networking and security research center nsrc.cse.psu

40
1 Penn State, 10-5-05 Networking and Security Research Center http://nsrc.cse.psu.edu/ Professor Thomas F. La Porta, Director Department of Computer Science and Engineering

Upload: hakeem-dillon

Post on 30-Dec-2015

32 views

Category:

Documents


0 download

DESCRIPTION

Networking and Security Research Center http://nsrc.cse.psu.edu/. Professor Thomas F. La Porta, Director Department of Computer Science and Engineering. Networking and Security Research Center. Large group of networking, security and systems experts 10 faculty Approximately 50 students - PowerPoint PPT Presentation

TRANSCRIPT

1Penn State, 10-5-05

Networking and Security Research Center http://nsrc.cse.psu.edu/

Professor Thomas F. La Porta, Director

Department of Computer Science and Engineering

2Penn State, 10-5-05

Networking and Security Research Center

Large group of networking, security and systems experts

– 10 faculty

– Approximately 50 students• Ph.D., M.S. and Schreyer Honors College Seniors• 8 Ph.D. graduates

– 3 Labs in addition to individual research groups

Diverse Expertise

– Wireless networking and communications

– Performance

– Software systems

– Routing

– Distributed algorithms

– All aspects of security: networking, protocols, systems, access controls and policies

Industrial partners

– Telcordia Technologies (Full)

– Raytheon (Associate)

3Penn State, 10-5-05

Accomplishments

Research Results (details later)

– 14 major journal publications

– Over 30 conference publications• ACM Conference on Computer and Communications Security (CCS), ACM MobiHoc, IEEE INFOCOM,

IEEE International Conference on Network Protocols (ICNP), International Conference on Distributed Computing Systems (ICDCS), International Conference on Mobile Data Management (MDM), Annual Computer Security Applications Conference (ACSAC)

– 45 NSRC Technical Reports

Funding: over $3M in new funding in 2005

– 8 NSF Grants: CyberTrust (3), Networking (2), Computer Systems, Research Infrastructure, Communications

– Department of Defense

– Army Research Office (ARO)

– The Technology Collaborative (3)

– Industry: Cisco, Motorola, IBM

New Member: Trent Jaeger from IBM T.J. Watson

– operating systems security mechanisms and policies, access control, hypervisor security, source code analysis for security, operating systems, mobile code security

4Penn State, 10-5-05

Accomplishments

Awards (Faculty and Students)

– Thomas Alva Edison Patent Award

– IBM Faculty Award

– IEEE Computer Society Golden Core Award

– IEEE Computer Society Meritorious Service

– AT&T Wireless Fellowship

Appointments

– General Co-Chair, ACM Mobicom

– General Chair, Financial Cryptography

– Program Chair, USENIX Security

– Program Co-Chair, IEEE Infocom 2007

– Program Co-Chair, IEEE MASS

– Editorial Boards and Steering Committees: IEEE TMC, TWC, ToN

– Next Generation Networks Task Force for the President’s National Security Telecommunications Advisory Panel

5Penn State, 10-5-05

SIIS Laboratory (http://siis.cse.psu.edu)

FacultyFacultyProf. Trent Jaeger ([email protected])

operating systems security, policy design and analysis, source code analysis

Prof. Patrick McDaniel ([email protected])network security, security modeling, critical infrastructure, security-typed languages, formal security policy

Prof. Sencun Zhu ([email protected])ad hoc and sensor networks, buffer-overflow and worm, p2p security

Ongoing Projects:

LAN Security

Secure Storage Systems

Language Based Security

SE Linux

Telecommunications Security

Self-healing Sensor Networks

FundingFunding:

National Science Foundation

Army Research Office/DOD

CISCO

Motorola (SERC)

Raytheon (NSRC)

Factoids: Factoids: Established September 2004, (15 major publications, 6 TRs), Location - 344 IST Building - contact [email protected]

Students (8 PhD , 4 MS)Students (8 PhD , 4 MS)

6Penn State, 10-5-05

Mobile Computing and Networking (MCN) Lab (http://mcn.cse.psu.edu/)

Students: 7 PhD, 3 MS, and 3 honor BS students

– Alumni: 3 Ph.D.• Faculty members at Iowa State University and Florida

International University • Motorola Research• 9 MS students went to various companies

Support: NSF (CAREER, ITR, NeTS/NOSS, CT, CNS), Army Research Office, DARPA, Telcordia (NSRC), PDG/TTC and member companies Cisco, IBM and 3ETI

Contact: Prof. Guohong Cao, [email protected]

MCN lab conducts research in many areas of wireless networks and mobile computing, with an emphasis on designing and evaluating mobile systems,

protocols, and applications.

Projects

– secure sensor networks, collaborative data access in mobile P2P networks, mobile sensor networks, data centric sensor networks, resource management in wireless networks

7Penn State, 10-5-05

The Wireless Communication and Networking Lab performs fundamental research on wireless communication network design

Students (all from Electrical Engineering)

– 4 Ph.D., 3 MS, 1 senior

Support

– Three awards from the National Science Foundation (NSF)

– Pittsburgh Digital Green House (PDG)

– Pennsylvania Infrastructure for Technology Alliance (PITA)

– Networking and Security Research Center - Telcordia

Academic collaborators

– Penn State (NSRC), UMD, Lehigh

Industrial Partners

– Telcordia (via NSRC)

– 7 PDG member companies

Contact: Prof. Aylin Yener, [email protected]

Wireless Communication and Networking Laboratory (http://labs.ee.psu.edu/labs/wcan)

WCAN@PSU

8Penn State, 10-5-05

Research Areas: Telecom Security

Current CellularHome Location

Registers

Mobile SwitchingCenters

Closed Control

Network (SS7)

Next Generation

Servers

2G Cellular 3G Cellular/All-IP

IP Services

Closed NetworkAttacks are possible, but rare

Two new dangers:Very open environmentPassage into SS7 network

Tom La Porta and Patrick McDaniel

– Exploiting open interfaces to wireless services• GSM Short Message Service

– Toolkits for detecting possible attacks on 3G networks• Map migration of data corruption across networks

– Maintaining privacy when providing Location-Based Services (with IBM)• Tune security and flexibility

9Penn State, 10-5-05

Research Areas: Secure Sensor Networks

Adversary injecting & modifying data

Simple nodes with limited

power

Powerful nodes with better

comm capabilities

No central controller

Sencun Zhu, Guohong Cao, and Tom La Porta

– Security and privacy in data centric networks• Share data between authorized applications and users

– Network access control in ad hoc networks• Neighbor and location verification

– Hybrid security solutions for sensor networks (with 3ETI)• Leverage powerful nodes and backbone connectivity when possible

10Penn State, 10-5-05

Research Areas: Internet Security

Patrick McDaniel, Sencun Zhu and Trent Jaeger

– BGP Security (with AT&T)• Combats attacks on origins and paths

– ARP Security• Combats impersonation attacks enabled by the use of ARP

– Linux IPSec (with IBM)• Per packet access controls

16 organizations

delegate80% of

addresses

Delegations must be

authorized efficiently

Current address use in the Internet

11Penn State, 10-5-05

Research Areas: Security Test Beds and Tools

George Kesidis, Chita Das and Patrick McDaniel

– Evaluation Methods for Internet Security Technology (EMIST)• Framework for thoroughly evaluating defenses against worms, DDoS and attacks on routing (BGP)

– Tools for TCP• Focus on attacks that exploit TCP congestion control

Large scale BGP simulation – up to 20,000 autonomous systems will be simulated on the DETER test bed

12Penn State, 10-5-05

Research Areas: Trusted Computing and Systems

Trent Jaeger and Patrick McDaniel

– Automatic placement of authorization hooks in Linux Security Modules• Authenticate “operations”

– Mandatory Access Control in Xen-Linux Systems • Enforce security goals

– Multi-level security in remote storage (with Raytheon)• Grant access in distributed manner; compatible with SCSI

– Language-based tools for information flow control (with Motorola)• Language ensures data of different security levels do not interact

– Trusted computing (with Intel)• Novel approach to client puzzles to combat DDoS attacks

X serverPolicyServer

<Alice, Window, Create>?

Yes/No

Security-enhanced Operating System

Hook placement Hook effectiveness

Hook execution

13Penn State, 10-5-05

Research Areas: P2P/Overlay Networks

Wang-Chien Lee, Guohong Cao and Sencun Zhu

– Collaborative data access in mobile P2P networks• Reduce latency of data access by intelligent sharing

– Security mechanisms for overlay networks• Integration of key management and access controls

– Semantic small world• Efficient p2p structure to reduce search path length and cost

14Penn State, 10-5-05

Research Areas: Algorithms and Protocols for Sensor Networks

Guohong Cao, Tom La Porta and George Kesidis

– Controllable node mobility for mission oriented sensor networks• Leverage mobility for coverage, fault recovery, routing and application-specific functions

– Energy efficient data collection in sensor networks (with Telcordia)• Cross layer energy optimization scheme to increase network lifetime and connectivity of wireless sensor networks

– Stateless routing for location aware sensor networks• Voluntary forwarding

– Mobility prediction• Improve effectiveness of cluster algorithms

sink

S1S2

S4

S3

sink

S1S2

S4

S3

First mission: perimeter monitoring Second mission: target tracking

15Penn State, 10-5-05

Aylin Yener, Tom La Porta and Guohong Cao

– Wireless relay networks • Improve overall network performance by forwarding to nodes with best wireless backhaul• Consider different relay and forwarding and power control strategies• Channel assignment algorithms

– RFID (with 3ETI and Vocollect)• Improved media access protocols

– Mobile ML-IPSec (with 3ETI, Accipiter and Cisco)• Enable wireless-specific performance enhancements in a secure network

Research Areas: Wireless and Mobile Networks

Cell

GW

1 1

2GW

1

1

1

2

2GWBS

Group1

Group2

Orthogonal networks

Orthogonal links

16Penn State, 10-5-05

Networking Research Center

17Penn State, 10-5-05

Networking and Security Research Center

For Penn State

– Build relationships with Industry

– Define interesting and realistic research problems

– Diversify research collaborators

– Expose students to industrial research environments

– Increase impact of research

For companies

– Build relationship with Professors and students

– Develop new collaborations to solve interesting problems

– Partner on proposals

– Access to wide area of expertise

Members

– Telcordia Technologies (Full)

– Raytheon (Associate)

18Penn State, 10-5-05

Remainder of the day…

Lunch

– Poster and demonstrations (outside Cybertorium, 344B)

Faculty Talks

– Cybertorium – 1:30-3:00

Center Discussion/Feedback

– Room 333 – Center Faculty, PSU Admin, and Industry guests only

19Penn State, 10-5-05

Tom La Porta – Professor, CSE

Education

– PhD, Columbia University, Electrical Engineering

Background

– Director of Mobile Networking Research at Bell Labs until 2002

Professional Activities

– Founding Editor-in-Chief, IEEE Transactions on Mobile Computing

– Past Editor-in-Chief (Senior Advisor), IEEE Personal Communications

– General Co-Chair: ACM Mobicom 2005

– Program Co-Chair: IEEE ICNP 2004

Awards

– Bell Labs Fellow

– IEEE Fellow

– Bell Labs Distinguished Technical Staff Award

– IEEE Computer Society Golden Core Member

– Thomas Alva Edison Patent Award

Expertise

– Mobile networking, wireless networking, secure telecommunication network signaling and control, protocol design

Support

– National Science Foundation

– DARPA/ONR MURI (subcontract through ARL)

– Technology Collaborative/Pittsburgh Digital Greenhouse

– IBM

– NSRC

20Penn State, 10-5-05

Tom La Porta – Projects

• Evolution of all-IP Mobile Networks

– Network architectures and protocols for 3G/Mobile Internet interworking

• Secure all-IP Mobile Telecommunication Networks

– Combat threats (exploit) introduced by interfaces to IP networks

• Mobile Multilayered IPSec

– Improves security and performance in wireless, mobile networks

• Secure Data Dissemination for sensor networks

– Efficient key distribution in constrained environments

• Heterogeneous ad hoc relay networks of agile radios

– New architecture to improve performance and capacity

• Node mobility for Robust Mission-Oriented Sensor Networks

– Deployment and relocation strategies for sensors

21Penn State, 10-5-05

Guohong Cao – Associate Professor, CSE

Education

– PhD, Ohio State University, Computer Science

Professional Activities

– Associate Editor, IEEE Transactions on Mobile Computing

– Associate Editor, IEEE Transactions on Wireless Communications

– Guest Editor, ACM MONET special issues on Heterogeneous Wireless Networks, 2005

– Program Vice Chair: IEEE Int'l Conf. on Mobile Ad-hoc and Sensor Systems (MASS), 2005

– Program committee of IEEE ICDCS, ACM MOBICOM, IEEE ICNP and IEEE INFOCOM

Awards

– Presidential Fellowship at the Ohio State University

– NSF CAREER, 2001

Expertise

– Mobile computing, wireless networks, sensor networks, wireless network security, distributed fault-tolerant computing, resource management and data dissemination in mobile environments

Support

– NSF (ITR, CAREER, NeTs/NOSS, CT, CNS)

– Army Research Office

– PDG/TTC – DARPA/ONR MURI (subcontract through ARL)

22Penn State, 10-5-05

Guohong Cao – Projects

• Collaborative Data Access in Mobile Peer-to-Peer Networks – Improves performance in constrained environments through collaboration.

• Controllable Node mobility for Mission-Oriented Sensor Networks – Deployment and relocation strategies for sensors

• Secure Wireless Sensor Networks – Defend against node compromises; self-healing mechanisms for sensor networks

• Mobile Multi-layered IP Security – Improves security and performance in wireless, mobile networks

• A Data-Centric Framework for Target Tacking and Data Dissemination in Sensor Networks

– New architecture for wireless sensor networks

• Designing Efficient Resource Management Schemes to Support Integrated Services in Mobile Computing Systems

– Consider both power issues and QoS issues

• Efficient Power Aware Data Access in Pervasive Computing Environment– Consider both single-hop and multi-hop models

23Penn State, 10-5-05

Wang-Chien Lee – Associate Professor, CSE

Education– PhD, Ohio State University

Background– 1996 - 2001, GTE/Version Research Laboratories, Inc.– Research group at Penn State (2002-Present): Pervasive Data Access Research Group

(http://www.cse.psu.edu/pda)

Awards– Excellence Award: GTE/Verizon Laboratories Incorporated (1997, 1999, 2000).– Achievement Award: GTE/Verizon Laboratories Incorporated (1999).

Professional Activities– Guest Editor, IEEE Transaction on Computer, IEEE Personal Communication Magazine, ACM

Mobile Networks and Applications (MONET), ACM Wireless Networks (WINET)– Technical Program Chair: International Conference on Mobile Data Access (1999); International

Workshop on Pervasive Computing (2000); International Workshop on Wireless Networks and Mobile Computing (2000/2001).

– Industrial Program Chair: International Conference on Mobile Data Management (2001-2002).– Steering Committee: International Conference on Mobile Data Management – TPC Member (2005): ICNP, ICDE, ICDCS, SAC, VLDB (Demo), DASFAA, MDM, NetDB

Expertise – Pervasive Computing, Wireless Networks, Network Services, Data Management, TMN

Current & Past Support – NSF, ARDA, GENUITY, RGC (Hong Kong)

24Penn State, 10-5-05

Wang-Chien Lee - Projects

• Location-Based Information Access in Pervasive Computing

– Investigate new ways of indexing and caching spatial data in support of location based services in pervasive computing environments.

• Semantic Small World: A Multi-Dimensional Overlay Network

– Design of a multi-dimensional overlay network, called semantic small world (SSW), that facilitates efficient semantic based search in P2P systems.

– SSW is adaptive to distribution of data and locality of interest; is very resilient to failures; and has great load balancing property.

• Protocols and Services for Location-Aware Wireless Sensor Networks

– Design of a suite of protocols, algorithms and services to provide energy-aware, time-efficient, robust and scalable location-aware wireless sensor networks.

– Tackled research issues include communication collisions, communication voids, packet losses, location errors, scalability, service latency and validity of services.

• Automata-Based XML Access Control for Networked Computing

– Design of a new XML access control mechanism, called QFILTER, for Internet-scale networked information systems.

• Secure Wireless Data Broadcast

– Development of new air indexing and key management techniques to address the security concerns in wireless data broadcast systems.

25Penn State, 10-5-05

Patrick McDaniel – Assistant Professor, CSE

Director of the Systems and Internet Infrastructure Security Lab: http://siis.cse.psu.edu

Education– PhD, University of Michigan, Electrical Engineering and Computer Science

Professional Activities– Program Chair, 15th USENIX Security Symposium, August 2005.– Vice-Chair, Security and Privacy Track, 14th World Wide Web Conference (WWW), May 2005.– General Chair, Financial Cryptography 2006, February 2006– Program Chair, Industry Track, 11th ACM Conference on Computer and Communications Security (CCS),

November 2004.– Guest editor, Journal of Computer Networks, Special issue on Web Security, Summer 2005.– Associate editor, ACM Transactions on Internet Technology (TOIT), April 2004-present.– Program Committee Member (2005): ESORICS, ACSAC, CCS (I&G), ICIS, ACM EC SACMAT, SNS, ACNS,

USENIX Secuity, USENIX Technical

Expertise – Systems security, security policy, network security, digital rights management, digital content and public policy,

network management, applied cryptography, privacy

Past and Current Support – NSF (EMIST), NSF (Distributed Type-Secure Programming)– DARPA (Dynamic Coalitions Program)– USAF (P2INGS)– Industry: Motorola, CISCO

26Penn State, 10-5-05

Patrick McDaniel – Projects

• Exploiting Open Functionality in SMS-Capable Cellular Networks

– Understanding and fixing evolving threats in cellular phone systems

• Understanding Mutable Internet Pathogens

– Predicting and counteracting next-generation malware

• Analysis of Communities of Internet in Data Networks

– Understanding interrelationships between users, hosts, and service locality

• Path Validation in Interdomain Routing

– Design and application of efficient constructions for secure path discovery and validation on the Internet

• Internet Origin Disturbances

– Route announcement wave-fronts cause odd oscillation, explanation and characterization

• Collaborative Research: Flexible, Decentralized Information-flow Control for Dynamic Environments

– Extending strong language type-safety to distributed environments

27Penn State, 10-5-05

Trent Jaeger – Associate Professor, CSE

Co-Director of the Systems and Internet Infrastructure Security Lab: http://siis.cse.psu.edu

Education– PhD, University of Michigan, Electrical Engineering and Computer Science

Professional Activities– Program Chair, Industry Track, 10th ACM Conference on Computer and Communications

Security (CCS), November 2003.– Program Chair, 6th ACM Symposium on Access Control Models and Technologies

(SACMAT), June 2001.– Steering Committee, ACM Symposium on Access Control Models and Technologies– Program Committee Member (2005): USENIX Security, ACSAC, ACM CCS (I&G), ACM

SACMAT, WWW Conference, SELinux Symposium– Program Committee Member (past): IEEE Security & Privacy, ACM CCS, ESORICS

Expertise – operating systems security mechanisms and policies, access control, hypervisor security,

source code analysis for security, operating systems, mobile code security

28Penn State, 10-5-05

Trent Jaeger – Projects

• Linux Security Analysis

– Develop source code and policy analysis tools to verify security properties in the Linux kernel, system software, and security policies

• Network Mandatory Access Control

– Extend the Linux Security Modules framework and policy languages to enable mandatory access control among a coalition of machines

• (Mostly) Automatic Generation of Reference Monitors

– Source code analyses to place complete, optimized reference monitor interfaces within applications that enforce security properties (e.g., Xwindows, Apache, OpenSGL)

• Hypervisor-Based Mandatory Access Control

– Enable hypervisors (e.g., Xen) to enforce mandatory access controls update its resources and enable effective control of higher level resources (e.g., network) via restricted Linux partitions

• Hardware-based Integrity Measurement Architectures

– Research approaches to apply the Trusted Computing Group’s Trusted Platform Module to enable remote parties to verify the integrity of a system

29Penn State, 10-5-05

Sencun Zhu – Assistant Professor, CSE and IST

Education

– Ph.D. in Information Technology from George Mason University (Aug. 2004)

Professional activities

– TPC members for ACM SASN’04, SASN’05, IEEE ICPADS’05, IEEE MASS’05

Expertise

– Network and systems security, applied cryptography

– Wireless ad hoc and sensor networks

– Peer-to-peer computing

– Performance evaluation

Current Support

– Army Research Office (ARO), NSF Cybertrust, DoD

30Penn State, 10-5-05

Sencun Zhu – Current Projects

• Security and reliability for sensor networks

– Key management framework that supports in-network processing as well as localizes the impact of node compromises

– Secure sensor data aggregation

– Security and privacy for data-centric sensor networks

– Source location anonymity

– Applications of sensor networks to public safety

• Security for ad hoc networks

– Network access control for combating resource consumption attacks

– Traceback of compromised nodes in mobile ad hoc networks

• Security for Overlay Network

– Efficient key managements and DDoS attack prevention

– Detection and identification of malicious nodes

• Preventing email worm spreading

• Countering buffer overflow attacks

31Penn State, 10-5-05

George Kesidis – Associate Professor, EE and CSE

Education– Ph.D. in EECS from U.C. Berkeley

Background– 1992-2000: prof. in E&CE Dept, University of Waterloo, Canada– 1999: sabbatical with Nortel Networks, Ottawa– 2001: part-time technical staff at Mahi Networks

Professional Activities– IEEE INFOCOM’07 TPC co-chair

Expertise– queuing, optimization, scheduling, traffic shaping, quick simulation, performance

evaluation and testing, traffic and network measurement and modeling

Support– NSF ITR Routing of Dynamic SLAs: Internet economics, pricing, billing, traffic control– NSF ITR Surveillance networks– DARPA/ONR Emerging Surveillance Plexsus (ESP): mobile sensor networking– DHS/NSF Evaluation Methods for Internet Security Technology (EMIST)– Cisco Ltd URP (2003): Internet forensics

32Penn State, 10-5-05

George Kesidis - Projects

• Dynamic SLAs: Internet economics, pricing, billing, traffic control

• Evaluation Methods for Internet Security Technology (EMIST) (ongoing)– Testbed and methods – part of a major NSF initiative

• Dynamic quarantine of misbehaving flows – Detect and isolate non-conforming TCP flows

• Surveillance networks (ongoing)

• Emerging Surveillance Plexsus (ESP): mobile sensor networking (ongoing)

• Other– residential broadband access, wireless relay systems, Internet forensics

33Penn State, 10-5-05

Aylin Yener – Assistant Professor, Electrical Engineering

Education

– PhD, Wireless Information Network Laboratory (WINLAB), Rutgers UniversityBackground

– NSF CAREER Award, 2003

– Research group: Wireless Communications and Networking Laboratory: WCAN@PennState (http://labs.ee.psu.edu/labs/wcan)

Professional Activities

– 2001- Present, Editor, IEEE Transactions on Wireless Communications

– Co-chair, Asilomar Conference Communications Track (2005); Co-chair, WirelessCom Symposium on Information Theory (2005); TPC member in IEEE Globecom, IEEE ICC, IEEE VTC (yearly)

Expertise

– Physical layer optimization; cross-layer design; CDMA; MIMO; relay networks; physical layer security

Support

– National Science Foundation • CAREER (CCF)• CCF • CNS

– Pittsburgh Digital Greenhouse

– Pennsylvania Infrastructure Technology Alliance

– NSRC/Telcordia

– Past support: USMC, AT&T Foundation, BenFranklin

34Penn State, 10-5-05

Aylin Yener – Projects

• Multiuser MIMO systems – Design of transceivers to realize the potential capacity that multiple antenna systems offer in an

environment where multiple simultaneous MIMO users transmit.

• Throughput/Capacity enhancement for single and multiple antenna CDMA systems– Performance enhancement techniques that employ adaptive beamwidth directional antennas– Performance optimization of MIMO-CDMA uplink by signature and beamformer design.– Throughput enhancement for data-centric downlink via user scheduling.

• Secure physical layer design for multiuser systems– Transmit waveform, multiaccess strategy, and power allocation for secure wireless

communications. User strategies in response to various jammer and eavesdropper capabilities.

• Relay networks/Hybrid networks and cooperative communications– Physical layer design for networks that relay information on behalf of other nodes, network

formation, transmission strategies, impact of physical layer on MAC/routing.– Distributed resource allocation algorithms.– User cooperation strategies, multiuser relay networks.

• Cross-layer design for AdHoc wireless networks and wireless sensor networks– Power control for multi-hop AdHoc networks, the impact of optimum physical layer design on

MAC and network layers for AdHoc networks– Physical layer inspired techniques for lifetime maximization for sensor networks.

• RFID networks– Algorithm design to dramatically reduce tag collisions and interference for low power RFID

networks with communication delay constraints.

35Penn State, 10-5-05

Chita Das - Professor, CSE

Education

– Ph.D., University of Louisiana

Background

– IIT Kharagpur (India)

– Joined Penn State in 1986

Awards

– IEEE Fellow

– Best Paper Awards (ICPP, ICDCS, PRDC)

– CSE Dept Teaching Award

Expertise

– communication networks & communication mechanisms; resource management (scheduling); QoS support in clusters and Internet; mobile computing; performance evaluation; parallel distributed computer architectures; clusters; fault-tolerant computing

Support

– NSF (scheduling, QoS, Infrastructure), Unisys (performance)

36Penn State, 10-5-05

Chita Das - Projects

• Dynamic Quarantine of Unresponsive TCP Flows

– Detect and isolate non-conforming TCP flows

• Adaptive AQM Schemes for Internet and Wireless Networks

– Improve performance of Internet and limited wireless networks

• QoS Provisioning in InfiniBand Architecture (IBA) for System Area Networks

– Design and analysis of IBA-style SANs

• Scalable and Efficient Scheduling Techniques for Clusters

– Aims at developing practical scheduling techniques for large clusters

• Performance Analysis with Commercial Workloads

– Analysis of TPC-C workloads

• Design of Cluster-based Datacenters

– Design of 3-tier data centers on cluster platforms

• Design and Analysis of System-on-Chip (SoC) Interconnects

– Design of on-chip interconnects considering area, power and reliability constraints

37Penn State, 10-5-05

John Metzner - Professor, CSE and EE

Education

– Eng. Sc. D., New York University

Background

– Acting director of the Computer Engineering Program in Electrical Engineering (two years)

– Acting Dean, School of Engineering and Computer Science, Oakland University, Rochester 1974-1980

– Professor, Electrical Engineering, Wayne State University, Detroit, Michigan

– Associate Professor, Electrical Engineering New York University

– Associate Professor, Polytechnic Institute of New York

– Research Scientist, Electrical Engineering Department, New York University

Awards

– IEEE Fellow

– Fellowships: Link Aviation, National Science Foundation, David Sarnoff

– IEEE Computer Society Distinguished Speaker/Visitor

Expertise

– ARQ protocols for reliable and efficient data communication, methods for efficient comparison of remote replicated data files, efficient reliable and secure multicasting, improved utilization of ALOHA in multi-access, error correction techniques, efficient use of wireless network resources

Support

– Many previous grants from NSF

38Penn State, 10-5-05

John Metzner - Projects

• Secure Reliable Multicasting (SAM) (Poster)

– Simple acknowledgment and key changing for combined secure and reliable multicast in moderate size groups

• Reliable multicasting

– Efficient methods of gathering acknowledgments with a tree topology and a virtual ring

– Increased value of hop-by-hop versus end-to-end error control in multicasting

– Improved efficiency by cooperation of local network stations in receiving a satellite or other multicast transmission

• Ultra wideband or light traffic ALOHA

– Communication from a mobile to a network of cooperating base stations or to other stations in an Ad Hoc network for minimal interference and energy utilization.

• Vector Symbol decoding extensions

– Study of interaction of inner codes and outer vector symbol code

– Correcting combinations of erasures and errors

– Further studies of convolutional vector symbol codes

– Applications to multi-reception code combining with vector symbol codes

39Penn State, 10-5-05

Raj Acharya – Head and Professor, CSE

Education

– PhD, University of Minnesota, Mayo Graduate School of Medicine

Background

– Research Scientist, Mayo Clinic

– Research Scientist, GE (Thomson)

– Faculty Fellow, Night Vision Laboratory, Fort Belvoir, Washington, D.C.

– NASA-ASEE Faculty Fellow, Johnson Space Center, Houston, TX

– Director, Advanced Laboratory for Information Systems and Analysis

Professional Activities

– General Chair, SPIE International Conference on Physiology and Function from Multidimensional Images

– Co-Chair, IEEE Workshop on Biomedical Image Analysis

– General Chair, SPIE Conference on Biomedical Image Processing

– Associate Editor, International Journal of Computerized Medical Imaging and Graphics

Expertise

– Net-centric computing, resource management for ad hoc networks, information fusion, bioinformatics, data mining

Support

– NSF ITR

40Penn State, 10-5-05

Raj Acharya - Projects

• Service level agreements using bandwidth brokers

• Quality of service in wireless ad hoc networks (Poster)