cyber infrastructure https://cybersecurity.sitemasonry.gmu.edu/ en Vijay Shah joins $2M NTIA-funded project on 5G cybersecurity https://cybersecurity.sitemasonry.gmu.edu/news/2024-02/vijay-shah-joins-2m-ntia-funded-project-5g-cybersecurity <span>Vijay Shah joins $2M NTIA-funded project on 5G cybersecurity</span> <span><span>Teresa Donnellan</span></span> <span>Thu, 02/08/2024 - 16:06</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="intro-text">George Mason University researcher <a href="https://www.gmu.edu/profiles/vshah22" target="_blank">Vijay Shah</a> has joined a $2 million project to develop a system to secure 5G Open Radio Access Network (O-RAN) architecture.</span></p> <p><span><span>Funded by the <a href="https://www.ntia.gov/press-release/2024/biden-harris-administration-awards-nearly-80m-wireless-innovation" target="_blank">National Telecommunications and Information Administration (NTIA)</a>, the project "A Holistic Cybersecurity Testing Framework for 5G Radio Access Networks" is a collaboration with Virginia Tech, Penn State University, and Worcester Polytechnic Institute.</span></span></p> <p><span><span>Shah, who leads <a href="https://www.nextgwirelesslab.org/" target="_blank">Mason’s NextG Wireless Lab</a>, will be allocated nearly a quarter of the project’s budget and be working with Nishith Tripathi and Jeff Reed from Virginia Tech, Syed Rafiul Hussain from Penn State University, and Bo Tang from Worcester Polytechnic Institute.</span></span></p> <figure role="group" class="align-left"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq266/files/styles/small_content_image/public/2024-02/vijay_shah_insta.png?itok=I6P-LqqG" width="350" height="350" alt="Vijay Shah" loading="lazy" /></div> </div> <figcaption>Vijay Shah</figcaption></figure><p lang="EN-US" xml:lang="EN-US" xml:lang="EN-US">Security vulnerabilities in O-RAN present a critical cybersecurity challenge in the era of 5G. The team aims to create “a holistic and automated cybersecurity testing framework for O-RAN,” per the project’s executive summary.  </p> <p lang="EN-US" xml:lang="EN-US" xml:lang="EN-US">Shah will also receive funding from the Commonwealth Cyber Initiative (CCI) to investigate fingerprinting technology for 5G/NextG O-RAN supply chain risk management, additional funding that highlights the multifaceted approach taken by the NextG Wireless Lab to address 5G networks cybersecurity challenges. </p> <p lang="EN-US" xml:lang="EN-US" xml:lang="EN-US">As part of these initiatives, the NextG Wireless Lab is actively growing its research team, with opportunities for postdoctoral researchers and PhD students interested in O-RAN cybersecurity, testing, and supply chain management.</p> <p lang="EN-US" xml:lang="EN-US" xml:lang="EN-US">Those interested in contributing to cutting-edge research in this field should <a href="mailto:vshah22@gmu.edu" target="_blank">email Shah</a>.</p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class='field__items'> <div class="field__item"><a href="/taxonomy/term/136" hreflang="en">Department of Cyber Security Engineering</a></div> <div class="field__item"><a href="/taxonomy/term/151" hreflang="en">Department of Cyber Security Engineering faculty</a></div> <div class="field__item"><a href="/taxonomy/term/196" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/716" hreflang="en">5G/6G Wireless Communications</a></div> <div class="field__item"><a href="/taxonomy/term/131" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/206" hreflang="en">cyber infrastructure</a></div> <div class="field__item"><a href="/taxonomy/term/236" hreflang="en">Research</a></div> <div class="field__item"><a href="/taxonomy/term/851" hreflang="en">WCC</a></div> </div> </div> </div> </div> </div> Thu, 08 Feb 2024 21:06:24 +0000 Teresa Donnellan 701 at https://cybersecurity.sitemasonry.gmu.edu Cybersecurity engineering design team protects critical infrastructure  https://cybersecurity.sitemasonry.gmu.edu/news/2021-04/cybersecurity-engineering-design-team-protects-critical-infrastructure <span>Cybersecurity engineering design team protects critical infrastructure </span> <span><span>Anonymous (not verified)</span></span> <span>Mon, 04/05/2021 - 16:14</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p>Industrial control systems (ICS) manage our everyday water, electricity, and gas resources. The same interconnectedness and automation that makes these systems effective and efficient also increases their vulnerability to dangerous attacks that could leave cities and states without essential resources.  </p> <p>A cybersecurity engineering senior design team is testing a scaled-down ICS system provided by Dragos, Inc. to help the company shore up its cybersecurity infrastructure.  </p> <p>Seniors Marissa Costa, Natalie Sebastian, Kyle Simmons, Andrew Smith, Santiago Taboada Patino, and Zaine Wilson are working together to address the problem “Our whole job is to poke around and complete a security assessment on the ICS that Dragos, Inc. provided. We are attacking it and pinpointing vulnerabilities that need to be addressed,” says Patino.  </p> <p>The team is penetration testing numerous components of the system Dragos, Inc. provided them to use. Penetration testing simulates a cyber-attack and pinpoints vulnerabilities. “The penetration testing we are doing is the best way possible to gain an understanding of how a cyber-attack could be carried out. Pen testing is like rating a bridge for how much weight it can support versus actually building a test bridge and driving progressively heavier trucks over it until it collapses,” says Wilson.  </p> <p>Ensuring ICS security like the one the students are working on safeguards our world’s critical infrastructure. Power plants, water distributors, and gas companies all use ICS to protect the delivery of their customers’ essential resources. “Power, water, gas—they all start at one point and end at another, typically people’s homes or businesses. ICS provides the security to safeguard those processes, and without security measures, entire power plants could be shut down by malicious cyber attackers,” says Simmons.    </p> <p>Dragos, Inc. delivered the system to the Fairfax Campus last fall. The team is spending their senior year penetration testing and using the vulnerabilities they find to create detection rules that can be included in future updates. Working with their faculty advisor, Assistant Professor Thomas G. Winston, and a subject matter expert from Dragos, Inc. makes the process as efficient as possible.   </p> <p>The Department of Cyber Security Engineering forges partnerships with companies like Dragos, Inc. to provide real-world projects for students. But this project has a specific impact that made the team excited to start. “Industrial control systems have cyber-physical effects. People can understand it easier as opposed to more obscure cyber-attacks. In this case, a system could be breached, and lives could be lost,” says Wilson.  </p> <p>Attacks like these have occurred across the globe and even close to home. Costa points to a recent attack in the United States that illustrated the vulnerabilities in the system. In February, a cyber attacker hacked a water treatment plant in Florida and remotely adjusted sodium hydroxide levels to more than 100 times the normal level, news outlets reported. Luckily, the system operator noticed the intrusion and immediately reduced the level back, but left unchanged, the water would have been toxic.    </p> <p>Dangerous attacks like those in Florida are why the team’s work is valuable to society. </p> <p>The team jumped on the chance to work on this project because of its importance. They are excited they are contributing to protecting everyday life. “Industrial control systems like this one involve real people in their homes, people in a community who can be harmed by attacks on these systems," says Costa. </p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class='field__items'> <div class="field__item"><a href="/taxonomy/term/206" hreflang="en">cyber infrastructure</a></div> <div class="field__item"><a href="/taxonomy/term/131" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/121" hreflang="en">cybersecurity bachelor&#039;s program</a></div> <div class="field__item"><a href="/taxonomy/term/216" hreflang="en">Senior Capstone Project</a></div> <div class="field__item"><a href="/taxonomy/term/211" hreflang="en">Senior Design Project</a></div> </div> </div> </div> </div> </div> Mon, 05 Apr 2021 20:14:10 +0000 Anonymous 571 at https://cybersecurity.sitemasonry.gmu.edu