Home Page

Established in 2018, WISP lab conducts research in the broad areas of wireless communications and security, with emphasis on attacks and defenses in next-generation Wi-Fi, the physical layer of connected vehicle protocols, and coexisting systems in a shared spectrum. For software-defined radio experiments, WISP is housed in the Faraday Lab at RIT's ESL Global Cybersecurity Institute, where the first open-source testbed for connected vehicle security (V2Verifier) is under active development by WISP team members.

Our findings have been published in various journals and conferences, including IEEE INFOCOMIEEE TMCIEEE TWCACM WiSecIEEE JSAC, and IEEE TIFS [see Publications]. 

PHY-layer security and (MIMO) frame preamble design

Modulation obfuscation and full-frame encryption

Secure spectrum sharing for 5G and coexisting systems

Trust and authentication in connected vehicles, IoT, and Wi-Fi




 Our journal paper on Protecting 5G Sidelink Scheduling in C-V2X is accepted to appear in IEEE TWC. (Congrats to Geoff!)



Dr. Rahbari received NSF CAREER Award ($600K) to investigate Reliable and Quantum-resistant Connected Vehicle Security!

Connected Vehicle Security Course

Training modules designed for beginners and professionals with hands-on labs — based around our open-source software-defined radio testbed, V2Verifier — and lecture notes, available to research and education communities.

Animations and USRP (Software-defined Radio) Demos

5G C-V2X Security Research in the WISP Lab

A brief introduction to research on 5G C-V2X security going on in the Wireless and IoT Security and Privacy (WISP) lab at Rochester Institute of Technology.

Vehicle-to-Vehicle (V2V) Security Research at RIT's ESL Global Cybersecurity Institute

Sponsored by the National Security Agency (NSA), a comprehensive research and education testbed is being developed at WISP (open to the community) aiming at advancing the state-of-the-art V2V security research and training of next-generation experts in connected vehicle security.

Swift jamming attack on frequency offset estimation: The Achilles' heel of OFDM systems

The demonstration of an extremely short-lived but highly successful jamming attack against OFDM-based Wi-Fi systems, arguably the swiftest jamming attack available, where the attacker precisely targets a tiny portion of the frame preamble with a specially-crafted jamming signal.

Modulation Obfuscation and Full-Frame Encryption Hiding Side-channel Information

Demonstration of Friendly CryptoJam technique, developed first in 2014 and used for obfuscating the modulation scheme and encrypting the entire (PHY) frame to mitigate the leakage of side-channel information, among other things.