DELIVERABLE D2.4 – Architecture and Technical Specifications

Total Page:16

File Type:pdf, Size:1020Kb

DELIVERABLE D2.4 – Architecture and Technical Specifications Project Acronym: SecureIoT Grant Agreement number: 779899 (H2020-IoT03-2017 - RIA) Project Full Title: Predictive Security for IoT Platforms and Networks of Smart Objects DELIVERABLE D2.4 – Architecture and Technical Specifications Deliverable Number D2.4 Deliverable Name Architecture and Technical Specifications Dissemination level Public Type of Document Report Contractual date of delivery 30/09/2018 Deliverable Leader AIT Status & version V1.00 WP / Task responsible WP2(FUJITSU) / Task T2.4(AIT) Keywords: Security, Architecture, Probes, Data Collection, Security Monitoring Abstract (few lines): This deliverable presents the first version of the architecture of the SecureIoT security monitoring platforms. The architecture is primarily presented in terms of a logical view, which includes its main components and the interactions between them. Other views (implementation, process, deployment) are also discussed, while early examples on how this architecture can be used for implementing the project’s use cases are given. Athens Information Technology (John Soldatos, Sofoklis Deliverable Leader: Efremidis) Daniel Calvo (ATOS), George Moldovan (SIEMENS), David Evans (IDIADA), Nikos Kefalakis (INTRA), Jérôme François (INRIA), Contributors: Abdelkader Lahmadi (INRIA), David Schubert (Its-OWL), Sofianna Menesidou (UBI), Sofoklis Kyriazakos (iSprint), Pouyan Ziafati (LuxAI) Reviewers: Giannis Ledakis (SiLO), Nechifor, Cosmin-Septimiu (SIEMENS) Approved by: George Koutalieris (INTRA) This document is part of a project that has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 779899. It is the property of the SecureIoT consortium and shall not be distributed or reproduced without the formal approval of the SecureIoT Management Committee. D2.4 – Architecture and Technical Specification of SecureIoT Services Version: v1.0 - Final, Date 30/09/2018 Executive Summary This deliverable introduces the SecureIoT architecture for the security of IoT systems. The architecture is presented as a set of modules, along with the structuring principles that drive their integration in an IoT security system that emphasizes security monitoring, security analytics and security automation. In order to define these modules and their structuring principles, SecureIoT has taken into account a number of reference architectures for IoT systems (like RAMI4.0 and the Reference Architecture of the Industrial Internet Consortium), as well as related security frameworks (such as the Industrial Internet Security Framework). The reference IoT architectures have been exploited as means of understanding the structure of the IoT systems to be monitored and protected, while the security frameworks have been used as basis for defining building blocks for security data collection and analysis, as well as security monitoring and automation. The SecureIoT architecture is a data-driven architecture, which is defined as an overlay layer that protects all assets of an IoT system. It collects security-related information for IoT devices through a number of probes, while at the same time analyzing this information in order to identify abnormal behaviors and instigate alerts or invoke security automation functions. The architecture specifies a powerful “templates” mechanisms, which allows for the characterization and identification of abnormal or suspicious behaviors, based on the execution of advanced data analytics algorithms over the security-related data that are collected from the various probes. It also provides the means for customizing and contextualizing the various templates according to the status of the IoT system that is being protected. Furthermore, the SecureIoT architecture introduces an IoT security knowledge base component, which can be used to match identified abnormal or suspicious behaviors with known vulnerabilities or attacks. The architecture provides also the means for collecting and analyzing information from different IoT devices and platforms based on appropriate probes and a common modelling of the security- related information regardless of the platform for which it is collected. As such it can also support monitoring and protection of IoT systems and applications that span multiple platforms, as part of security interoperability scenarios. This is in-line with one of the main objectives of the project, which is to support security for applications that span multiple, diverse IoT platforms. As part of the deliverable, the various components of the SecureIoT architecture are described along with the interactions and information flows between them. To this end, the architecture is introduced in terms not only of its logical viewpoint, but also in terms of its process viewpoint as well. Furthermore, development and physical deployment aspects are briefly discussed as well, as part of 4+1 views approach to introducing the SecureIoT architecture. Based on the SecureIoT architecture, the project will create an IoT security platform which will be used to support the project’s services and use cases. This platform will expose a set of APIs to developers and deployers of IoT security services. These APIs are briefly outlined in the Page |2 Project Title: SecureIoT Contract No. 779899 Project Coordinator: INTRASOFT International S.A. D2.4 – Architecture and Technical Specification of SecureIoT Services Version: v1.0 - Final, Date 30/09/2018 deliverable, along with the structure of the SECaaS (Security as a Service) services that will make use of them, notably risk assessment, compliance auditing and developers support services. It is also discussed how the SecureIoT architecture can be used to produce alerts and notifications as part of a security monitoring system. Moreover, the present deliverable provides some early insights on the technologies and frameworks that will exploiting towards implementing the SecureIoT platform in-line with the introduced architecture. As part of the deliverable we also illustrate the high-level structure of the security systems that will support the project’s use cases. The design of these systems will be detailed and elaborated as part of WP6 of the project. Nevertheless, this early mapping has been performed a vehicle for confronting the use cases requirements against the capabilities and functionalities that are offered by the SecureIoT architecture. Moreover, it boosts adherence to the 4+1 methodology that has been selected as a vehicle for presenting the SecureIoT architecture. Overall, the present deliverable provides insights on the structure and main components of SecureIoT compliant security systems. It can therefore serve as a blueprint for the integration of IoT security services and use cases in the scope of WP5 and WP6 respectively. However, the security components of the architecture will be specified in detailed and accordingly implemented as part of WP3 (dealing with the data collection components) and WP4 (dealing with the security analytics components). Note also that the present deliverable provides the first version of the architecture. A second and final version will be also delivered in M18 of the project as part of deliverable D2.5. The final version of the architecture will enhance and fine-tune the one introduced in this deliverable in order to meet new and updated requirements. It will also incorporate feedback from the actual deployment and use of the architecture in WP5 and WP6 of the project. Page |3 Project Title: SecureIoT Contract No. 779899 Project Coordinator: INTRASOFT International S.A. D2.4 – Architecture and Technical Specification of SecureIoT Services Version: v1.0 - Final, Date 30/09/2018 Document History Version Date Contributor(s) Description V0.11 16/05/2018 Sofoklis Efremidis (AIT) Initial Structure Revisions following discussions during V0.14 11/06/2018 John Soldatos (AIT) the Bilbao Meeting Information about the scope and V0.15 29/06/2018 John Soldatos (AIT) methodology V0.16 03/07/2018 Sofianna Menesidou (UBI) Inputs in Section 2 John Soldatos (AIT), Sofoklis Updated Structure based on V0.20 04/07/2018 Efremidis (AIT) comments on released version First Draft of Section 3 (Logical View V0.21 19/07/2018 John Soldatos (AIT) of the SecureIoT architecture) Analysis of IoT RAs: IoT-A, ISO/IEC V0.23 17/08/2018 Daniel Calvo (ATOS) 30141 and IDS. Analysis of FIWARE IoT platform V0.24 20/08/2018 John Soldatos (AIT) Updates to Section 3 Inputs to Section 5 on implementation V0.25 21/08/2018 John Soldatos (AIT) technologies for probes and data routing V0.26 29/08/2018 Sofianna Menesidou (UBI) Inputs in Sub-Section 4.2 V0.27 05/09/2018 David Evans (IDIADA) Connected Cars Use Cases, Section 6 V0.28 05/09/2018 John Soldatos (AIT) Inputs on RAMI V4.0 John Soldatos, Sofoklis Efremidis V0.30 06/09/2018 Enhancements to Section 2 (AIT) V0.32 10/09/2018 Daniel Calvo (ATPS) Connected Cars Use Cases, Section 6 Jérôme François (Inria), Security Knowledge Base Inputs in V0.33 13/09/2018 Abdelkader Lahmadi (Inria) Sections 4 & 5 V0.34 13/09/2018 David Schubert (Its-OWL) Inputs to Section 6.1 Addition of Information in Section 2 V0.35 14/09/2018 John Soldatos (AIT) and editing Nechifor, Cosmin-Septimiu V0.36 15/09/2018 Inputs to Section 2 (SIEMENS) Description of LuxAI Use Case V0.37 17/09/2018 Pouyan Ziafati (LuxAI) Architecture in Section 6 Page |4 Project Title: SecureIoT Contract No. 779899 Project Coordinator: INTRASOFT International S.A. D2.4 – Architecture and Technical Specification of SecureIoT Services Version: v1.0 - Final,
Recommended publications
  • Openfog Reference Architecture for Fog Computing
    OpenFog Reference Architecture for Fog Computing Produced by the OpenFog Consortium Architecture Working Group www.OpenFogConsortium.org February 2017 1 OPFRA001.020817 © OpenFog Consortium. All rights reserved. Use of this Document Copyright © 2017 OpenFog Consortium. All rights reserved. Published in the USA. Published February 2017. This is an OpenFog Consortium document and is to be used in accordance with the terms and conditions set forth below. The information contained in this document is subject to change without notice. The information in this publication was developed under the OpenFog Consortium Intellectual Property Rights policy and is provided as is. OpenFog Consortium makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of fitness for a particular purpose. This document contains content that is protected by copyright. Copying or distributing the content from this document without permission is prohibited. OpenFog Consortium and the OpenFog Consortium logo are registered trademarks of OpenFog Consortium in the United States and other countries. All other trademarks used herein are the property of their respective owners. Acknowledgements The OpenFog Reference Architecture is the product of the OpenFog Architecture Workgroup, co-chaired by Charles Byers (Cisco) and Robert Swanson (Intel). It represents the collaborative work of the global membership of the OpenFog Consortium. We wish to thank these organizations for contributing
    [Show full text]
  • Intelligent Edge Categories
    2 TABLE OF CONTENTS © Copyright 2019 Daniel Sexton TABLE OF CONTENTS A TABLE OF CONTENTS Audience ...................................................................................................................................................... 1 Author’s Note ................................................................................................................................................ 2 Executive Summary ....................................................................................................................................... 5 Building An Intelligent Edge Strategy ............................................................................................................. 7 Edge Project Types .................................................................................................................................... 7 The Early Adopter’s Problem ....................................................................................................................... 9 Considering Life Cycles ........................................................................................................................... 9 The Strategy Box ..................................................................................................................................... 11 Intro to The Intelligent Edge........................................................................................................................ 13 What is The Edge? ..................................................................................................................................
    [Show full text]
  • The Second ACM/IEEE Symposium on Edge Computing October 12-14, 2017, San Jose, CA, USA
    SEC 2017 The Second ACM/IEEE Symposium on Edge Computing October 12-14, 2017, San Jose, CA, USA http://acm-ieee-sec.org/2017/ “Edge computing” is new paradigm in which the resources of a small data center are placed at the edge of the Internet, in close proximity to mobile devices, sensors, end users, and the emerging Internet of Things. Terms such as “cloudlets,” “micro data centers,” and “fog” have been used in the literature to refer to these small, edge- located data centers. They all represent counterpoints to the theme of consolidation and massive data centers that has dominated discourse in cloud computing. New challenges and opportunities arise as the consolidation of cloud computing meets the dispersion of edge computing. Building upon the success of inaugural SEC, the organizing committee is delighted to invite you to Symposium on Edge Computing 2017, to be held in San Jose, California. General Chair Steering Committee Junshan Zhang, Arizona State University Victor Bahl, Microsoft Research Program Chairs Flavio Bonomi, IoXWorks Mung Chiang, Princeton University Rong Chang, IBM Research Bruce Maggs, Akamai/Duke University Dejan Milojicic, HP Labs Program Committee Michael Rabinovich, Case Western Reserve Eric Anderson, NIST University Rajesh Balan, Singapore Management University Weisong Shi, Wayne State University (chair) Bharath Balasubramanian, AT&T Labs Research Tao Zhang, Cisco Suman Banerjee, University of Wisconsin-Madison Local Arrangement Chair Songqing Chen, George Mason University Jerry Gao, San Jose State University Mung Chiang, Princeton University Romit Roy Choudhury, University of Illinois at Urbana- Finance and Registration Chair Champaign Qun Li, College of William & Mary Landon Cox, Duke University Sponsorship Chair Eduardo Cuervo, Microsoft Research Rong Chang, IBM Fred Douglis, Dell EMC Publicity Chairs Schahram Dustdar, TU Wien Schahram Dustdar, TU Wien, Austria Robert J.
    [Show full text]
  • Broader Impacts
    Maria Gorlatova, Princeton University: Broader Impacts BROADER IMPACTS Maria Gorlatova [email protected] Associate Research Scholar Princeton University My contributions and plans related to broader impacts fall under the categories of involvement in initiatives related to diversity and inclusion, ongoing and planned industry engagements, and plans to transform organizational practices with the developments in the Internet of Things. Diversity and Inclusion Initiatives I actively promote diversity and inclusion in my research group and within the broader scientific and technical communities, contributing to and leading multiple related initiatives. Aspects of my contributions to diversity have been recognized with a Google Anita Borg USA Fellowship, which is awarded yearly to only 25 students across all levels of studies and across all computing-related disciplines nation-wide, based on academic performance, leadership, and impact on the community of women in technology. I am contributing to and leading initiatives that create strong wide-reaching support networks between the members of under-represented groups. For instance, I was an invited participant in the MIT Rising Stars in EECS event that created a network of top graduate and post-doctoral women in Electrical Engineering and Computer Science. I also participated in the Google Graduate Researchers of Diverse Backgrounds CS Forum, which brought together graduate students of diverse backgrounds from different parts of United States and Canada. I am also currently serving on the board of the field-specific Networking Networking Women (N2 Women) organization that develops and strengthens the community of female researchers in communications and computer networking. Near-term I will lead the development of networks between the members of under-represented groups who work in my core research areas, Internet of Things and fog and edge computing.
    [Show full text]
  • Demystifying Internet of Things Security Successful Iot Device/Edge and Platform Security Deployment — Sunil Cheruvu Anil Kumar Ned Smith David M
    Demystifying Internet of Things Security Successful IoT Device/Edge and Platform Security Deployment — Sunil Cheruvu Anil Kumar Ned Smith David M. Wheeler Demystifying Internet of Things Security Successful IoT Device/Edge and Platform Security Deployment Sunil Cheruvu Anil Kumar Ned Smith David M. Wheeler Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform Security Deployment Sunil Cheruvu Anil Kumar Chandler, AZ, USA Chandler, AZ, USA Ned Smith David M. Wheeler Beaverton, OR, USA Gilbert, AZ, USA ISBN-13 (pbk): 978-1-4842-2895-1 ISBN-13 (electronic): 978-1-4842-2896-8 https://doi.org/10.1007/978-1-4842-2896-8 Copyright © 2020 by The Editor(s) (if applicable) and The Author(s) This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Open Access This book is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made. The images or other third party material in this book are included in the book’s Creative Commons license, unless indicated otherwise in a credit line to the material.
    [Show full text]
  • Fog Computing the Scenario
    Università degli Studi di Roma “Tor Vergata” Dipartimento di Ingegneria Civile e Ingegneria Informatica Fog Computing Corso di Sistemi e Architetture per Big Data A.A. 2016/17 Valeria Cardellini The scenario • Connected devices are creating data at an exponentially growing rate, which will drive performance and network congestion challenges at the edge of infrastructure • Performance, security, bandwidth, reliability, and many other concerns that make cloud- only solutions impractical for many use cases Valeria Cardellini - SABD 2016/17 1 A possible solution • Move information processing and intelligence at the logical edge of the networks (“the cloud close to the ground”): many micro data centers located at the network edge Valeria Cardellini - SABD 2016/17 2 Fog Computing definitions • “Fog Computing is a highly virtualized platform that provides compute, storage, and networking services between end devices and traditional Cloud Computing Data Centers, typically, but not exclusively located at the edge of network.” (Bonomi et al., 2012) • “A horizontal, system-level architecture that distributes computing, storage, control and networking functions closer to the users along a cloud-to-thing continuum.” (OpenFog consortium, 2017) Valeria Cardellini - SABD 2016/17 3 What Fog is • An extension of the traditional cloud-based computing model where implementations of the architecture can reside in multiple layers of a networks’ topology • Preserves all the benefits of Cloud computing – Including containerization, virtualization, orchestration,
    [Show full text]
  • Edge and Fog Computing - Convergence of Solutions?
    Edge and fog computing - convergence of solutions? Eugen Borcoci University POLITEHNICA Bucharest (UPB) [email protected] ComputationWorld 2018 Conference February 18, 2018, Barcelona Edge and fog computing - convergence of solutions? Acknowledgement 1.This overview is compiled and structured, based on several public documents belonging to different authors and groups, on Cloud/Fog, IoT, Multi-access Mobile Edge Computing, SDN, NFV, 4G/5G networking, etc.: conferences material, studies, research papers, standards, projects, overviews, tutorials, etc. (see specific references in the text and Reference list). 2. Given the extension of the topics, this presentation is a high level overview only. ComputationWorld 2018 Conference February 18, 2018, Barcelona Slide 2 Edge and fog computing - convergence of solutions? Motivation of this talk Facts: Novel services, applications and communication paradigms based on Internet technologies Internet of Things (IoT)- including industry and agriculture, Smart cities, M2M, Vehicular communications, Content/media oriented communications, Social networks, Big data applications, etc. • “Internet of Everything” (IoE) Supporting technologies ( used in cooperative mode) Cloud Computing (CC) Edge oriented computing • Multi-access/Mobile Edge Computing (MEC) • Fog Computing (FC/EC) • Cloudlets, .. Auxiliary technologies Virtualization techniques Software Defined Networks (SDN) Network Function Virtualization (NFV) ComputationWorld 2018 Conference February 18, 2018, Barcelona Slide 3 Edge and
    [Show full text]
  • The Standard Issue 1, 2018 (PDF)
    THE STANDARD News From ETSI . Issue 1, 2018 ETSI creates City Digital Profile group on Smart Cities Cities to procure interoperable smart solutions for their citizens ETSI has created a new Industry cities and on a large scale. Smart objectives and reducing the overall cost Specification Group “City Digital Profile” services are intended to improve the of deployment. (ISG CDP). It will help accelerate the overall quality of living in the city delivery of integrated citizen services and make them attractive to citizens, Continued on page 2 > and provide a technology road map investors, business, innovators, visitors for city leaders who will benefit from and tourists. standardized solutions from their Releasing suppliers. The City Digital Profile ISG will enable cities to procure smart solutions the Flow In providing this technology framework with confidence that those solutions and clear roadmap for technology will be extendable, configurable and investment and deployment, interoperable with similar services market confidence levels in the city from other cities and providers. infrastructure investments should City administrators will therefore increase and in addition this will give deliver advanced services to their cities the possibility to replicate those citizens, whilst respecting essential solutions across domains, between environmental factors, sustainability First 5G New Radio Specifications approved Data protection and 3GPP has approved the first 5G he presented details of the group’s privacy in a data- specifications: the non-standalone approval of the Non-standalone 5G driven economy 5G New Radio specifications were NR specifications and also outlined approved on 20 December 2017. how RAN will now turn towards the Come to our ETSI Balazs Bertenyi, RAN Chair called completion of the first phase of 5G it “an impressive achievement in a radio, Release 15, by June 2018.
    [Show full text]
  • Edge Computing in Asia- Pacific, 2018 Rising Demand for Iot Deployments Driving the Adoption of Edge Computing Solutions
    Frost Perspective on Edge Computing in Asia- Pacific, 2018 Rising demand for IoT deployments driving the adoption of edge computing solutions Global Digital Transformation Team at Frost & Sullivan November 2018 Table of Contents Overview 3 Adoption Analysis 8 Ecosystem Analysis 21 Last Word 40 Source: Frost & Sullivan 9AC2-72 2 2 Overview Defining Edge Computing The term edge computing refers to computing that pushes intelligence, data processing, analytics, and communication capabilities down to where the data originate, that is, at network gateways or directly at the endpoints. The aim is to reduce latency, ensure highly efficient networks operation as well as service delivery and offer an improved user experience. By extending computing closer to the data source, edge computing enables latency sensitive computing, offers greater business agility through better control and faster insights, lowers operating expenses, and results in more efficient network bandwidth support. Key Characteristics . On premises . Proximity . Real time . Wide geo-distribution Core Networks Endpoint Distributed Network Devices Gateways Centralized (Data Cloud Sources) Source: Frost & Sullivan 9AC2-72 4 Comparison – Edge versus Cloud Edge Computing Cloud Computing Target User Internet of Things (IoT) devices and enterprise users Enterprise application users Distinguishing characteristics are its proximity to end Distinguishing characteristics are virtualization, Data users and dense geographical distributions. It is based accessibility, flexibility and scalability. All of your Characteristic on the principle of isolation of user data that live on the data is not “physically” close to you. All data is edge. centralized within one or more data centers. Services are hosted in virtual servers, over the Services are hosted at the network edge or end internet and not your hard drive.
    [Show full text]
  • Knowledge Integration in Smart Factories
    Entry Knowledge Integration in Smart Factories Johannes Zenkert * , Christian Weber , Mareike Dornhöfer , Hasan Abu-Rasheed and Madjid Fathi Department of Electrical Engineering and Computer Science, Institute of Knowledge Based Systems and Knowledge Management, University of Siegen, 57076 Siegen, Germany; [email protected] (C.W.); [email protected] (M.D.); [email protected] (H.A.-R.); [email protected] (M.F.) * Correspondence: [email protected] Definition: Knowledge integration is well explained by the human–organization–technology (HOT) approach known from knowledge management. This approach contains the horizontal and vertical in- teraction and communication between employees, human-to-machine, but also machine-to-machine. Different organizational structures and processes are supported with the help of appropriate tech- nologies and suitable data processing and integration techniques. In a Smart Factory, manufacturing systems act largely autonomously on the basis of continuously collected data. The technical design concerns the networking of machines, their connectivity and the interaction between human and machine as well as machine-to-machine. Within a Smart Factory, machines can be considered as intelligent manufacturing systems. Such manufacturing systems can autonomously adapt to events through the ability to intelligently analyze data and act as adaptive manufacturing systems that consider changes in production, the supply chain and customer requirements. Inter-connected physical devices, sensors, actuators, and controllers form the building block of the Smart Factory, which is called the Internet of Things (IoT). IoT uses different data processing solutions, such as Citation: Zenkert, J.; Weber, C.; cloud computing, fog computing, or edge computing, to fuse and process data.
    [Show full text]
  • D2.3 Tracking Scientific, Technology and Business Trends (Version 3)
    Towards an Open, Secure, Decentralized and Coordinated Fog-to-Cloud Management Ecosystem D2.3 Tracking Scientific, Technology and Business Trends (Version 3) Project Number 730929 Start Date 01/01/2017 Duration 36 months Topic ICT-06-2016 - Cloud Computing Work Package WP2, Technology survey, business models and architectural definition Due Date: M33 Submission Date: 30.09.2019 Version: 2.0 Status Final Author(s): Michael J. McGrath, John Kennedy (INTEL), Jens Jensen, Shirley Crompton (STFC), Anna Queralt, Daniele Lezzi (BSC), Jasenka Dizdarevic (TUBS), Sašo Stanovnik, Aleš Černivec, Manca Bizjak, Jolanda Modic (XLAB), Roi Sucasas Font, Lara Lopez Muniz (ATOS), Glauco Mancini, Antonio Salis (Engineering), Eva Marin Tordera, Xavier Masip (UPC), Denis Guilhot (WSL), Cristóvão Cordeiro (SIXSQ) Reviewer(s) Ana Juan Ferrer (ATOS) Xavi Masip (UPC) Keywords Fog, Cloud, Edge mF2C - Towards an Open, Secure, Decentralized and Coordinated Fog-to-Cloud Management Ecosystem Project co-funded by the European Commission within the H2020 Programme Dissemination Level PU Public X PP Restricted to other programme participants (including the Commission) RE Restricted to a group specified by the consortium (including the Commission) CO Confidential, only for members of the consortium (including the Commission) This document is issues within the frame and for the purpose of the mF2C project. This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 730929. The opinions expressed and arguments employed herein do not necessarily reflect the official views of the European Commission. This document and its content are property of the mF2C Consortium. All rights relevant to this document are determined by the applicable laws.
    [Show full text]
  • MARIA GORLATOVA [email protected] Maria.Gorlatova.Com/Bio
    MARIA GORLATOVA [email protected] maria.gorlatova.com/bio EDUCATION COLUMBIA UNIVERSITY, New York, NY Ph.D., Electrical Engineering 2008 – 2013 M.Phil., Electrical Engineering 2011 Ph.D. Thesis: Energy Harvesting Networked Nodes: Measurements, Algorithms, and Prototyping Advised by Prof. Gil Zussman GPA: 4.18/4.0 UNIVERSITY OF OTTAWA, Ottawa, ON, Canada M.Sc., Electrical Engineering; Concentration: Computer Networks and System Security 2005 – 2007 M.Sc. Thesis: Wormhole Attack Detection in Wireless Ad Hoc Networks Advised by Prof. Peter Mason and Prof. Ramiro Liscano GPA: 98/100 B.Sc., Electrical Engineering, Concentration: Systems Engineering 2000 – 2004 Summa Cum Laude; GPA: 92/100; Major GPA: 98/100 SELECTED AWARDS AND HONORS IEEE Communications Society Young Author Best Paper Award 2016 Columbia University Jury Award for Outstanding Achievement in Communications 2013 MIT EECS Rising Star 2013 Google Inc. Anita Borg USA Fellowship 2012 ACM SenSys Best Student Demonstration Award 2011 IEEE Communications Society Award for Advances in Communications 2011 ACM MobiSys Ph.D. Forum Best Speaker Award 2011 Finalist, Microsoft Research Ph.D. Fellowship 2011 Columbia University Presidential Fellowship 2008 – 2013 Alexander Graham Bell Canada Graduate NSERC CGS-D Scholarship, Ph.D. studies 2008 – 2010 Canada Graduate NSERC CGS-M Scholarship, M.Sc. studies 2005 – 2007 Ontario Graduate Fellowship (declined) 2005 – 2007 Xerox Canada Inc. Fellowship 2004 SELECTED EXPERIENCE DUKE UNIVERSITY, Durham, NC 2018 – present Assistant Professor, Electrical and Computer Engineering and Computer Science Departments Leading the Intelligent Interactive Internet of Things (I3T) Lab at Duke University Department of Electrical and Computer Engineering. PRINCETON UNIVERSITY, Princeton, NJ 2016 – 2018 Associate Director, Princeton EDGE Lab (2017 – 2018) Associate Research Scholar, Electrical Engineering Department Senior member of the EDGE lab led by Prof.
    [Show full text]