft and DoTA (Defense Of The Ancients)—there has been a surge in research for exploiting learning-based techniques for professional wargaming, battlefield simulation, and modeling. Real-time strategy games and simulators have become a valuable resource for operational planning and military research. However, recent work has shown that such learning-based approaches are highly susceptible to adversarial perturbations. In this paper, we investigate the robustness of an agent trained for a command and control task in an environment that is controlled by an active adversary. The C2 agent is trained on custom StarCraft II maps using the state-of-the-art RL algorithms—Asynchronous Advantage Actor Critic (A3C) and proximal policy optimization (PPO). We empirically show that an agent trained using these algorithms is highly susceptible to noise injected by the adversary and investigate the effects these perturbationshave on the performance of the trained agent. Our work highlights the urgent need to develop more robust training algorithms especially for critical arenas like the battlefield.
- Published
- 2024
- Full Text
- View/download PDF
6. Learning from the Ones that Got Away: Detecting New Forms of Phishing Attacks
- Author
-
Gutierrez, Christopher N., Kim, Taegyu, Corte, Raffaele Della, Avery, Jeffrey, Goldwasser, Dan, Cinque, Marcello, and Bagchi, Saurabh
- Abstract
Phishing attacks continue to pose a major threat for computer system defenders, often forming the first step in a multi-stage attack. There have been great strides made in phishing detection; however, some phishing emails appear to pass through filters by making simple structural and semantic changes to the messages. We tackle this problem through the use of a machine learning classifier operating on a large corpus of phishing and legitimate emails. We design
SAFe-PC (Semi-Automated Feature generation for Phish Classification), a system to extract features, elevating some to higher level features, that are meant to defeat common phishing email detection strategies. To evaluateSAFe-PC , we collect a large corpus of phishing emails from the central IT organization at a tier-1 university. The execution ofSAFe-PC on the dataset exposes hitherto unknown insights on phishing campaigns directed at university users.SAFe-PC detects more than 70 percent of the emails that had eluded our production deployment of Sophos, a state-of-the-art email filtering tool. It also outperforms SpamAssassin, a commonly used email filtering tool. We also developed an online version ofSAFe-PC , that can be incrementally retrained with new samples. Its detection performance improves with time as new samples are collected, while the time to retrain the classifier stays constant.- Published
- 2018
- Full Text
- View/download PDF
7. TRIFECTA: Security, Energy Efficiency, and Communication Capacity Comparison for Wireless IoT Devices
- Author
-
Sen, Shreyas, Koo, Jinkyu, and Bagchi, Saurabh
- Abstract
The widespread proliferation of sensor nodes in the era of the Internet of Things (IoT), coupled with increasing sensor fidelity and data acquisition modality, is expected to generate 30+ Exabytes of data per month by 2020. Since most of these IoT devices will be wirelessly connected at the last few feet, wireless communication is an integral part of the future IoT scenario. The ever-shrinking size of unit computation (Moores law) and continued improvements in efficient communication (Shannons law) are expected to harness the true potential of the IoT revolution and produce a dramatic societal impact. However, reducing the size of IoT nodes and the slow improvement in energy storage density leads to reduced energy availability. Moreover, smaller size and less energy means fewer resources available for securing IoT nodes, making the energy-sparse low-cost leaf nodes of the network prime targets for attackers. In this article, we survey six prominent wireless technologies with respect to three dimensions: security, energy efficiency, and communication capacity. We point out the state of the art, open issues, and the road ahead for promising research directions.
- Published
- 2018
- Full Text
- View/download PDF
8. A delay-bounded event-monitoring and adversary-identification protocol in resource-constraint sensor networks.
- Author
-
Koo, Jinkyu, Shin, Dong-Hoon, Lin, Xiaojun, and Bagchi, Saurabh
- Subjects
WIRELESS sensor networks ,COMPUTER network protocols ,CONSTRAINT satisfaction ,WIRELESS sensor nodes ,COMPUTER engineering ,CRYPTOGRAPHY ,COMPUTER simulation - Abstract
Abstract: Event monitoring is a common application in wireless sensor networks. For event monitoring, a number of sensor nodes are deployed to monitor certain phenomenon. When an event is detected, the sensor nodes report it to a base station (BS), where a network operator can take appropriate action based on the event report. In this paper, we are interested in scenarios where the event must be reported within a time bound to the BS possibly over multiple hops. However, such event reports can be hampered by compromised nodes in the middle that drop, modify, or delay the event report. To defend against such an attack, we propose Sem, a Secure Event Monitoring protocol against arbitrary malicious attacks by Byzantine adversary nodes. Sem provides the following provable security guarantees. As long as the compromised nodes want to stay undetected, a legitimate sensor node can report an event to the BS within a bounded time. If the compromised nodes prevent the event from being reported to the BS within the bounded time, the BS can identify a pair of nodes that is guaranteSchool of Electrical and Computer Engineeringed to contain at least one compromised node. To the best of our knowledge, no prior work in the literature can provide such guarantees. Sem is designed to use the minimum level of asymmetric cryptography during normal operation when there is no attack, and use cryptographic primitives more liberally when an attack is detected. This design has the advantage that the overall Sem protocol is lightweight in terms of the computational resources and the network traffic required by the cryptographic operations. We also show an operational example of Sem using TOSSIM simulations. [Copyright &y& Elsevier]
- Published
- 2013
- Full Text
- View/download PDF
9. An optimization framework for monitoring multi-channel multi-radio wireless mesh networks.
- Author
-
Shin, Dong-Hoon and Bagchi, Saurabh
- Subjects
MULTICHANNEL communication ,WIRELESS sensor networks ,MATHEMATICAL optimization ,PROBLEM solving ,APPROXIMATION theory ,ALGORITHMS - Abstract
Abstract: This paper studies an optimal monitoring problem for behavior-based detection in multi-channel multi-radio wireless mesh networks. In behavior-based detection, nodes overhear communications in their neighborhood to determine if the behaviors of their neighbors are legitimate. The objective of this work is to maximize the number of nodes being monitored by judiciously choosing a set of monitoring nodes and also channels for the chosen monitoring nodes. This problem is NP-hard, growing exponentially with the number of monitoring nodes. We develop three approximation algorithms, each of which achieves at least a constant factor of the optimum. Furthermore, one of our algorithms achieves the best possible approximation ratio among all polynomial-time algorithms, unless P = NP. We conduct simulations in random networks and scale-free networks to evaluate the coverage and the execution time of the three algorithms. [Copyright &y& Elsevier]
- Published
- 2013
- Full Text
- View/download PDF
10. UnMask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks.
- Author
-
Khalil, Issa, Bagchi, Saurabh, Rotaru, Cristina N., and Shroff, Ness B.
- Subjects
COMPUTER security ,NETWORK routers ,SENSOR networks ,RESOURCE allocation ,WORMHOLES (Physics) ,DATA protection - Abstract
Abstract: Sensor networks enable a wide range of applications in both military and civilian domains. However, the deployment scenarios, the functionality requirements, and the limited capabilities of these networks expose them to a wide range of attacks against control traffic (such as wormholes, rushing, Sybil attacks, etc.) and data traffic (such as selective forwarding). In this paper we propose a framework called UnMask that mitigates such attacks by detecting, diagnosing, and isolating the malicious nodes. UnMask uses as a fundamental building block the ability of a node to oversee its neighboring nodes’ communication. On top of UnMask, we build a secure routing protocol, Lsr, that provides additional protection against malicious nodes by supporting multiple node-disjoint paths. We analyze the security guarantees of UnMask and use ns-2 simulations to show its effectiveness against representative control and data attacks. The overhead analysis we present shows that UnMask is a lightweight protocol appropriate for securing resource constrained sensor networks. [Copyright &y& Elsevier]
- Published
- 2010
- Full Text
- View/download PDF
11. Efficient wireless reprogramming through reduced bandwidth usage and opportunistic sleeping.
- Author
-
Panta, Rajesh Krishna, Bagchi, Saurabh, and Khalil, Issa M.
- Subjects
WIRELESS communications ,COMPUTER networks ,BANDWIDTHS ,ENERGY consumption - Abstract
Abstract: Wireless reprogramming of a sensor network is useful for uploading new code or for changing the functionality of existing code. Reprogramming may be done multiple times during a node’s lifetime and therefore a node has to remain receptive to future code updates. Existing reprogramming protocols, including Deluge, achieve this by bundling the reprogramming protocol and the application as one code image which is transferred through the network. The reprogramming protocol being complex, the overall size of the program image that needs to be transferred over the wireless medium increases, thereby increasing the time and energy required for reprogramming a network. We present a protocol called Stream that significantly reduces this bloat by using the facility of having multiple code images on the node. It pre-installs the reprogramming protocol as one image and equips the application program with the ability to listen to new code updates and switch to this image. For a sample application, the increase in size of the application image is 1 page (48 packets of 36bytes each) for Stream and 11 pages for Deluge. Additionally, we design an opportunistic sleeping scheme whereby nodes can sleep during the period when reprogramming has been initiated but has not yet reached the neighborhood of the node. The savings become significant for large networks and for frequent reprogramming. We implement Stream on Mica2 motes and conduct testbed and simulation experiments to compare delay and energy consumption for different network sizes with respect to the state-of-the-art Deluge protocol. [Copyright &y& Elsevier]
- Published
- 2009
- Full Text
- View/download PDF
12. MobiWorp: Mitigation of the wormhole attack in mobile multihop wireless networks.
- Author
-
Khalil, Issa, Bagchi, Saurabh, and Shroff, Ness B.
- Subjects
WIRELESS communications ,MOBILE communication systems ,TELECOMMUNICATION systems ,TELECOMMUNICATION - Abstract
Abstract: In multihop wireless systems, the need for cooperation among nodes to relay each other’s packets exposes them to a wide range of security attacks. A particularly devastating attack is the wormhole attack, where a malicious node records control traffic at one location and tunnels it to a colluding node, possibly far away, which replays it locally. This can have an adverse effect on route establishment by preventing nodes from discovering legitimate routes that are more than two hops away. Previous works on tolerating wormhole attacks have focused only on detection and used specialized hardware, such as directional antennas or extremely accurate clocks. More recent work has addressed the problem of locally isolating the malicious nodes. However, all of this work has been done in the context of static networks due to the difficulty of secure neighbor discovery with mobile nodes. The existing work on secure neighbor discovery has limitations in accuracy, resource requirements, and applicability to ad hoc and sensor networks. In this paper, we present a countermeasure for the wormhole attack, called MobiWorp, which alleviates these drawbacks and efficiently mitigates the wormhole attack in mobile networks. MobiWorp uses a secure central authority (CA) for global tracking of node positions. Local monitoring is used to detect and isolate malicious nodes locally. Additionally, when sufficient suspicion builds up at the CA, it enforces a global isolation of the malicious node from the whole network. The effect of MobiWorp on the data traffic and the fidelity of detection is brought out through extensive simulation using ns-2. The results show that as time progresses, the data packet drop ratio goes to zero with MobiWorp due the capability of MobiWorp to detect, diagnose and isolate malicious nodes. With an appropriate choice of design parameters, MobiWorp is shown to completely eliminate framing of a legitimate node by malicious nodes, at the cost of a slight increase in the drop ratio. The results also show that increasing mobility of the nodes degrades the performance of MobiWorp. [Copyright &y& Elsevier]
- Published
- 2008
- Full Text
- View/download PDF
13. Analysis and evaluation of Secos, a protocol for energy efficient and secure communication in sensor networks.
- Author
-
Khalil, Issa, Bagchi, Saurabh, and Shroff, Ness
- Subjects
SENSOR networks ,WIRELESS communications ,EAVESDROPPING ,SIMULATION methods & models - Abstract
Abstract: Wireless sensor networks are increasingly being used in applications where the communication between nodes needs to be protected from eavesdropping and tampering. Such protection is typically provided using techniques from symmetric key cryptography. The protocols in this domain suffer from one or more of the following problems—weak security guarantees if some nodes are compromised, lack of scalability, high energy overhead for key management, and increased end-to-end data latency. In this paper, we propose a protocol called Secos that mitigates these problems in static sensor networks. Secos divides the sensor field into control groups each with a control node. Data exchange between nodes within a control group happens through the mediation of the control head which provides the common key. The keys are refreshed periodically and the control nodes are changed periodically to enhance security. Secos enhances the survivability of the network by handling compromise and failures of control nodes. It provides the guarantee that the communication between any two sensor nodes remains secure despite the compromise of any number of other nodes in the network. The experiments based on a simulation model show a seven time reduction in energy overhead and a 50% reduction in latency compared to SPINS, which is one of the state-of-the-art protocols for key management in sensor networks. [Copyright &y& Elsevier]
- Published
- 2007
- Full Text
- View/download PDF
14. Energy-efficient on-demand reprogramming of large-scale sensor networks
- Author
-
Krasniewski, Mark, Panta, Rajesh, Bagchi, Saurabh, Yang, Chin-Lung, and Chappell, William
- Abstract
As sensor networks operate over long periods of deployment in difficult to reach places, their requirements may change or new code may need to be uploaded to them. The current state-of-the-art protocols (Deluge and MNP) for network reprogramming perform the code dissemination in a multihop manner using a three-way handshake where metadata is exchanged prior to code exchange to suppress redundant transmissions. The code image is also pipelined through the network at the granularity of pages. In this article we propose a protocol called Freshet for optimizing the energy for code upload and speeding up the dissemination if multiple sources of code are available. The energy optimization is achieved by equipping each node with limited nonlocal topology information which it uses to determine the time when it can go to sleep since code is not being distributed in its vicinity. The protocol to handle multiple sources provides a loose coupling of nodes to a source and disseminates code in waves each originating at a source with a mechanism to handle collisions when the waves meet. The protocol's performance with respect to reliability, delay, and energy consumed is demonstrated through analysis, simulation, and implementation on the Berkeley mote platform.
- Published
- 2008
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.