Home Page
The Wireless and IoT Security & Privacy (WISP) research group (established in 2018) focuses on enhancing the security of wireless systems, with a particular emphasis on emerging connected vehicle ecosystems, next-generation Wi-Fi and cellular systems, electronic warfare, and coexistence in shared spectrum. Our aim is to protect these systems and their growing applications from various privacy, spoofing, and denial-of-service attacks. Our team uses machine learning and deep learning, applied cryptography, optimization techniques, and formal protocol verification, along with testbed implementation and prototyping, to build solutions that prevent attacks, including future quantum attacks.
Our research has been primarily supported by NSF, and our findings have been published in various journals and conferences, including IEEE INFOCOM, IEEE TWC, IEEE TIFS, NDSS, ACM WiSec, IEEE JSAC, and IEEE TMC [see Publications].
For wireless experiments, using software-defined radios and other wireless equipment, WISP is housed in the Faraday Lab at RIT's ESL Global Cybersecurity Institute, where the first open-source testbed for connected vehicle security (V2Verifier) is under active development by WISP team members. The training modules developed by the WISP group can be found under Security Training Courses.
Connected Vehicle Security Course
Training modules designed for beginners and professionals with hands-on labs — based around our open-source software-defined radio testbed, V2Verifier — and lecture notes, available to research and education communities.
Post-quantum Security for Connected Vehicles - Research in the WISP Lab
An overview of our ongoing research on integrating post-quantum (PQ) security into connected vehicle communication protocols. Check out our NDSS'24 paper here.
Vehicle-to-Vehicle (V2V) Security Research at RIT's ESL Global Cybersecurity Institute
Sponsored by the National Security Agency (NSA), a comprehensive research and education testbed is being developed at WISP (open to the community) aiming at advancing the state-of-the-art V2V security research and training of next-generation experts in connected vehicle security.
Swift jamming attack on frequency offset estimation: The Achilles' heel of OFDM systems
The demonstration of an extremely short-lived but highly successful jamming attack against OFDM-based Wi-Fi systems, arguably the swiftest jamming attack available, where the attacker precisely targets a tiny portion of the frame preamble with a specially-crafted jamming signal.
Modulation Obfuscation and Full-Frame Encryption Hiding Side-channel Information
Demonstration of Friendly CryptoJam technique, developed first in 2014 and used for obfuscating the modulation scheme and encrypting the entire (PHY) frame to mitigate the leakage of side-channel information, among other things.
Media Reflections
- WROC-TV (interview): RIT creates an open-source space to protect self-driving cars (October 26, 2020)
- IEEE Innovation at work: Student Research Team Create Prototype of Secure Vehicle-to-Vehicle (V2V) Communications System (July, 2020)
- RIT News: Imagine RIT Preview: How Phones and Laptops Can Be Tracked via Their Radio Waves (April 22, 2019)