Award Abstract #0430271
Collaborative: A Survivable Information Infrastructure for National Civilian BioDefense
NSF Org: |
CNS
Division of Computer and Network Systems
|
|
|
Initial Amendment Date: |
September 13, 2004 |
|
Latest Amendment Date: |
July 1, 2006 |
|
Award Number: |
0430271 |
|
Award Instrument: |
Continuing grant |
|
Program Manager: |
Karl N. Levitt
CNS Division of Computer and Network Systems
CSE Directorate for Computer & Information Science & Engineering
|
|
Start Date: |
September 15, 2004 |
|
Expires: |
August 31, 2008 (Estimated) |
|
Awarded Amount to Date: |
$691860 |
|
Investigator(s): |
Yair Amir yairamir@cs.jhu.edu (Principal Investigator)
Brian Coan (Co-Principal Investigator)
|
|
Sponsor: |
Johns Hopkins University
3400 N CHARLES ST
BALTIMORE, MD 21218 410/516-8668
|
|
NSF Program(s): |
ITR-CYBERTRUST
|
|
Field Application(s): |
0000912 Computer Science
|
|
Program Reference Code(s): |
HPCC,9217,7254
|
|
Program Element Code(s): |
7456
|
ABSTRACT
Proposal Number: CNS-0430271
TITLE: A Survivable Information Infrastructure for National Civilian BioDefense
PI: Yair Amir
This project focuses on the theoretical foundation and the protocols that facilitate a survivable information infrastructure that meets the critical requirements of a national emergency response system. Specifically, the project will address the following challenges:
(1) expand the existing theoretical framework to analyze the behavior of malicious and colluding participants; (2) design and construct a scalable survivable messaging system that operates correctly under a strong adversarial model that includes insider threat and denial of service attacks; (3) design and construct information access protocols that protect against compromised database servers providing incorrect data or servers that deny access to legitimate users; and (4) prevent malicious users from learning unauthorized information. The domain of application for this work is the Clinicians' Biodefense Network (CBN), a nationwide Internet-based information exchange system designed to provide clinicians with critical information in the aftermath of a bioterrorist attack. The CBN is designed to mitigate benign Internet faults and to resist a physical attack on one location. However, it is not able to correctly operate under a stronger threat model that includes insider attacks. Solutions for this stronger threat model are not currently available and present a major research challenge. This project will construct a prototype survivable system based on the CBN, and from it draw general principles. It will develop a solid theoretical foundation and novel system tools to facilitate building national emergency networks that are resilient against cyber-attacks in crisis situations, when those networks are most urgently needed.
PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH
(Showing: 1 - 3 of 3).
Y. Amir, C. Danilov, S. Goose, D. Hedqvist and A. Terzis.
"1-800-OVERLAYS: Using Overlay Networks to Improve VoIP Quality,"
International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV),
2005,
p. 51.
Yair Amir, Claudiu Danilov, Danny Dolev, Jonathan Kirsch, John Lane, Cristina Nita-Rotaru, Josh Olsen, David Zage.
"Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks (Award paper),"
International Conference on Dependable Systems and Networks (DSN 2006),
2006,
p. 105.
Yair Amir, Claudiu Danilov, Michael Hilsdale Raluca Musaloiu-Elefteri, Nilo Rivera.
"Fast Handoff for Seamless Wireless Mesh Networks,"
MobiSys 2006,
2006,
p. 83.
(Showing: 1 - 3 of 3).
Please report errors in award information by writing to: awardsearch@nsf.gov.
|