Networking and Network Security Research Group


Our research includes Internet architecture, cyber infrastructure for sciences and engineering, wireless sensor networks (WSNs) and Internet of Things, ad hoc mobile networks, Software Defined Networking (SDN), networking and communication security, and various trust, security and privacy issues in real life applications such as health care, personal genomics, social networking and electronic voting.


Sensor Networks │ Network Security │ Cryptography

Current Projects

Revocable, Privacy-preserving and User-centric Biometric authentication: User authentication an identity management are the first-gate of defense and access protection for cyber systems. The objective of this research is to design innovative secure fusion and key extraction algorithms to address the issues of biometric template security, irrevocability, user privacy, and universal identity in user authentication. We develop a user-centric authentication model and an active authentication system. This model enables users to utilize their biometrics as universal identity to access different systems, intrinsically shields user biometrics, and provides a principle protection framework against a wide range of attacks.  This system is able to facilitate and protects individuals' diffused online activies across cyberspace.

Transparent and Stepwise Verifiable Online Voting: Current assumptions regarding voting in physical booths, hardware and software at polling places, and trusted human supervision in voting schemes, contradict society's trend toward enabling interactions from anywhere, at any time. Some form of remote electronic voting (e-voting) can potentially be a solution in Internet-dominant environments. However, apart from having conflicting requirements such as voter anonymity and vote verifiability, remote e-voting faces some unique problems such as vote-selling and voter-coercion. This work aims to investigate and develop a fully transparent, stepwise verifiable, and assurable remote electronic voting technology with everlasting privacy and resistance to vote-selling and voter-coercion.

Medical Information System Security and Health and Genomic Data Privacy: This work investigates security and privacy issues in personal medical and genomic data, and develops secure and privacy-preserving health information sharing, controlled access, and secure computation technology using advanced cryptographic techniques.

Trusted Collaborating Computing: This work investigates security and privacy issues in multiple user environments including secure group communication, group key management, (hierarchical) access control and controlled data sharing, and privacy-preserving multiple party computation.

Security and Privacy in Social and Mobile Networks: This work utilizes graph structures to represent complex relations among entities involved in social or mobile networks and designs efficient secure and privacy-preserving techniques to protect social/mobile networks from exploitation.