Resume Personal Information Technical Interests Areas of Expertise

advertisement
Resume
Personal Information
November 2010
Maria Striki
Technical Interests
Wireless, Mobile, Ad hoc, Cellular Networks, Routing algorithms, Mobile Computing, Multicast protocols,
Network and Computer Security, Key Management and Authentication, Algorithms and Optimization, Routing
Protocols, Secure Routing, Distributed Trust Models, Intrusion Detection, Socia l Networks, Information Systems,
Cybernetics, Cognitive Networks.
Areas of Expertise and Interest
For my PhD thesis, I got involved in the design of efficient and low cost key management architecture for
multicast communications, in a resource constrained, infrastructure-less, dynamic environment, such as this of
mobile ad-hoc networks (MANETs). My work focused mostly on: 1) the design, optimization, and performance
evaluation of multicast key generation and distribution protocols for MANETs (in both analytical and simulation
level), 2) entity authentication and access control algorithms , trust establishment, 3) cross-layer optimization and in
particular the interaction of scheduling with the routing layer, 4) the interaction of routing and mobility with key
management.
During my PhD studies at University of Maryland College Park, USA, and my almost three year work experience
at Telcordia Technologies Inc., New Jersey, I additionally got involved with the following projects and topics:
design and evaluation of (secure) routing algorithms, component based routing (CBR) for topology representation
and routing dissemination, design and optimization of algorithms (i.e. key management models, optimized routing
models, efficient topological structures for Intrusion Detection, etc.), propagation of trust in MANETs,
cryptography, mobile computing, clustering, wireless multicasting, cellular and ad hoc networks, Intrusion
Detection.
Computer Skills
Computer Languages: C, C++, Java, J2EE, Verilog, HTML, Ada, Prolog, Lisp, Perl, MATLAB.
Operating Systems: Unix, Linux, Microsoft Windows
Meta-Languages: XML, PHP
Software Packets: MATLAB, Mathematical, MS-Office, MS-Access, OPNET (beginner), NS-2 (some
experience).
Education
PhD in Electrical and Computer Engineering (October 2006)
University of Maryland, College Park
Thesis Title: Key Management: Towards the Design of a Secure, Efficient, Lightweight Framework for Secure
Group Communications in Large Mobile Ad Hoc Networks
Advisor: John S. Baras
MS in Electrical and Computer Engineering (May 2004)
University of Maryland, College Park
Thesis Title: Efficient Key Management Techniques for Securing Group Communications in Mobile Ad Hoc
Networks (MANETs)
Advisor: John S. Baras
BS (MS equivalent – 5 year) in Electrical and Computer Engineering (July 1999)
National Technical University of Athens (NTUA), Greece
Thesis Title: Location Area Planning
Advisors: M. Theologou, E. Protonotarios, E.Tzifa, P.Demestichas
High-school Degree -
Excellent - (June 1994)
st
1 Lyceum of Nea Smyrni, Athens, Greece
University of Maryland, College Park.
Degree: Ph.D., Department of Electrical and Computer Engineering, October 2006.
Thesis Title: “Key Management: Towards the Design of a Secure, Efficient, Lightweight Framework for
Secure Group Communications in Large Mobile Ad Hoc Networks “. My research focuses on the development
of autonomous, efficient, robust key management (KM) schemes for secure group communications, capable of
distributed operation where key infrastructure components are absent or inaccessible . We designed novel or
improved KM schemes that accomplish the following: (a) the extra overhead issued to secure the network is as
low as possible – our protocols present better performance than this of existing schemes for similar environments,
(b) they successfully handle network dynamics and failures, in networks with large number of nodes. We
contributed towards secure, scalable and efficient protocols with the design of two new Octopus-based protocols
(GDH.2-based MO and TGDH-based MOT), and the adaptation of the original Octopus (O) to MANETs. In
addition, we have contributed to the following: (1) extended a number of KM protocols to overcome failures with
low overhead, (2) used Elliptic Curves Cryptography (ECC) in the protocols studied to reduce the associated
communication and computation costs further, and promote more proactive scheme to deal with failures, and (3)
investigated the effects of a number of mobility models in the performance of our schemes and adapted a
lightweight leader election scheme, suitable for the Octopus-based protocols.
Implementations (Prototyping): Real-time implementation of (O) and MOT (Linux (kernel-2.4.18), and OpenSSL
library for symmetric key encryptio n (DES)), which includes both the basic functionality of the protocols for the
establishment of a multicast group key (including the multicast group formation) and also the response of the
protocols in cases of dynamic membership changes in the multicast group (detection of group change and new key
establishment). The presentation of the protocols is supported from a GUI and a user level multicast application
which encrypts, transmits, receives and decrypts multicast data (i.e. pictures), by utilizing the established group
keys of the protocols. The implementation is still on-going, as more functions are being gradually included to the
basic framework (i.e. entity authentication, access control, leader election).
Demos: CTA Review May ’03 - ‘05, CTA Demo Exhibitions Oct. ‘04, IEEE SECON Sept. ‘05.
- - - - - - - - - - - - - - - -- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Degree: M.S., Department of Electrical and Computer Engineering, April 2004.
Thesis Title: “Efficient Key Management Techniques for Securing Group Communications in Mobile Ad Hoc
Networks (MANETs)”. My thesis deals with the design and performance evaluation of novel or improved key
generation-distribution protocols for secure group communications in MANETs. We developed protocols
addressing the environments of Flat or Hierarchical MANETs separately. Among all, for Hierarchical MANETs,
we designed a 2-level Hybrid scheme that consists of various key generation protocols in combinations to
optimize a number of metrics of interest, such as bandwidth, routing, computation cost. This scheme exploits
battlefield diversity, and links key distribution to network topology and nodes’ mobility. For Flat MANETs, we
extended the 2d -Octopus protocol, by desig ning two novel schemes, MO and MOT. The particular features of
MOT, as well as the results of the comparative performance evaluation, show that this protocol not only improves
significantly its ancestor scheme, but outperforms a number of well-known key generation schemes as well.
Related graduate courses in UMD
?
?
?
?
?
?
?
?
?
?
?
?
Random Processes for Communication and Control
Information Theory
Computer Architecture, and Advanced Topics in Computer Architecture: Microarchitecture
Estimation and Detection Theory
Design of Distributed Computer Systems
Digital Signal Processing
Computer Aided Design of Digital Systems
Multi-user Communications
Network Security
Mathematical Foundations for Computer Systems, and Advanced Analysis of Algorithms
Advanced topics in Cryptography
Communications, Computer Architecture, and Bioengineering Seminars
Major Field: Communications, Minor Field: Computer Engineering, Department: ECE
Faculty Advisor: Prof. John S. Baras
Room #: 2247 AV.Williams Bldg,
Institute for Systems Research,
University of Maryland, College Park, 20742
Office phone: (301) 405 6606
Email: baras@isr.umd.edu
National Technical University of Athens, Athens, Greece.
Degree: B.S. (5 years – MS equivalent), Electrical and Computer Engineering Dept., June 1999
Diploma Thesis Title: “Location Area Planning”. My diploma thesis focuses on the design of Location Areas in
mobile wireless communications in such a way that the Total Communication Cost resulting from the Location
Update and Paging is minimized. Towards this end, we have explored and analyzed how Location Areas should be
interconnected with respect to the number of cells comprised in each, following and modifying basic principles
found in “Genetic Algorithms”.
Thesis Advisors: Prof. M.Theologou, Prof. E.M. Protonotarios, Dr. L.Tzifa, Dr P.Demestichas.
GPA: 9.12/10.0
Professional Experience
Rank: 4/230
Telcordia Technologies Inc, Piscataway, NJ
February 2007 – present
Senior Research Scientist – Advanced Technologies Department.
Projects
I have been participating to a number of government and/or commercial projects on:
(1) the design and implementation of optimized routing protocols, under the Component Based Routing (CBR)
theory consideration. CBR theory can be interpreted as designing and analyzing protocols from orthogonal
components. An example that highlights the usefulness of CBR can be the following: provide analytic modeling of
alternatives to Multi Point Relays (MPRs) in the standard MANET Optimized Link State Routing (OLSR) protocol.
Using the latter as starting point, among other contributions, we have modeled routing dissemination applying novel
distributed techniques based on Connected Dominating Sets (CDSs) and geometric properties of polygons.
(2) the design of optimized and robust algorithms (i.e., routing, clustering) under the consideration of incomplete,
erroneous, and outdated information. We have investigated the following issues: a) How to use perfect information
(i.e., given trajectories) to improve existing deterministic algorithms and how significant the improvement becomes
compared to the original deterministic algorithms and the improved versions using only abstract information, and b)
assuming that we do have abstract mobility information described from a probability distribution function (pdf),
how well we can we do (first define a general mobility distribution model based on the collected data).
(3) the design and analysis of topological structures suitable for efficient, scalable and robust cooperative Intrusion
Detection. We have introduced analytical expressions that map Intrusion Detection structures to the metric space of
real numbers. We provided formal analytical definitions for the quantification of detection latency and resiliency for
various types of hierarchical structures (i.e., trees, HCubes, rings, chains, etc.).
(4) enhancements to the IEEE 802.21 Events, Commands and Information Elements in order to support seamless
handoff in mobile ad hoc networks in future battlefield military networks. The approach reuses as much IEEE
802.21 proposed standards as possible. Presented an IEEE 802.21 framework to support integrated Soft Handoff in
Mobile ad hoc networks, with challenges, media independent handover (MIH) primitives and recommendations for
Service Access Points. Investigated and designed scenarios for demonstrating the capability of the IEEE 802.21
MIH Services in an ad hoc test bed based on NS2 models.
(5) security of wireless, mobile, and ad hoc networks and communications, intrusion detection techniques.
(6) the simulation (using C/C++) of the performance of a novel contributory group key management protocol
(PICO) that take into account the underlying routing, and makes routing and group decisions considering routing
and network issues such as proximity (Dijkstra routing algorithm is used to detect shortest paths), link weight (i.e.,
BER), path weight, response time-out, etc. (on-going).
(7) the patent reviewing project held at Telcordia, in collaboration with Intellectual Ventures (IV) (Claude Project).
We have reviewed patents with topics related to Key Management and Security. The work has been meticulous and
progressive, including weekly Telecons with the representative colleagues from IV, continual update of the Claude
project URL with information, useful input, and final justifia ble claim charts (having determined if and why such
claim charts can be drawn).
Proposal Writing
(1) EFIPSANS
The EFIPSANS project aims at exposing the features in IP version six protocols that can be exploited or extended
for the purposes of designing or building autonomic networks and services. The vision is that, the specified
autonomic behavior specifications, the identified exploitable IPv6 features and new protocol and architectural
extensions will one day be standardized in the long run (after the first 3 years of EFIPSANS) i.e. mature from being
drafts to standards. I am currently involved in the WPs that have to do with autonomic networking and autonomic
routing.
(2) ADAPT: A Framework for Dynamically Adapting Key Management.
ADAPT is a Technical proposal prepared for the Office of Naval Research (ONR). The topic addressed is the
following: What are the network models, architectures and policies offering the greatest flexibility to exercise cyber
power and cyber defense in a federated cyberspace where the cyber "global commons" has significant economic
value that must be protected and strategic risk that must be managed? Towards this end, we are proposing a
framework called Adapt to enable diverse Key Management Protocols to be used within the same network. Adapt
will provide an analysis capability to enable a mission planner to determine policy for dynamically switching
among Key Management Protocols. Adapt will also provide a distributed mission-time capability to make policybased decisions on the best key management protocol for the current situation and, when needed, either switch Key
Management Protocols or keep the currently operational Key management protocol and change its parameters.
Courses and Certifications at Telcordia
(1) Advanced Programming in Java Using Eclipse: 5 day course, Integrated Development Environment (IDE) - Eclipse
(2) J2EE programming: 5 day course, Programming in Java 2 Enterprise Edition
(3) LTE (Long Term Evolution) Essentials: 2 days course.
(4) Mastering LTE: 1 day course
(5) OPNET Training: 5 day OPNET Training: Introductory OPNET Training (3 days), Advanced OPNET training (2 days),
Bethesda, Maryland, OPNET Headquarters.
Institute for Systems Research, University of Maryland, College Park, MD
Sept. 1999 – Oct. 2006
Sept.’99-Oct. ’06: Graduate Research Assistant for ECE Dept. Conducted research in the areas of network
security, wireless communications, mobile ad hoc networks, multicasting, routing protocols.
Focused on the design of an efficient, lightweight framework for group communication in
MANETs.
Fall ’03:
Volunteer Teaching Fellow: Instructed recitation class for graduate course: ENEE620: “Random
Processes in Communication and Control”, generated and provided the solutions to weekly
homework assignments, graded homework and exams.
Sept.’99 - May. ’02: Graduate Class Projects: Emphasis on projects in the context of the following courses
among others: (a) Computer architecture and micro-architecture (simulated in C and Verilog the
execution of CPU microcode in a five stage pipeline, mapped the physical to virtual memory,
designed and tested new methods for improving the hit ratio of the cache, the latency of branch
prediction), (b) Computer Aided Design of Digital Systems (designed and implemented algorithms
that perform operations in random graphs: e.g. search for X-sized cliques or dominating sets), (c)
Digital Signal Processing (e.g. linear prediction: sampled signals, represented them with linear
models (ARMA), and reconstructed them with the appropriate decoders), (d) Mathematical
Foundations of Computer Algorithms (implemented and graphically represented the data structure
of Red-Black Trees).
Telcordia Technologies Inc., Piscataway, NJ
Summer Internship:
June 2005 – August 2005
Supervisors : Dr Giovanni Di Crescenzo, Dr Simon Tsang.
Worked on the general topic of Security. Worked on Key Management protocols for Group Communications, in
particular, and focused Diffie –Hellman based Key Agreement protocols (i.e. DH-KA). Extended a number of KA
protocols to include routing, under the assumption of a physical group member graph. Evaluated the combined
protocols, and proposed novel topology driven algorithms to improve their efficiency. The resulting protocols are
more efficient with respect to bandwidth and latency.
Summer Internship:
June 2004 – August 2004
Supervisors: Dr Giovanni Di Crescenzo, Dr Rajesh Talpade
Designed a novel backbone scheme that supports and enhances the execution of key management protocols for
group communications. The scheme is based on the generation of a virtual minimum spanning tree (VMST) over a
subset of network nodes, and results in that the dynamics of the network (failures, membership changes) are handled
more effectively, as VMST introduces hierarchy.
Undergraduate Experience:
National Technical Unversity of Athens (NTUA)
I was involved in various programming projects through which I developed skills and experience in a number of
programming languages and systems, in the context of the following coursework: Operating Systems,
Distributed Operating Systems, Data Base Design, Data Structures, (Advanced) Computer Programming,
Organization of Programming Languages, Low-Level Programming, Introduction to Artificial Intelligence,
Software Engineering, etc.
Computer Skills (obtained from Undergraduate Courses and Projects)
Computer Languages: FORTRAN, Assembly, Pascal, C/C++, Java, HTML, SQL, Ada, Prolog, Lisp.
Operating Systems: Unix, Microsoft Windows
Software: MATLAB, MS-Office, MS-Access
General Honors and Awards
? Ranked 17th out of 150,000 candidates in Panhellenic University Entrance Exams, and 8th in the Department of
Electrical Engineering and Computer Engineering of National Technical University of Athens, in 1994.
? National Scholarship Foundation Award for Excellent Performance on the University Undergraduate Courses
for the consecutive years of 1996, 1997, 1998.
? Hellenic Society of Mathematics Award for the years of 1989, 1991.
? Second Award of Excellence in Telecommunications by ERICSSON for my undergraduate Diploma Thesis on
Location Area Planning, Summer 2000.
Publications
Conferences
? Maria Striki, Tony McAuley. “Using Novel Distributed Heuristics on Hexagonal Connected Dominating Sets
to Model Routing Dissemination”, Procs of CTRQ 2010 (Best Paper Award), Glyfada, Athens, Greece, 13-19
June 2010.
? Maria Striki, Kyriakos Manousakis, Darrell Kindred, Dan Sterne, Geoff Lawler, Natalie Ivanic, George Tran.
“On the Quantification of Resiliency and Detection Latency of Intrusion Detection Structures”, accepted for
publication and presentation at MILCOM 2009, Boston, Massachusetts, 18-21 October 2009.
? Maria Striki, Tony McAuley. “Using Distributed Heuristics on Hexagonal Connected Dominating Sets to
Model Routing Dissemination in Future Force Networks”, Procs of the 5th Int’l Conference IWCMC’09,
Leipzig, Germany, June 21-24, 2009.
? Maria Striki, John Baras. “New Algorithms for the efficient design of topology-oriented Hypercube Protocols
in Multi-hop Ad Hoc Networks”, Procs of the Eight Int’l Conference on Networking ICN’09, Gosier,
Guadalupe, French Caribbean, 1-6 March, 2009.
? Maria Striki, Tony McAuley, Raquel Morera. “Modeling Topology Dissemination for Routing in Future
Force Networks”, Procs of MILCOM’08 Conference, San Diego, California, 17-19 November 2008.
? Maria Striki, John Baras, Kyriakos Manousakis. “New Algorithms for the efficient design of topology-oriented
Group Diffie Hellman Protocols in Multi-hop Ad Hoc Networks”, Sixth Int’l Symposium on Modeling and
Optimization in Mobile, Ad Hoc, and Wireless Networks - WiOpt’08, Beriln, Germany, 31 March – 4 April
2008.
? Maria Striki, Kyriakos Manousakis, John Baras. “Fault Tolerant Extension of Hypercube for Secure, Robust,
Group Communications”, Seventh international Conference on Networking, ICN’08, Cancun, Mexico, 13-18
April 2008.
? Maria Striki, John S. Baras, Giovanni Di Crescenzo. “Modeling Key Ag reement in Multi-hop Ad -Hoc
Networks “, Procs. of IWCMC’06, pp. 39-45, July 3-6, Vancouver, British Columbia, Canada, July 2006.
? Maria Striki, John Baras. “A Robust, Distributed TGDH-based Scheme for Secure Group Communications in
MANETs “, Procs. of ICC 2006 Conference, Istanbul, Turkey, June ’06.
? Maria Striki, John Baras. “Distributed Certification Authority Generation to Enhance Autonomous Key
Management for Group Communications in MANETs”, Army Science Conference (ASC)’04, Orlando, FL.
? Maria Striki, Giovanni Di Crescenzo. “Efficient Fault-Tolerant and Distributed Key Agreement for Secure
Group Communications for Arbitrary Deployment in MANETs ”, ASC ’04, Orlando, FL.
? Maria Striki, John Baras. "Towards Integrating Key Distribution with Entity Authentication for Efficient,
Scalable and Secure Group Communication in MANETs", ICC’04 Conference, Paris, France, June 2004
? Maria Striki, John Baras. "Efficient Scalable Key Agreement Protocols for Secure Multicast Communication
in MANETs", CTA ‘03 symposium, pp. 101-105, College Park MD, May 2003.
? Maria Striki, John Baras. “Key Distribution Protocols for Secure Multicast Communication Survivable in
MANETs”, IEEE MILCOM ‘03, Boston MA, October 2003.
? Maria Striki, John Baras. “Scalable and Fault-Tolerant Key Agreement Octopus Protocols for Secure
Multicast Communication in MANETs”, 37th Conference on Information Sciences and Systems (CISS ‘03),
Johns Hopkins, Baltimore MD, March 2003.
? Maria Striki, John Baras. “Two Level Hybrid Key Scheme for Efficient Key Distribution in MANETs“. ASC
’02 Procs, Orlando, FL.
? P.Demestichas, E.Tzifa, V.Demesticha, N.Georgantas, G.Kotsakis, M.Striki, M.Kilanioti, M.Anagnostou,
M.Theologou. “Control of the location update and paging signaling load in cellular systems by means of
planning tools”, VTC, 1999 - Fall. IEEE VTS 50th , Volume: 4 , 1999, Page(s): 2119 -2123 vol.4
Journals
? P.Demestichas, N.Georgantas, E.Tzifa, V.Demesticha, M.Striki, M.Kilanioti, M.Theologou.
“Computationally efficient algorithms for location area planning in future cellular systems”. Elsevier
Journals, Computer Communications 23(13): 1263-1280 (2000)
? Maria Striki, Tony McAuley. “Using Distributed Heuristics on Hexagonal Connected Dominating Sets to
Model Routing Dissemination in Future Force Networks”, submitted, passed 1st review round, awaiting for
the final outcome.
? Maria Striki, John S. Baras. “Topology Driven Key Agreement in Mobile Ad Hoc Networks “, under
preparation.
? Maria Striki, John Baras. "Efficient Scalable Key Agreement Protocols for Secure Multicast Communication
in MANETs", under preparation.
Technical Reports
? Maria Striki, John Baras. “New Algorithms for the efficient design of topology-oriented Key Agreement
Protocols in Multi-hop Ad Hoc Networks”, HyNet, TR_2006-13, August 2006.
? Maria Striki, John Baras. “Fault Tolerant Extension of Hypercube Algorithm for Efficient, Robust, Group
Communications in MANETs”, HyNet, TR_ 2005-108, October 2005.
? Maria Striki, John Baras, “A Robust, Distributed TGDH-based Scheme for Secure Group Communications in
MANETs”, Center of Satellite and Hybrid Communications (CSHCN), Institute for Systems Research (ISR)
TR_2005-97, July 2005.
? Maria Striki, John Baras. “Two-Level Hybrid Scheme for Efficient Key Distribution in Mobile Ad-Hoc
Networks and overview of key distribution protocols“. CSHCN, ISR TR_2003-17, Jan. 2003.
? Maria Striki, John Baras. “Scalable and Efficient Key Agreement Protocols for Secure Multicast
Communication in MANETs “. CSHCN, ISR TR_2002-62, Dec. 2002.
Demos
? M. Striki, K. Manousakis, J. Baras “Implementation of Octopus based Key Agreement Protocols”, IEEE
SECON’05 Conference, Santa Clara, CA, Sept. 2005.
? M. Striki, K. Manousakis, J. Baras “Implementation of Octopus based Key Agreement Protocols”, CTA
Conference 2005, Crystal City, VA, Jun. 2005 - CTA Conference 2004, University of Maryland University
College (UMBC), College Park, MD, May 2004.
Posters
? Maria Striki, John Baras, “Two Level Hybrid Key Scheme for Efficient Key Distribution in Mobile Ad -Hoc
Networks “, Army Science Conference (ASC) ’02, Orlando, FL.
Miscellaneous
Professional Services
Reviewer
Conferences: IEEE ICC, IEEE VTC, ACNS’05, WEMIC’06, EW’06, Mobile Summit’06 – ‘07, Mobicom’06,
WCNC’07, Sarnoff’08 – ‘09
Journals: IEEE Transactions in Wireless Communications, ETRI’07
Tutorials Chair for Sarnoff’08 Conference, Princeton, New Jersey, USA, April 2008.
Served as Tutorials’ Chair for the conference, and in addition actively contributed to various aspects undertaken by
the executive committee for the successful organization of the conference. Received a Recognition Award for
significantly contributing to the set up of the conference.
Personal Information
Nationality: Hellenic , European Union Citizen.
American Visa Status: H-1B
Languages: Greek (native), English (Fluently), French (Fluently), German (moderate), Spanish (elementary).
Memberships & Activities
?
Secretary: Hellenic Graduate Students Association (DIGENIS), University of Maryland, College Park,
2001.
?
Member: IEEE Communications Society, IEEE Computer Society, Electrical and Computer Engineering
?
Graduate Student Association (ECEGSA), University of Maryland, College Park, Hellenic Graduate
Students Association (DIGENIS).
Member: Technical Chamber of Greece.
Download