Source: PURDUE UNIVERSITY submitted to NRP
COLLABORATIVE RESEARCH: CPS: MEDIUM: SECURE CPS FOR REAL-TIME AGRO-ANALYTICS
Sponsoring Institution
National Institute of Food and Agriculture
Project Status
COMPLETE
Funding Source
Reporting Frequency
Annual
Accession No.
1025657
Grant No.
2021-67021-34251
Cumulative Award Amt.
$810,000.00
Proposal No.
2020-11348
Multistate No.
(N/A)
Project Start Date
Feb 15, 2021
Project End Date
Feb 14, 2025
Grant Year
2021
Program Code
[A7302]- Cyber-Physical Systems
Recipient Organization
PURDUE UNIVERSITY
(N/A)
WEST LAFAYETTE,IN 47907
Performing Department
(N/A)
Non Technical Summary
Cyber-physical systems (CPS) have now started to play an increasingly important role in autonomous sensing, analysis, and tasking in a variety of agricultural settings ranging from sustainable farming to livestock monitoring. Many of these settings demand real-time analytics, at varying timescales, and the CPS devices have to coordinate among themselves over a variety of wireless networks. As various actors in these settings---from farmers to big agro companies---have much to gain from manipulating the results of these distributed systems, it is important to make these systems fault-tolerant and secure. This project, COPIA, seeks to provide the fundamental secure distributed computing primitives tailored for real-time agro-analytics in the face of malicious faults and network failures. Despite more than four decades of work on secure distributed computing, this CPS domain introduces new requirements that COPIA will address through fundamental innovations. First, COPIA will incorporate a principled framework for comparing energy costs of protocols and deriving optimal choices of cryptographic primitives to optimize energy use. This framework will permit leveraging CPS-specific opportunities, e.g., the difficulty for an adversary to equivocate (or offer two conflicting statements to two different neighbours) due to the omnidirectional nature of wireless links. Second, COPIA will achieve consensus in dynamic networks, i.e., where CPS nodes are mobile (e.g., drones). The technical challenge here is that the communication graph of nodes dynamically changes; most existing work assumes graph connectivity is unchanging throughout the execution of the protocol. Third, COPIA will address privacy in these distributed computing protocols, as the farmers are increasingly worried about companies extracting trade secrets from sensor data. This thrust involves hardening distributed computing protocols so that a limited number of node compromises does not divulge secrets. Overall, COPIA will make vital steps toward building novel, secure distributed CPS solutions for real-time analytics by addressing significant sources of safety, privacy, and availability vulnerabilities with the current CPS solutions. The project formulates an integrated research agenda that couples a strong theoretical component with an ambitious systems research component. As the importance of precision agriculture and the associated cybersecurity threat and potential vulnerabilities grow, the proposed principled approach will become a necessity for secure real-time agro-analytics.The team will demonstrate the innovations on experimental farms at Purdue University, secure embedded testbeds consisting of heterogenous embedded nodes at lab-scale, and on data from commercial livestock IoT monitoring deployments. Through these demonstrations, COPIA will energize a student community working on security of distributed embedded systems, and a community of farmers who realize profitability and environmental sustainability, e.g., reduced fertilizer use, early detection of livestock anomalies, and improved reliability and security of their monitoring systems.
Animal Health Component
0%
Research Effort Categories
Basic
100%
Applied
0%
Developmental
0%
Classification

Knowledge Area (KA)Subject of Investigation (SOI)Field of Science (FOS)Percent
4047310208050%
4047410208050%
Goals / Objectives
The project goals are logically organized into three thrusts, namely, fault-tolerant, energy-optimized analytics, approximate consensus, and privacy-preserving distributed computation. 1. Fault Tolerant Analytics: The team's first goal is to design and develop energy-optimized secure distributed computing protocols with heterogeneous CPS elements (different compute and energy resources, different networking modalities). Our distributed consensus protocols will be resistant to malicious actors with a well-defined upper bound on the number of adversaries of different strengths. For our evaluation, we will focus on a CPS system performing ecological surveys of farmland, where farmers may be motivated to tamper with sensors toward improving their ecological ratings.We expect different protocols to perform better for different integrity-protection mechanisms and network modalities. Therefore, as part of the process, we will also develop an analytical framework for an extensive comparison of different consensus protocols. The framework models protocols as systems of equations and allows finding regions of interest, where the protocols out-perform the state of the art.2. Approximate Consensus over Dynamic Networks: For dynamic CPS networks such as livestock-mounted CPS nodes, our goal will be to understand the fundamental connectivity lower-bounds first and then offer necessary and sufficient conditions for coordination and desired analytics. We will then develop energy-optimized protocols to achieve approximate consensus over dynamic networks, and extend those to multi-layer settings. Finally, we will evaluate these protocols using our testbed at Purdue and using datasets and sensors, e.g., Cowsight from Beaconchain, a livestock IoT startup. 3. Privacy-preserving Distributed Computing: For our static as well as dynamic network settings, the project's next goal will be developing privacy-aware distributed computation protocols among a distributed set of CPS nodes. This will involve defining secure multi-party computation (MPC) protocols for dynamic CPS networks, and retrofitting differential privacy mechanisms in distributed (or federated) computation. As energy efficiency will continue to play a key role toward real-world applicability, we will also extend our analysis framework for privacy-preserving computations
Project Methods
We have brought together a multi-disciplinary team of experts in distributed systems security; embedded systems and heterogeneous and resilient computation; privacy-enhancing technologies; and applied data analytics for IoT and digital agriculture ("agro").The team has identified significant sources of safety, liveness, and privacy vulnerabilities with existing protocols for distributed CPS. We will target these challenges in a scientifically correct manner, as we place a strong emphasis on a careful abstraction of underlying primitives, precise formulations of the associated safety, liveness, privacy, and, energy-efficiency properties, and formal security analysis of the proposed protocols. This project will develop a set of nuanced and precise definitions that will help guide not only our proposed work, tested on digital agriculture-based IoT testbeds, but also future extensions to secure distributed computing for real-time analytics over CPS.The team has more than forty years of combined experience in designing distributed computing protocols, analyzing those against faults and attacks, and applying them to digital agriculture scenarios through farmland-based instantiations and algorithmic deployments on heterogeneous embedded testbeds. Guided by our definition and abstractions, we will develop provably secure distributed protocols for deterministic/approximate consensus protocols, state machine replication, and privacy-preserving variants thereof. Our protocol development methodology will involve a modular design with simultaneous attention to provable security against faults and to the energy efficiency for the CPS settings.We will demonstrate our end-to-end pipeline COPIA in both embedded heterogenous testbeds at lab-scale and farm-scale deployments through PI Chaterji's sensor node deployments in WHIN (Wabash Heartland Innovation Network)-alliance farms.Finally, in addition to canonical local collaboration and mentoring at each institution, the research teams at Purdue and Duke will collaborate intensively with one another. To facilitate this collaboration, all project personnel will hold semi-monthly ``face-to-face'' research meetings via Skype, and will communicate asynchronously on an as-needed basis via Slack. To facilitate effective collaboration and active system building and experimentation, the Duke team is requesting a relatively large travel budget, which will cover the cost of annual visits to Purdue in addition to normal conference travel expenses. Further there will be co-supervision of students through having the investigators serve on the PhD advisory committees of the various students on the project.

Progress 02/15/22 to 02/14/23

Outputs
Target Audience:The target audience reached was: Researchers in Cyber-Physical Systems (CPS) security Researchers in Applied Cryptography Practitioners in the above two areas --- these are practitioners at the leading edge of technology, who are looking to adopt and adapt leading innovation in their systems Learners --- who want to learn about the principles of CPS security and see use cases General public --- who want to get a peek at the possibility of CPS devices being used in precision agriculture Changes/Problems:Previous PI, Prof. Aniket Kate, is on a sabbatical at Supra as Chief Research Officer and will be there till August 19, 2024 (beginning of Fall semester at Purdue). He continues to engage closely with the project, participating remotely in project discussions and authoring of the publications. So this has not resulted in any major change to the project direction or rate of reaching the deliverables. What opportunities for training and professional development has the project provided?The project has allowed three graduate students to work closely with the three PIs to understand the technical topics of applied cryptography, mobile vision, and unmanned aerial vehicles. They have then understood how to create applications combining these technical topics that can meet requirements for latency, accuracy, security, and energy consumption. The students worked with a Purdue Extension drone specialist to understand the practice of flying actual drones and automatically controlling them. They also were instrumental in setting up a testbed with different kinds of embedded devices that can run various applications (like object detection or Byzantine agreement) and where the energy expenditure can be measured at a fine granularity. How have the results been disseminated to communities of interest?The results have been disseminated to the research community through papers, softwares, tutorials, and a keynote presentation. The results have been disseminated to the broader society through patent filings and websites with figures and videos of the results of the research. What do you plan to do during the next reporting period to accomplish the goals?We plan to continue work on the same threads as our current progress and make the following advancements: We will develop security protocols that can work under various network models, such as, asynchronous network where there is no time guarantee for any wireless link. We will develop security protocols that can reduce the number of messages that must be exchanged between the participating nodes. Message exchange is a major source of energy expenditure and this should allow our applications to work on energy-constrained embedded devices. We will develop distributed protocols for performing data analytics on mobile and embedded devices. This will involve careful orchestration of what is executed on the mobile/embedded devices and what is offloaded for execution on a server. Such decisions will be based on dynamic conditions such as network bandwidth and type of embedded/mobile device.

Impacts
What was accomplished under these goals? EESMR [Middleware-2023]: Modern Byzantine Fault-Tolerant State Machine Replication (BFT-SMR) solutions focus on reducing communication complexity, improving throughput, or lowering latency. This work explored the energy efficiency of BFT-SMR protocols. First, we proposed a novel SMR protocol that optimizes for the steady state, i.e., when the leader is correct. This is done by reducing the number of required signatures per consensus unit and the communication complexity by order of the number of nodes n compared to the state-of-the-art BFT-SMR solutions. Second, we modeled and analyzed the energy efficiency of protocols and argue why the steady-state needs to be optimized. Third, we presented an application in the cyber-physical system (CPS) setting, where we considered a partially connected system by optionally leveraging wireless multicasts among neighbors. We analytically determined the parameter ranges for when our proposed protocol offers better energy efficiency than communicating with a baseline protocol utilizing an external trusted node. We presented a hypergraph-based network model and generalized previous fault tolerance results to the model. Finally, we demonstrated our approach's practicality by analyzing our protocol's energy efficiency through experiments on a CPS test bed. In particular, we observe as high as 64% energy savings when compared to the state-of-the-art SMR solution for n=10 settings using BLE. UCR [FC-2023]: Most existing Byzantine fault-tolerant State Machine Replication (SMR) protocols rely explicitly on either equivocation detection or quorum certificate formations to ensure protocol safety. These mechanisms inherently require O(n2) communication overhead among n participating servers. This work proposed the Unique Chain Rule (UCR), a simple rule for hash chains where extending a block by including its hash in the next block, is treated as a vote for the proposed block and its ancestors. When a block obtains a vote from at least one correct server, we can commit the block and its ancestors. While this idea was used implicitly earlier in conjunction with equivocation detection or quorum certificate generation, this work employed it explicitly to show safety. We presented three applications of UCR: (1, 2) Synchronous SMR protocols with linear best-case communication complexity using round-robin, and stable leaders, respectively as the first two applications. (2) We employed UCR in a black-box fashion toward making any SMR commits publicly verifiable, where clients will no longer have to wait for 2t+1 confirmations on every block, where t is the number of Byzantine faults tolerated by the protocol, but can instead collect a UCR proof consisting of extensions on a block, where is a security parameter. This results in faster syncing times for clients as the publicly verifiable proofs can also be gossiped with every new block extension confirming a new block. Vega [DCOSS-2023]: UAVs (unmanned aerial vehicles) or drones are promising instruments for video-based surveillance. Various applications of aerial surveillance use object detection programs to detect target objects. In such applications, three parameters influence a drone deployment strategy: the area covered by the drone, the latency of target (object) detection, and the quality of the detection output by the object detector. Previous works had focused on improving Pareto optimality along the area-latency frontier or the area-quality frontier, but not on the combined area-latency-quality frontier, because of which these solutions are sub-optimal for drone-based surveillance. We explored a three way tradeoff between area, latency, and quality in the context of autonomous aerial surveillance of targets in an area using drones with cameras and an object detection program. We proposed Vega, a drone deployment framework that captures these tradeoffs to deploy drones efficiently. We made three contributions with Vega. First, we characterized the ability of the state-of-the-art mobile object detector, EfficientDet [CPVR '20], to detect objects from varying drone altitudes using confidence and IoU curves vs. drone altitude. Second, based on these characteristics of the detector, we proposed a set of two algorithmic primitives for drone-based maneuvers, namely DroneZoom and DroneCycle. Using these two primitives, we obtained a more optimal Pareto frontier between our three target parameters - coverage area, detection latency, and detection quality for a single drone system. Third, we scaled out our findings to a swarm deployment using higher-order Voronoi tessellations, where we control the swarm's spatial density using the Voronoi order to further lower the detection latency while maintaining detection quality.

Publications

  • Type: Conference Papers and Presentations Status: Published Year Published: 2023 Citation: Bhat, Adithya, Akhil Bandarupalli, Saurabh Bagchi, Aniket Kate, and Michael K. Reiter. "The Unique Chain Rule and its Applications." In International Conference on Financial Cryptography and Data Security (FC), pp. 38-55. Cham: Springer Nature Switzerland, 2023.
  • Type: Journal Articles Status: Published Year Published: 2023 Citation: Shankar, Karthick, Ashraf Mahgoub, Zihan Zhou, Utkarsh Priyam, and Somali Chaterji. "Asgard: Are NoSQL Databases suitable for Ephemeral Data in Serverless Workloads?", pp. 1-11. Frontiers in High Performance Computing, 2023.
  • Type: Journal Articles Status: Published Year Published: 2023 Citation: Lee, Jayoung, Pengcheng Wang, Ran Xu, Sarthak Jain, Venkat Dasari, Noah Weston, Yin Li, Saurabh Bagchi, and Somali Chaterji. "Virtuoso: Energy-and Latency-aware Streamlining of Streaming Videos on Systems-on-Chips." ACM Transactions on Design Automation of Electronic Systems (TODAES) 28, no. 3 (2023): 1-32.
  • Type: Conference Papers and Presentations Status: Published Year Published: 2023 Citation: Lee, Jayoung, Pengcheng Wang, Ran Xu, Sarthak Jain, Venkat Dasari, Noah Weston, Yin Li, Saurabh Bagchi, and Somali Chaterji. "How to Learn Collaboratively-Federated Learning to Peer-to-Peer Learning and Whats at Stake." 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-Disrupt) (2023): 122-126.
  • Type: Conference Papers and Presentations Status: Published Year Published: 2023 Citation: Bandarupalli, Akhil, Sarthak Jain, Akash Melachuri, Joe Pappas, Somali Chaterji. "Vega: Drone-based Multi-Altitude Target Detection for Autonomous Surveillance." DCOSS-IoT 2023 International Conference on Distributed Computing in Smart Systems and the Internet of Things (2023): 1-8.
  • Type: Conference Papers and Presentations Status: Published Year Published: 2023 Citation: Sharma, Atul, Wei Chen, Joshua Zhao, Qiang Qiu, Saurabh Bagchi, Somali Chaterji. "FLAIR: Defense against Model Poisoning Attack in Federated Learning." ACM ASIA Conference on Computer and Communications Security (ACM ASIA CCS 2023) (2023): 1-13.
  • Type: Conference Papers and Presentations Status: Published Year Published: 2023 Citation: Adithya Bhat, Nibesh Shrestha, Aniket Kate, and Kartik Nayak. OptRand: Optimistically Responsive Reconfigurable Distributed Randomness. In 2023 Network and Distributed System Security Symposium (NDSS), pp. 1-18, 2023.
  • Type: Conference Papers and Presentations Status: Published Year Published: 2022 Citation: Abdallah, Mustafa, Daniel Woods, Parinaz Naghizadeh, Issa Khalil, Timothy Cason, Shreyas Sundaram, and Saurabh Bagchi. "Tasharok: Using mechanism design for enhancing security resource allocation in interdependent systems." In 2022 IEEE Symposium on Security and Privacy (S&P), pp. 249-266. IEEE, 2022.
  • Type: Conference Papers and Presentations Status: Published Year Published: 2022 Citation: Azam, Sheikh Shams, Taejin Kim, Seyyedali Hosseinalipour, Carlee Joe-Wong, Saurabh Bagchi, and Christopher Brinton. "Can we generalize and distribute private representation learning?." In International Conference on Artificial Intelligence and Statistics (AISTATS), pp. 11320-11340. PMLR, 2022.
  • Type: Conference Papers and Presentations Status: Published Year Published: 2022 Citation: Nauman, Nathaniel, Ruochong Wu, and Saurabh Bagchi. "Real-Time Digital Filtering for IoT Data in Programmable Network Switches." In 2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S), pp. 41-42. IEEE, 2022.
  • Type: Conference Papers and Presentations Status: Published Year Published: 2023 Citation: Bhat, Adithya, Akhil Bandarupalli, Manish Nagaraj, Saurabh Bagchi, Aniket Kate; Michael K. Reiter (Duke University), EESMR: Energy Efficient BFT - SMR for the masses, At the 24th ACM/IFIP International Middleware Conference (Middleware), pp. 1-14, Bologna, Italy, December 2023.


Progress 02/15/21 to 02/14/22

Outputs
Target Audience:The target application audience for our project is primarily system builders for CPS/IoT applications that could improve farm efficiency. Through the Wabash Heartland Innovation Network (WHIN) project, PD Chaterji is engaged with several farmers, putting wireless mesh network sensor systems and gateway nodes in their farms, in Tippecanoe, Benton, and White counties in Indiana. Our outreach involves recorded videos showing the deployments of rugged, packaged sensor nodes and gateway nodes (NVIDIA Jetsons and Raspberry Pis) in the WHIN 10-county region, in Purdue's experimental farms (830 managed acres of Throckmorton Purdue Agricultural Center (TPAC) and 1134 acres of Agronomy Center for Research and Education (ACRE)), and the Birck Nanotechnology Center; the latter affords the sensor and gateway nodes, a laboratory environment for testing and certification. The deployments in the farms have been in partnership with the farmers and currently use the farmers' WiFi for connectivity from the gateway node to the hubs. A live map of the sensors deployed in Purdue's experimental farms as well as commercial farms is maintained at the following URL. Due to the private nature of the data, most individual farm owners have requested us to password protect their data so that they can use their own data. This serves as an important source of open data for researchers and practitioners. The sensor nodes have a multitude of sensors on them, such as humidity, temperature, vibration (relevant for our manufacturing deployments and not the agricultural deployments), nitrate, soil VWC, etc.https://purduewhin.ecn.purdue.edu/sensor_list/ In addition to this application domain, a second target audience for our research has been the distributed computing, security, and dependability research community. By publishing our advances at conferences in these domains, the team has subjected our project work to be reviewed by expert peers and is exposing more researchers to the challenges faced in applications of CPS/IoT technology. Changes/Problems: Nothing Reported What opportunities for training and professional development has the project provided?Adithya Bhat, Akhil Sai Bandarupalli, Jayoung Lee, Chen-Yi Lu, Easwar V Mangipudi, and PengCheng Wang are six Ph.D. students involved in this project at Purdue University. Ran Xu was a PhD student who was supported on the project, who graduated in December 2021 and now is employed at NVIDIA Inc. Sravya Yandamuri is a student supported by this project at Duke University. Each of these students communicates with two or more PDs through weekly video calls. Our students have attended conferences (e.g. CCS 2021, SOSP 2021) to present their papers as well as general attendees; however, due to the ongoing pandemic, they have attended the conferences virtually. PD Kate hosted an undergraduate research intern (Karol Stephany Insuasty Mejia) from Colombia (South America) for four months (August-December 2021). The student studied the implementation of homomorphic encryption techniques in hardware toward developing energy-efficient privacy-preserving solutions. This is relevant to our third thrust. Working with PD Chaterji, high-schooler Sarthak Jain and sophomore Akash Melachuri are developing a frontend rendering counterpart for the project's computer vision backend algorithms for users to enter the service level objectives, which could be farmers or AgTech clients entering the requirements to adhere to in terms of accuracy, latency, energy bounds under which our algorithms will execute, example presentation during Covid over Zoom here: https://schaterji.io/events/frontend.html John Scott, an Extension drone engineer, is a part of Prof. Chaterji's lab's (Innovatory for Cells and Neural Machines, ICAN's) efforts, along with her graduate student Chen-Yi Lu, to use her technology on farms and her students with John Scott have been deploying drone flights using her automated drone descent technology. Here, the drone optimizes the height of the flight based on the coverage and precision required for scouting the agricultural fields. This is being done on Purdue's farms at ACRE: https://ag.purdue.edu/agry/acre/Pages/default.aspx How have the results been disseminated to communities of interest?Dissemination has been through the peer-reviewed publications listed above. Also, we have engaged with Extension specialists and Lilly Endowment's Wabash Heartland Innovation Network (WHIN) to demonstrate our technology to AgTech (Bayer Crop Sciences) and to farmers in the area. PD Chaterji also writes blog posts for dissemination of her computer vision on IoT devices and drone technology to a wider audience: #1: https://schaterji.io/blog/IoT-digag.html; #2: https://schaterji.io/blog/streaming-iot.html What do you plan to do during the next reporting period to accomplish the goals?Adithya Bhat and Akhil Sai Bandarupalli are developing energy-efficient consensus protocols suitable to be deployed in agriculture sensor networks. Akhil Sai Bandarupalli is also developing approximate consensus ideas towards efficiently collecting data from a sensor network. In particular, he is defining a new metric called convergence fairness to evaluate Byzantine Agreement (BA) protocols and designs an approximate agreement protocol that achieves non-zero convergence fairness without shared randomness in an asynchronous network. Sravya Yandamuri is currently working on an information theoretic leader election protocol for an asynchronous network that has sub quadratic communication complexity and equal work. A protocol that works in the asynchronous setting enables progress at the speed of the network and maintains safety regardless of any message delays. The purpose of obtaining sub quadratic communication complexity and equal work is scalability. Gathering farm scouting data through a combination of our computer vision technology and drone surveillance using smart algorithms for low-energy, high-coverage flights. Developing semi-supervised algorithms for learning patterns from farm data, especially leveraging the volumes of unlabeled farm data, with a focus on semantic segmentation useful for monitoring crop health. Collaboration with Microsoft Azure for IoT edge and cloud computing innovation for streamlining the collection of large volumes of farm data with suitable encryption techniques. PDs hold regular weekly meetings every week to discuss research findings and the team will continue to meet going forward.

Impacts
What was accomplished under these goals? Our efforts are categorized into three parts: 1. Fault Tolerant Analytics: First, the team is developing energy-optimized Byzantine-fault tolerant (BFT) state-machine replication (SMR) protocols for CPS nodes. The SMR abstraction, which is also the basis of all blockchains and cryptocurrencies, is generic enough to allow the execution of any computation task on the collected data. Our distributed consensus protocols resist malicious actors with a well-defined upper bound on the number of adversaries of different strengths. Second, the team is exploring the use of small trusted hardware primitives to improve the fault tolerance of BFT protocols to one-half faults, without increasing communication complexity. Our results include a version of the popular HotStuff SMR protocol that retains linear communication complexity in each view and a version of the VABA protocol with quadratic communication, both leveraging trusted hardware to tolerate a minority of corruptions. As a building block, we developed a communication-efficient provable broadcast, a core broadcast primitive with increased fault tolerance. 2. Approximate Consensus over Dynamic Networks: For dynamic CPS networks such as livestock-mounted CPS nodes, our goal will be to understand the fundamental connectivity lower-bounds first and then offer necessary and sufficient conditions for coordination and desired analytics. We have developed energy-optimized protocols to achieve approximate consensus over static networks. 3. Privacy-preserving Distributed Computing: The team is also developing privacy-aware distributed computation protocols among a distributed set of CPS nodes. We have observed some key computation and communication inefficient tasks/components from the existing secure multi-party computation (MPC) framework, and working towards reducing the overheads by making MPC suitable for the CPS networks. 4. Approximate Streaming Data Analytics: A cohort of graduate students is developing techniques for data analytics on streaming data, partitioned between the sensor nodes (deployed in the field), edge nodes (more powerful than sensor nodes and deployed say in a building in the farm), and server nodes (cloud computing nodes). This has already led to a unique software package that is the first to achieve streaming data analytics on video data (object detection, action recognition) on mobile GPU nodes, NVIDIA Jetson class nodes of various kinds. Software: https://github.com/purdue-dcsl/ApproxDet

Publications

  • Type: Conference Papers and Presentations Status: Published Year Published: 2021 Citation: RandPiper - Reconfiguration-Friendly Random Beacons with Quadratic Communication: Adithya Bhat, Nibesh Shrestha, Zhongtang Luo, Aniket Kate, and Kartik Nayak. 28th ACM Conference on Computer and Communications Security (CCS), 2021.
  • Type: Conference Papers and Presentations Status: Published Year Published: 2022 Citation: hbACSS: How to Robustly Share Many Secrets: Thomas Yurek, Licheng Luo, Jaiden Fairoze, Aniket Kate and Andrew Miller. Network and Distributed System Security Symposium (NDSS), 2022.
  • Type: Journal Articles Status: Accepted Year Published: 2022 Citation: Ambrosia - Reduction in Data Transfer from Sensor to Server for Increased Lifetime of IoT Sensor Nodes: Shikhar Suryavansh, Abu Benna, Chris Guest, and Somali Chaterji. Accepted to appear at Nature Scientific Reports, 2021.
  • Type: Conference Papers and Presentations Status: Published Year Published: 2022 Citation: LiteReconfig - LiteReconfig: cost and content aware reconfiguration of video object detection systems for mobile GPUs: Ran Xu, Jayoung Lee, Pengcheng Wang, Saurabh Bagchi, Yin Li, and Somali Chaterji. ACM EuroSys, 2022.