skip to Main Content

Dr. Kevin Kornegay, Dr. Wondimu Zegeye and others received the Distinguished Paper Award at the Network and Distributed System Security (NDSS) Symposium during the 2024 Workshop on Security and Privacy in Standardized IoT (SDIoTSec). This award was presented in recognition of an outstanding contribution in the research field of Internet of Things and its standardization. Title: Designing and Evaluating a Testbed for the Matter Protocol: Insights into User Experience Authors: Ravindra Mangar (Dartmouth College) Jingyu Qian (University of Illinois), Wondimu Zegeye (Morgan State University), Abdulrahman AlRabah, Ben Civjan, Shalni Sundram, Sam Yuan, Carl A. Gunter (University of Illinois), Mounib Khanafer (American University of Kuwait), Kevin Kornegay (Morgan State University), Timothy J. Pierson, David Kotz (Dartmouth College) Presented: February 26 - March 1, 2024 in San Diego, California

In the rapidly evolving landscape of the Internet of Things (IoT) and edge computing, the demand for skilled professionals who can navigate the complexities of developing secure, efficient systems is at an all-time high. As businesses and industries increasingly rely on IoT devices and edge computing solutions to drive operations, the need for robust security measures and innovative computing strategies becomes paramount. This blog post aims to guide aspiring and current IoT professionals on developing the essential skills for secure edge computing, highlighting key resources and training opportunities. Understanding the Skills Gap The intersection of IoT and secure edge computing presents unique challenges and opportunities. Professionals in this field must not only understand the technical aspects of hardware and software but also grasp the nuances of network security, data analysis, and system design. This multidisciplinary requirement creates a skills gap that organizations are eager to fill with well-trained, knowledgeable individuals. Essential Skills for Secure Edge Computing Before diving into the resources and training programs available, let's outline the core skills needed for a career in secure edge computing within the IoT landscape: Technical Proficiency Understanding of IoT Devices: Knowledge of the various types of IoT devices, their functions, and limitations. Networking and Connectivity: Familiarity with networking protocols, wireless communication, and data transmission methods. Programming and Development: Proficiency in programming languages commonly used in IoT and edge computing, such as Python, Java, and C++. Data Management and Analysis: Skills in handling and analyzing data collected by IoT devices, including the use of big data tools and machine learning algorithms. Security Expertise Cybersecurity Principles: A strong foundation in cybersecurity practices, including encryption, authentication, and secure software development. Risk Management: Ability to identify, assess, and mitigate risks associated with IoT devices and edge computing networks. Compliance and Privacy: Understanding of regulatory requirements and privacy concerns related to IoT data and operations. Resources and Training for IoT Professionals To bridge the skills gap and prepare for a career in secure edge computing, consider leveraging the following resources and training programs: Online Courses and Certifications Coursera and edX offer cybersecurity workforce certification training, courses in IoT, and data science from reputable universities and institutions. Look for programs that specifically address secure edge computing. Udemy and Pluralsight provide targeted courses on IoT development, network security, and programming languages, catering to varying skill levels. CompTIA Security+ and Cisco’s CCNA certifications can bolster your understanding of network security and are highly regarded in the industry. Workshops and Bootcamps Attend workshops and bootcamps focused on IoT security and edge computing. These intensive training sessions offer hands-on experience and direct interaction with experts in the field. Industry conferences and seminars often include workshops and sessions dedicated to the latest trends and technologies in secure edge computing and IoT. Academic Programs Consider pursuing a degree or taking individual courses in computer science, information technology, cybersecurity, or a related field with a focus on IoT and edge computing. Some universities offer specialized programs or electives in IoT systems design and security, providing a comprehensive academic foundation. Professional Networks and Communities Join professional networks and online communities related to IoT and secure edge computing. Platforms like LinkedIn, Reddit, and specialized forums can provide valuable insights, advice, and networking opportunities. Participate in hackathons and competitions focused on IoT and edge computing solutions. These events can offer practical experience and exposure to real-world challenges. Industry Publications and Resources Stay informed about the latest trends, challenges, and advancements in IoT and secure edge computing by following industry publications, blogs, and research papers. Organizations like the IEEE and the IoT Security Foundation offer resources, white papers, and guidelines that can deepen your understanding of the field. Developing skills in secure edge computing for IoT requires a multifaceted approach, combining technical knowledge, security expertise, and continuous learning. By leveraging online courses, workshops, academic programs, professional networks, and industry resources, aspiring and current IoT professionals can equip themselves with the tools needed to succeed in this dynamic field. As the demand for secure, efficient IoT solutions grows, so does the opportunity for skilled professionals to make a significant impact on the future of technology.  

In the rapidly evolving digital landscape, the integration of Internet of Things (IoT) devices with secure edge computing is revolutionizing industries by offering smarter, faster, and more efficient solutions. Particularly in sectors like healthcare and manufacturing, where data sensitivity and real-time processing are paramount, the impact of secure edge computing is transformative. This blog delves into how secure edge computing is reshaping IoT applications in these fields and explores its potential in other areas. The Foundation of Secure Edge Computing in IoT Secure edge computing refers to processing data near the source of data generation rather than relying on a centralized data-processing warehouse. This proximity to data sources allows for real-time data processing without latency, enhances security by reducing data transmission, and alleviates bandwidth demand on networks. In the context of IoT, secure edge computing enables devices to perform complex tasks and make decisions independently, making IoT networks more efficient and scalable. Transforming Healthcare with IoT and Secure Edge Computing In healthcare, the stakes for privacy, data security, and real-time processing are incredibly high. IoT devices, such as wearable health monitors and connected medical equipment, generate vast amounts of data that require immediate analysis for patient care decisions. Secure edge computing processes this data on-site, or near the patient, ensuring swift, accurate health monitoring and diagnostics without the latency and security risks associated with transmitting data to a distant cloud or data center. Secure edge computing also enables remote patient monitoring, allowing healthcare providers to deliver personalized care to patients in their homes. By processing data at the edge, sensitive patient information is better protected, and caregivers can make immediate, informed decisions based on real-time data analysis. Revolutionizing Manufacturing with IoT and Secure Edge Computing The manufacturing sector benefits significantly from IoT and secure edge computing through the concept of the smart factory. In these environments, IoT sensors and devices monitor and control manufacturing processes, manage supply chains, and predict maintenance needs. By deploying secure edge computing, manufacturers process this data on the factory floor, leading to improved operational efficiency, reduced downtime, and enhanced hardware cybersecurity. Secure edge computing in manufacturing also supports the implementation of digital twins, virtual replicas of physical processes, and products that can predict outcomes based on real-time data. This capability allows for unprecedented levels of product customization, quality control, and supply chain management, all while safeguarding sensitive data. Beyond Healthcare and Manufacturing: The Future of Secure Edge Computing in IoT The potential applications of secure edge computing in IoT extend far beyond healthcare and manufacturing. In smart cities, for example, secure edge computing can manage traffic flow, optimize energy use, and enhance public safety through immediate data analysis and response. In agriculture, it can process data from soil sensors and drones to make instant decisions about irrigation and crop health, optimizing yield and resource use. Challenges and Considerations Despite its benefits, the deployment of secure edge computing in IoT comes with challenges. Ensuring the physical security of edge devices, managing the complexity of edge networks, and maintaining data privacy and compliance are critical considerations. Furthermore, developing standardized protocols for interoperability among diverse devices and platforms is essential for maximizing the potential of IoT and secure edge computing. Secure edge computing is set to redefine the landscape of IoT by enabling smarter, faster, and more secure operations across various industries. In healthcare and manufacturing, where it's already making significant strides, it promises to improve outcomes, enhance efficiency, and protect sensitive data. As technology advances and standards evolve, the adoption of secure edge computing in IoT will continue to expand, unlocking new possibilities and transforming our approach to data processing and analysis in an increasingly connected world.

With two centers focused on AI technology and cybersecurity, Morgan State University (MSU) is poised to level the playing field for students and users of the technology... ...With the advent of the Internet of Things, hacking one device can compromise everything connected to it. “Think about how many of these connected devices you encounter throughout the day,” says CAP Center Director Kevin Kornegay. “Since everything’s connected to everything, you’re not safe anymore.” But the CAP Center, which was established in 2018, is looking to change that. Increasingly, devices themselves are analyzing and computing data at “the edge” instead of sending big datasets back to central processing centers. That provides a huge time savings, allowing cars, thermostats, and similar products to respond in real time. But this can be risky, since distributing data across more devices means more possible targets for hackers, and some devices aren’t secure out-of-the-box. READ MORE

The U.S. Department of Defense has announced that it has awarded approximately $27 million for a USC-led Microelectronics Commons project. The university will lead a coalition of research and industry organizations with the power to accelerate the development and manufacturing of microelectronics in the United States. The coalition is led by researchers at ISI and the USC Viterbi Ming Hsieh Department of Electronic and Computer Engineering. The partner institutions within higher education ​are Caltech; Morgan State University in Baltimore; North Carolina A&T State University; Pasadena City College; University of California, Irvine; UCLA; University of California, Riverside; University of California, San Diego; and University of California, Santa Barbara.  READ MORE

Purdue hosted the "Creating a Collaborative Approach to CHIPS Act Objectives and Innovation” event on November 3, 2023 where thought leaders from academia, industry, and government gathered to explore enhancing U.S. competitiveness in the semiconductor sector through a broad and coordinated national capabilities network. A major goal of the workshop was to assess the current state of the art and requirements for a national infrastructure with cross-cutting capabilities to help realize the transformative objectives of the CHIPS Act. The CAP Center's very own Dr. Kevin Kornegay was an invited panelist for the "Developing a Domestic Workforce to Fuel Semiconductor Industry Resurgence" session. READ MORE HERE

The CAP Center has partnered with SCALE (Scalable Asymmetric Lifecycle Engagement ) led by Purdue University, funded by the Department of Defense, and managed by NSWC Crane. SCALE is the preeminent U.S. program for semiconductor workforce development in the defense sector. SCALE facilitates a different approach to training highly skilled U.S. microelectronics engineers, hardware designers, and manufacturing experts, ensuring U.S. leadership in this important area. The CAP Center will focus on technology areas including system-on-chip and embedded systems / Artificial Intelligence. READ MORE

NSA and Minority Serving Institutions_ Improving Vehicle Cybersecurity with Morgan State University    

  From left to right: Dr. Edmund Smith (Sandia National Labs), Dr. Marcial Tientu (CAP Center), Dr. Paige Harvey (NSA), and Dr. Sean Richardson (Verizon).

Dr. Onyema Osuagwu, Associate Professor, on earning tenure in the ECE Department.  

The SFFP offers fellowships to university faculty to conduct research at one of the Air Force research facilities in the summer. The objectives of the Summer Faculty Fellowship Program are to: 1.  stimulate professional relationships among SFFP fellows and the scientists and engineers in AFRL Technical Directorates and other Air Force research facilities; 2.  elevate the awareness in the U.S. academic community of Air Force research needs and foster continued research at SFFP fellows' institutions; and 3.  provide the faculty opportunities to perform high-quality research at AFRL Technical Directorates and other Air Force research facilities. SFFP fellows conduct research in collaboration with Air Force researchers for a continuous summer period of eight to twelve weeks at the Technical Directorates of the Air Force Research Laboratory, the US Air Force Academy, or the Air Force Institute of Technology. A final report is required at the completion of the summer appointment.

Abstract: Project Connected Home over IP, known as Matter, a unifying standard for the smart home, will begin formal device certification in late 2022. The standard will prioritize connectivity using short-range wireless communication protocols such as Wi-Fi, Thread, and Ethernet. The standard will also include emerging technologies such as Blockchain for device certification and security. In this paper, we rely on the Matter protocol to solve the long-standing heterogeneity problem in smart homes. This work presents a hardware Testbed built using development kits, as there is currently very few devices supporting Matter protocol. In addition, it presents a network architecture that automates smart homes to cloud services. The work is a simple and cheap way of developing a Testbed for automating smart homes that uses Matter protocol. The architecture lays the foundation for exploring security and privacy issues, data collection analysis, and data provenance in a smart home ecosystem built on Matter protocol. W. Zegeye, A. Jemal and K. Kornegay, "Connected Smart Home over Matter Protocol," 2023 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, 2023, pp. 1-7, doi: 10.1109/ICCE56470.2023.10043520. Connected_Smart_Home_over_Matter_Protocol

Dr. Kevin Kornegay, Dr. Wondimu Zegeye and others received the Distinguished Paper Award at the Network and Distributed System Security (NDSS) Symposium during the 2024 Workshop on Security and Privacy in Standardized IoT (SDIoTSec). This award was presented in recognition of an outstanding contribution in the research field of Internet of Things and its standardization. Title: Designing and Evaluating a Testbed for the Matter Protocol: Insights into User Experience Authors: Ravindra Mangar (Dartmouth College) Jingyu Qian (University of Illinois), Wondimu Zegeye (Morgan State University), Abdulrahman AlRabah, Ben Civjan, Shalni Sundram, Sam Yuan, Carl A. Gunter (University of Illinois), Mounib Khanafer (American University of Kuwait), Kevin Kornegay (Morgan State University), Timothy J. Pierson, David Kotz (Dartmouth College) Presented: February 26 - March 1, 2024 in San Diego, California

In the rapidly evolving landscape of the Internet of Things (IoT) and edge computing, the demand for skilled professionals who can navigate the complexities of developing secure, efficient systems is at an all-time high. As businesses and industries increasingly rely on IoT devices and edge computing solutions to drive operations, the need for robust security measures and innovative computing strategies becomes paramount. This blog post aims to guide aspiring and current IoT professionals on developing the essential skills for secure edge computing, highlighting key resources and training opportunities. Understanding the Skills Gap The intersection of IoT and secure edge computing presents unique challenges and opportunities. Professionals in this field must not only understand the technical aspects of hardware and software but also grasp the nuances of network security, data analysis, and system design. This multidisciplinary requirement creates a skills gap that organizations are eager to fill with well-trained, knowledgeable individuals. Essential Skills for Secure Edge Computing Before diving into the resources and training programs available, let's outline the core skills needed for a career in secure edge computing within the IoT landscape: Technical Proficiency Understanding of IoT Devices: Knowledge of the various types of IoT devices, their functions, and limitations. Networking and Connectivity: Familiarity with networking protocols, wireless communication, and data transmission methods. Programming and Development: Proficiency in programming languages commonly used in IoT and edge computing, such as Python, Java, and C++. Data Management and Analysis: Skills in handling and analyzing data collected by IoT devices, including the use of big data tools and machine learning algorithms. Security Expertise Cybersecurity Principles: A strong foundation in cybersecurity practices, including encryption, authentication, and secure software development. Risk Management: Ability to identify, assess, and mitigate risks associated with IoT devices and edge computing networks. Compliance and Privacy: Understanding of regulatory requirements and privacy concerns related to IoT data and operations. Resources and Training for IoT Professionals To bridge the skills gap and prepare for a career in secure edge computing, consider leveraging the following resources and training programs: Online Courses and Certifications Coursera and edX offer cybersecurity workforce certification training, courses in IoT, and data science from reputable universities and institutions. Look for programs that specifically address secure edge computing. Udemy and Pluralsight provide targeted courses on IoT development, network security, and programming languages, catering to varying skill levels. CompTIA Security+ and Cisco’s CCNA certifications can bolster your understanding of network security and are highly regarded in the industry. Workshops and Bootcamps Attend workshops and bootcamps focused on IoT security and edge computing. These intensive training sessions offer hands-on experience and direct interaction with experts in the field. Industry conferences and seminars often include workshops and sessions dedicated to the latest trends and technologies in secure edge computing and IoT. Academic Programs Consider pursuing a degree or taking individual courses in computer science, information technology, cybersecurity, or a related field with a focus on IoT and edge computing. Some universities offer specialized programs or electives in IoT systems design and security, providing a comprehensive academic foundation. Professional Networks and Communities Join professional networks and online communities related to IoT and secure edge computing. Platforms like LinkedIn, Reddit, and specialized forums can provide valuable insights, advice, and networking opportunities. Participate in hackathons and competitions focused on IoT and edge computing solutions. These events can offer practical experience and exposure to real-world challenges. Industry Publications and Resources Stay informed about the latest trends, challenges, and advancements in IoT and secure edge computing by following industry publications, blogs, and research papers. Organizations like the IEEE and the IoT Security Foundation offer resources, white papers, and guidelines that can deepen your understanding of the field. Developing skills in secure edge computing for IoT requires a multifaceted approach, combining technical knowledge, security expertise, and continuous learning. By leveraging online courses, workshops, academic programs, professional networks, and industry resources, aspiring and current IoT professionals can equip themselves with the tools needed to succeed in this dynamic field. As the demand for secure, efficient IoT solutions grows, so does the opportunity for skilled professionals to make a significant impact on the future of technology.  

In the rapidly evolving digital landscape, the integration of Internet of Things (IoT) devices with secure edge computing is revolutionizing industries by offering smarter, faster, and more efficient solutions. Particularly in sectors like healthcare and manufacturing, where data sensitivity and real-time processing are paramount, the impact of secure edge computing is transformative. This blog delves into how secure edge computing is reshaping IoT applications in these fields and explores its potential in other areas. The Foundation of Secure Edge Computing in IoT Secure edge computing refers to processing data near the source of data generation rather than relying on a centralized data-processing warehouse. This proximity to data sources allows for real-time data processing without latency, enhances security by reducing data transmission, and alleviates bandwidth demand on networks. In the context of IoT, secure edge computing enables devices to perform complex tasks and make decisions independently, making IoT networks more efficient and scalable. Transforming Healthcare with IoT and Secure Edge Computing In healthcare, the stakes for privacy, data security, and real-time processing are incredibly high. IoT devices, such as wearable health monitors and connected medical equipment, generate vast amounts of data that require immediate analysis for patient care decisions. Secure edge computing processes this data on-site, or near the patient, ensuring swift, accurate health monitoring and diagnostics without the latency and security risks associated with transmitting data to a distant cloud or data center. Secure edge computing also enables remote patient monitoring, allowing healthcare providers to deliver personalized care to patients in their homes. By processing data at the edge, sensitive patient information is better protected, and caregivers can make immediate, informed decisions based on real-time data analysis. Revolutionizing Manufacturing with IoT and Secure Edge Computing The manufacturing sector benefits significantly from IoT and secure edge computing through the concept of the smart factory. In these environments, IoT sensors and devices monitor and control manufacturing processes, manage supply chains, and predict maintenance needs. By deploying secure edge computing, manufacturers process this data on the factory floor, leading to improved operational efficiency, reduced downtime, and enhanced hardware cybersecurity. Secure edge computing in manufacturing also supports the implementation of digital twins, virtual replicas of physical processes, and products that can predict outcomes based on real-time data. This capability allows for unprecedented levels of product customization, quality control, and supply chain management, all while safeguarding sensitive data. Beyond Healthcare and Manufacturing: The Future of Secure Edge Computing in IoT The potential applications of secure edge computing in IoT extend far beyond healthcare and manufacturing. In smart cities, for example, secure edge computing can manage traffic flow, optimize energy use, and enhance public safety through immediate data analysis and response. In agriculture, it can process data from soil sensors and drones to make instant decisions about irrigation and crop health, optimizing yield and resource use. Challenges and Considerations Despite its benefits, the deployment of secure edge computing in IoT comes with challenges. Ensuring the physical security of edge devices, managing the complexity of edge networks, and maintaining data privacy and compliance are critical considerations. Furthermore, developing standardized protocols for interoperability among diverse devices and platforms is essential for maximizing the potential of IoT and secure edge computing. Secure edge computing is set to redefine the landscape of IoT by enabling smarter, faster, and more secure operations across various industries. In healthcare and manufacturing, where it's already making significant strides, it promises to improve outcomes, enhance efficiency, and protect sensitive data. As technology advances and standards evolve, the adoption of secure edge computing in IoT will continue to expand, unlocking new possibilities and transforming our approach to data processing and analysis in an increasingly connected world.

With two centers focused on AI technology and cybersecurity, Morgan State University (MSU) is poised to level the playing field for students and users of the technology... ...With the advent of the Internet of Things, hacking one device can compromise everything connected to it. “Think about how many of these connected devices you encounter throughout the day,” says CAP Center Director Kevin Kornegay. “Since everything’s connected to everything, you’re not safe anymore.” But the CAP Center, which was established in 2018, is looking to change that. Increasingly, devices themselves are analyzing and computing data at “the edge” instead of sending big datasets back to central processing centers. That provides a huge time savings, allowing cars, thermostats, and similar products to respond in real time. But this can be risky, since distributing data across more devices means more possible targets for hackers, and some devices aren’t secure out-of-the-box. READ MORE

The U.S. Department of Defense has announced that it has awarded approximately $27 million for a USC-led Microelectronics Commons project. The university will lead a coalition of research and industry organizations with the power to accelerate the development and manufacturing of microelectronics in the United States. The coalition is led by researchers at ISI and the USC Viterbi Ming Hsieh Department of Electronic and Computer Engineering. The partner institutions within higher education ​are Caltech; Morgan State University in Baltimore; North Carolina A&T State University; Pasadena City College; University of California, Irvine; UCLA; University of California, Riverside; University of California, San Diego; and University of California, Santa Barbara.  READ MORE

Purdue hosted the "Creating a Collaborative Approach to CHIPS Act Objectives and Innovation” event on November 3, 2023 where thought leaders from academia, industry, and government gathered to explore enhancing U.S. competitiveness in the semiconductor sector through a broad and coordinated national capabilities network. A major goal of the workshop was to assess the current state of the art and requirements for a national infrastructure with cross-cutting capabilities to help realize the transformative objectives of the CHIPS Act. The CAP Center's very own Dr. Kevin Kornegay was an invited panelist for the "Developing a Domestic Workforce to Fuel Semiconductor Industry Resurgence" session. READ MORE HERE

The CAP Center has partnered with SCALE (Scalable Asymmetric Lifecycle Engagement ) led by Purdue University, funded by the Department of Defense, and managed by NSWC Crane. SCALE is the preeminent U.S. program for semiconductor workforce development in the defense sector. SCALE facilitates a different approach to training highly skilled U.S. microelectronics engineers, hardware designers, and manufacturing experts, ensuring U.S. leadership in this important area. The CAP Center will focus on technology areas including system-on-chip and embedded systems / Artificial Intelligence. READ MORE

NSA and Minority Serving Institutions_ Improving Vehicle Cybersecurity with Morgan State University    

  From left to right: Dr. Edmund Smith (Sandia National Labs), Dr. Marcial Tientu (CAP Center), Dr. Paige Harvey (NSA), and Dr. Sean Richardson (Verizon).

Dr. Onyema Osuagwu, Associate Professor, on earning tenure in the ECE Department.  

The SFFP offers fellowships to university faculty to conduct research at one of the Air Force research facilities in the summer. The objectives of the Summer Faculty Fellowship Program are to: 1.  stimulate professional relationships among SFFP fellows and the scientists and engineers in AFRL Technical Directorates and other Air Force research facilities; 2.  elevate the awareness in the U.S. academic community of Air Force research needs and foster continued research at SFFP fellows' institutions; and 3.  provide the faculty opportunities to perform high-quality research at AFRL Technical Directorates and other Air Force research facilities. SFFP fellows conduct research in collaboration with Air Force researchers for a continuous summer period of eight to twelve weeks at the Technical Directorates of the Air Force Research Laboratory, the US Air Force Academy, or the Air Force Institute of Technology. A final report is required at the completion of the summer appointment.

Abstract: Project Connected Home over IP, known as Matter, a unifying standard for the smart home, will begin formal device certification in late 2022. The standard will prioritize connectivity using short-range wireless communication protocols such as Wi-Fi, Thread, and Ethernet. The standard will also include emerging technologies such as Blockchain for device certification and security. In this paper, we rely on the Matter protocol to solve the long-standing heterogeneity problem in smart homes. This work presents a hardware Testbed built using development kits, as there is currently very few devices supporting Matter protocol. In addition, it presents a network architecture that automates smart homes to cloud services. The work is a simple and cheap way of developing a Testbed for automating smart homes that uses Matter protocol. The architecture lays the foundation for exploring security and privacy issues, data collection analysis, and data provenance in a smart home ecosystem built on Matter protocol. W. Zegeye, A. Jemal and K. Kornegay, "Connected Smart Home over Matter Protocol," 2023 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, 2023, pp. 1-7, doi: 10.1109/ICCE56470.2023.10043520. Connected_Smart_Home_over_Matter_Protocol

Back To Top
Search