Interested? Be sure to review what it takes to work for me. If these projects look interesting, reach out to me.
- Obfuscated 5G
- Next G and 5G: Spectrum Sharing
- Economics of Illegal Robocall Mitigation
- National Security / Emergency Preparedness Communications
- Other opportunities
- Resilient and Reliable ML for Wireless Systems
- Closing the Digital Divide - Accessibility and Affordability
Other Research Projects Underway
- Return on Investment in a DoD Environment
- Distributed Oracles
- DeFi Liquidity State of the Art
- DeFi Arbitrage State of the Art
- Next G wireless networks
- VoIP transition
- Cyber Threat Intelligence Information Exchange
- Policy and Governance for Secure Communications
We are developing a universal radio adapter that will enable seamless and secure operation through non-cooperative indigenous 5G networks. This is a multi-university project; our part is around data hiding, also known as obfuscation. We will be using stenographic technologies embedded in popular applications to blend in with local traffic. The obsfucator will be integrated in with a physical radio adapter that runs from HF through Ku bands for military users and UHF through EHF for 5G users.
Next G and 5G: Spectrum Sharing
We are developing a generalized context-aware spectrum sharing and interference analysis tool that provides a set of dynamic policies and extends the state of the art of spectrum policy regulation. Today, the current understanding of ”dynamic” spectrum sharing is embodied by the existing CBRS SAS model. That model has a fixed notion of regulatory policy, namely the fixed hierarchy where Federal users get first priority, then paid users, followed by unlicensed users. Moreover, spectrum repurposing in the U.S. tends to be made with decade-long time horizons. The heart of our proposed work is its ability to apply multiple contextual aspects of the environment for frequency assignments. The dynamic physical environment, such as weather, new buildings, summer/winter foliage, etc. can significantly impact propagation in these bands. Moreover, a dynamic tool for spectrum sharing must take into account future technological and policy choices. Without a dynamic tool for spectrum sharing, users cannot take advantage of the continuing improvement in radio technology until the 10+ year regulatory cycle plays out. Specifically, this research will deliver a tool set for analyzing the impact of various regulatory policies on spectrum usage, sharing, and possibility of harmful interference to primary users, especially passive users. This tool set incorporates analysis for efficient spectrum sharing and harmonious coexistence with active and passive users in geographic space, including altitude, as well as in temporal space, considering, for example, satellite orbits, unmanned aerial vehicles (UAVs), or special events.
Economics of Illegal Robocall Mitigation
The FCC has implemented many regulations requiring the deployment of cryptographically secure caller identification signaling in the all-IP network. This enables the carrier to put a notation on the call saying the number was verified. This notation is the “Caller Verified” or green check mark on mobile phones and “[v]” in some networks for landline Caller-ID. However, subscribers still might not answer a verified call from a number they do not recognize. The issue is the subscriber may want to answer the call. It could be a store trying to schedule a delivery, a school calling about a school closure, or a bank calling about a suspicious charge. One proposal to address this is to have the carrier display the caller’s logo, or brand, to the subscriber when the call arrives. The presumption is that if the subscriber does not recognize the caller’s number, they will recognize their logo.
This project will look at the economic impact of branded calling on answer rates, and how the answer rates impact the caller’s business.
National Security / Emergency Preparedness Communications
Would you like to know how the communications network really works? Want to get to play with the latest 5G mobile phones, embedded computers, hardware key storage modules, 911 calling, or just learn what this list means? I will need a number of people to work on a project relating to emergency communications, including video and data. Sometimes the call absolutely, positively has to go through!
Resilient and Reliable ML for Wireless Systems
5G and more especially 6G fundamentally relies on artificial intelligence and machine learning. However, there are well-known attacks as well as it being well-known that attacks may be really hard to detect. This project will investigate and develop tools and architectures that are reliable and resilient. If you are interested in poisoning, redundant majority-stake systems, high-reliability, and really cool ML applications, this project could be for you.
Closing the Digital Divide - Accessibility and Affordability
The FCC says nearly the entire country has access to high-speed broadband access. Measurements by Microsoft, Akamai, and Ookla, to name a few, tell a different story. Is someone lying? It turns out that No - both are right. This project is building tools to help SLTT practitioners - i.e., folks with little formal engineering training, extremely broad job scope, and almost no budget - figure out how to expand broadband use.
If you are interested in wireless access technologies, wired technologies, economics, or policy, there is a lot of opportunities to make a difference!
Next G wireless networks
Protocols, applications, services, and policy for future wireless networks, 5G and Beyond. Some of this work is in association with the Next G Alliance. You would get to participate in the creation of new standards for reestablishing North American leadership in wireless networking technology, applications, services, and manufacturing.
DeFi Liquidity State of the Art
Examine the status quo of liquidity pools and existing automated market makers across different decentralized exchanges.
DeFi Arbitrage State of the Art
Most liquidity models presume arbitrage as a mechanism to provide fair pricing to realize liquidity. However, experience has shown that tokens with different characteristics have different arbitrage opportunities than tokens with similar characteristics, resulting in different distributed exchanges using vastly different algorithms, usually with the goal of reducing slippage between the tokens in the pool. Examine the arbitrage state of the art by collecting and analyzing structural characteristics of various arbitrage schemes between different implementations.
Return on Investment in a DoD Environment
Interested in how technology businesses market high technology products and services? Interested in how the Department of Defense’s needs are different from commercial enterprises? Interested in how technology gets adopted? The goal of this project is to improve the defense acquisition process to enable better acquisition decisions by adapting the best practices of the private sector and non-DoD public sector’s Return on Investment (ROI) calculations to reflect the unique, non-monetary components the DoD considers as its ‘return.’ For example, more effective stealth, faster delivery of technology to the battle field, and more complete data for analysts do not necessarily have a dollar value, but have immense value to the DoD mission.
Except for pure enterprise IT projects addressing classical enterprise IT functions of the DoD, such as payroll or non-warfighter travel, there does not exist a generic framework for ROI calculations that take into account the unique mission values for DoD acquisition. This project attempts to address this need. Moreover, we hypothesize that a standard framework for evaluating ROI may allow acquisition personnel to accelerate the development, letting, and award of contracts.
What is truth? How do we get information from the real world onto a blockchain? This project looks at the epistemological, computer science, and game theoretic aspects of encouraging distributed actors to tell the truth about real world events. Some events are trivially easy, like a Bitcoin transaction on the bitcoin blockchain. Some events are unknowable, like what number I am thinking of this instant. However, for the events in between, we are characterizing events to create an ontology of knowable and unknowable events and a framework, model, and prototype of bringing knowable events onto a blockchain.
Use of blockchain for identity management. Economics of blockchain versus conventional, distributed computing. Which legal contracts are computable on the blockchain? The policy, legal, and economic impacts of blockchain.
Cyber Threat Intelligence Information Exchange
Whatever is necessary to improve the security posture of the world’s networks, whether attacked by nation states, professional organized crime, lone hackers, or confused users.
Policy and Governance for Secure Communications
How to ensure compliance with applicable regulations, fiduciary responsibility, and legal requirements to interconnect enterprises with security or compliance responsibilities.