E N D
SENSOR FUSION LAB RESEARCH ACTIVITIES PART II: SIGNAL/IMAGE PROCESSING, NETWORKING AND SECURITYSensor Fusion Lab,Department of Electrical Engineering and Computer Science Pramod K. Varshney 335 Link Hall, Syracuse University, Syracuse, NY 13244 Email: varshney@ecs.syr.edu Security and Information Assurance Computer and Wireless Networking Noise Enhanced Signal Processing • Node Misbehaviors • Cooperative Networks • An acknowledge-based approach is proposed to detect and prevent routing misbehavior in Mobile Ad Hoc Networks (MANETs) • Sensor Networks, Cognitive Radio (CR) Networks • Analysis & Mitigation Schemes for Byzantine (Data-Falsification) Attacks • Minimum fraction of Byzantines needed to blind the CR network. • Game-theoretic / Algorithmic analysis of the Byzantine threat. • Mitigation schemes: Reputation-based Byzantine removal, Adaptive Fusion rules through Byzantine learning and NESP-based designs. • A witness-based solution for information-assurance that validates the data sent from data fusion nodes to the base station • Improves existing system’s performance by injecting suitable noise to the input. • Established the mathematical framework to analyze and optimize the NESP effect in signal detection and estimation systems • Proposed two noise enhanced image processing system frameworks to enhance the performance of image processing systems • Transmission-Hyperspace/Dynamic Spectrum Access(DSA) • Permutation-Trellis Codes for the mitigation of interference from the primary users (PU). • Distributed Hyperspace Sharing games: Time, Space, Spectrum, Power Allocation and Coding • Genetic Algorithms (GA) for Joint Admission-Control and Power Allocation in multi-band CR networks • Geographic-Routing protocols for DSA with backtracking in CR Networks • Research Capabilities • Potential applications in Radar signal processing, Communications, Image Processing (medical image enhancement, segmentation, lesion detection), Human Sensory Systems (Hearing-Aids, Balance), Acoustic Signal processing ( Voice Activity Detection, Whisper detection) N = 30 µ= 3 σ= 1 A = 1 • Signal: X = A + W(n) • Noise Distribution: • Test Statistics: Sign Detector • Market-based Protocols • Market-based Sensor Management • Pricing-based information acquisition • Auction-based Spectrum Allocation via Participatory Sensing • Incentive-based content delivery mechanisms Image Processing Block diagram of a WSN for detection using a data fusion node and two witness Byzantine Threats in CR Networks • Region of interests (ROI) Image Enhancement • Noise enhanced image segmentation • Iterative Lesion Detection Algorithm • Eavesdropping • Sensor design to optimize detection and secrecy performance in WSNs. • Counterattack schemes: Secure Feedback for Perfect Secrecy, Artificial Noise in MIMO beamforming. • A novel random key pre-distribution scheme that exploits deployment knowledge and avoids unnecessary key assignment • Distributed Sensor Networks • Distributed, intelligent, energy-efficient, and self-spreading deployment algorithms are proposed for mobile sensor networks • Multi-objective algorithms are designed for optimum sensor placement in specific sensor network applications such as target detection and localization • Traffic Management in WSNs: Decoupling Congestion Control and Fairness • Navigation: Geographic in-network path planning algorithms for sensor network navigation in dynamic hazardous environments Original Image LSEWRI Segmentation Uniform noise enhanced segmentation • Analysis of Remote Sensing Data • Registration • Mutual Information based registration for different modality images • Subspace based Fourier method for fast registration. • Fusion • Markov Random Fields (MRF) to model correlation in neighborhood pixels • Performance evaluation based on human vision system (HVS) models • Detection and Classification • ICA based unsupervised classification, Sub-pixel mapping and soft classification. • MRF based change detection, Concealed weapon detection Secrecy Gain in terms of KL Divergence at Eve in a WSN grid employing MIMO beamforming with artificial noise. Omnidirectional Antennas Directed Antennas with BW = Navigation of users using a static sensor network in hazardous environments • Disruptive Interference and Jamming in CR Networks • Transmission-Hyperspace Allocation games in the presence of jammers. • Minimax games between the jammer and the CR network for spectrum sensing.. • Research Capabilities • Development, design and evaluation of image processing systems • Remote-Sensing: Surveillance, Registration, Classification, Change Detection, data compression, feature extraction systems • Medical: ROI determination, Lesion Detection, Registration, Fusion, Segmentation. • Research Capabilities • Design and evaluation of new algorithms, protocols, and applications • Modeling and optimization of existing algorithms and protocols • Network simulation, emulation, and prototyping • Fundamental network theory and principles • Research Capabilities • Fundamental Limits in the presence of security threats • Development of efficient and effective strategies for securing network infrastructure from various possible threats. • Analysis and design of secure protocols, algorithms and mitigation schemes Sensor Fusion Lab