Research Projects

Ongoing Projects

Connected Vehicle Security

NSF Logo

Vehicle-to-everything (V2X) communication has the potential to prevent thousands of deaths caused by vehicle crashes each year, but only after critical security concerns are addressed. By examining the characteristics and security protocols of cellular V2X (C-V2X), including the implications of the physical layer and transmission scheduling for quantum resistance, we identify new vulnerabilities and evaluate novel defenses using our hybrid V2Verifier testbed and scalable C-V2X digital twin. We analyze protocol limitations and design proactive defenses, including quantum-resistant solutions and human-centered mitigations, to help bring this life-saving technology safely and securely into real-world use.

Selected Publications

Modulation (de)Obfuscation w/ Machine Learning

While modulation classification in wireless communications is primarily developed for spectrum management, sharing, and enforcement in civilian/military applications, it can be exploited by an adversary to threaten user privacy via traffic analysis, or launch selective jamming and spoofing attacks. Modulation obfuscation aims to conceal the payload’s modulation scheme/transmission rate; hence protecting the users from the related security/privacy attacks. We develop modulation obfuscation techniques and analyze their robustness against novel countermeasures one may employ, including machine learning-based techniques.

Selected Publications

Secure Spectrum Coexistence for 5G

Cellular networks are rapidly expanding their coverage and capacity to enhance connectivity services. However, this expansion likely requires coexistence with other systems—such as Wi-Fi and radio astronomy—on newly allocated frequencies. Zero-forcing beamforming is a prominent approach for limiting a base station’s interference at unintended or incumbent receivers. We investigate how this technique can be used to efficiently coexist with active Wi-Fi access points and passive radio telescopes, which require a quiet zone to detect faint signals from celestial objects, while addressing potential negative impacts on intended users and the risk of security threats in interference management, e.g., Wi-Fi starvation and astronomical measurements poisoning attacks.

Selected Publications

Recent Projects

Jamming attack on frequency offset estimation: The Achilles' heel of OFDM systems

Selected Publications

Expanding the role of preambles to support user-defined functionality in WLANs

Selected Publications