Home Page
Established in 2018, the Wireless and IoT Security & Privacy (WISP) research laboratory focuses on making wireless systems more secure, with emphasis on emerging connected vehicle ecosystems, next-generation Wi-Fi and cellular systems, electronic warfare, and coexistence in shared spectrum, in order to protect their growing applications from various privacy, spoofing, and denial-of-service attacks. Our team uses machine learning and deep learning, applied cryptography, and formal protocol verification, along with testbed implementation and prototyping, to build solutions that prevent attacks, including future quantum attacks.
Our findings have been published in various journals and conferences, including IEEE INFOCOM, IEEE TWC, IEEE TMC, NDSS, ACM WiSec, IEEE JSAC, and IEEE TIFS [see Publications].
For software-defined radio experiments, WISP is housed in the Faraday Lab at RIT's ESL Global Cybersecurity Institute, where the first open-source testbed for connected vehicle security (V2Verifier) is under active development by WISP team members.
Connected Vehicle Security Course
Training modules designed for beginners and professionals with hands-on labs — based around our open-source software-defined radio testbed, V2Verifier — and lecture notes, available to research and education communities.
Vehicle-to-Vehicle (V2V) Security Research at RIT's ESL Global Cybersecurity Institute
Sponsored by the National Security Agency (NSA), a comprehensive research and education testbed is being developed at WISP (open to the community) aiming at advancing the state-of-the-art V2V security research and training of next-generation experts in connected vehicle security.
Swift jamming attack on frequency offset estimation: The Achilles' heel of OFDM systems
The demonstration of an extremely short-lived but highly successful jamming attack against OFDM-based Wi-Fi systems, arguably the swiftest jamming attack available, where the attacker precisely targets a tiny portion of the frame preamble with a specially-crafted jamming signal.
Modulation Obfuscation and Full-Frame Encryption Hiding Side-channel Information
Demonstration of Friendly CryptoJam technique, developed first in 2014 and used for obfuscating the modulation scheme and encrypting the entire (PHY) frame to mitigate the leakage of side-channel information, among other things.
Media Reflections
- WROC-TV (interview): RIT creates an open-source space to protect self-driving cars (October 26, 2020)
- IEEE Innovation at work: Student Research Team Create Prototype of Secure Vehicle-to-Vehicle (V2V) Communications System (July, 2020)
- RIT News: Imagine RIT Preview: How Phones and Laptops Can Be Tracked via Their Radio Waves (April 22, 2019)