Mooi Choo's Research


Current Projects:

SmartPhone Enabled Mobile Health System
In this project, we developed smartphone-based application for healthcare domain. We have developed a location-based mobile application called Fitness Tour that uses social incentives to encourage children to participate in fun outdoor running/walking exercises. We also developed another location-based application called Treasure Hunt that allows players to form group to compete with one another and encourage players to adopt a more active lifestyle. We recently got an NSF award to work on Smartphone Enabled Social and Physical Compass System (SENSCOPS). For more information, click here

Resilient Context-Aware Smartgrid Communication Network (RECAST)
In this project, we intend to build a testbed that demonstrates several novel features that we design for smartgrid control network. We hope to investigate security issues in smartrid e.g. false data injection attacks and secure sharing of power system measurement data.

Secure Mobile Information Sharing (NSF funded Project): SEMOIS
In this project, we intend to build a secure mobile information sharing system where mobile users can send secure context-based messages and store encrypted data items in insecure wireless storage boxes. We have designed a scheme that uses social community information to control the propagation of diseases in HeathCare Domain. Interested readers can refer to our technical report . For more information on SEMOIS , click here

Secure Efficient Content Centric Mobile Networks(NSF funded Project): SECON
In this project, we intend to build prototypes and conduct several experiments using GENI testbeds to illustrate new Internet features e.g. intentional named message dissemination, secure information retrieval across multiple domains. For more information on SECON , click here

Assistive Technologies for Elderly and Disabled People
Networked Enabled Robotic Assistive Technology for Independent Living - joint project with Prof J. Spletzer
In this project, we intend to integrate RFID and robotic technology to create products that can enhance the quality of life of elderly.
A related project called Automated Asset Locating System was funded by NSF CELDI program

Secure Information Retrieval for Extreme Networks (SIREN)
In this project, we intend to build a secure information retrieval system that works in challenging network environments. Our information retrieval scheme uses query/data replication to achieve higher query success rate. Replicated publications are spread to more friendly nodes to minimize information retrieval latency.
Related Project - A Million People Project at University of Cambridge

Adhoc/Sensor Network Technologies
Sensor Tracking System
Interdomain adhoc routing protocol
Security Design for Adhoc Networks

Endorse - DoS resilience for adhoc networks

SRED-VAN - Secure Robust Efficient Delivery for Vehicular Adhoc Networks

In this project, we design efficient delivery protocols for different vehicular applications e.g. delivering emergency medical information via roadside entities, traffic congestion monitoring. We also intend to explore security solutions for VANET.

Selected Publications

  • M. Chuah, F. Fu, "Performance Study of Robust Data Transfer Protocols for VANETs", CSE Technical Report, June, 2006.

  • Completed Projects:

    Intelligent Message Filtering System for RADICAL (ARL funded Project): IMF
    In this project, we intend to develop software on mobile phones that allow the soldiers to send secure context-based messages. Only authorized soldiers need to decrypt these messages.

    Disruption Tolerant Network (DTN) (DARPA funded Project): EDIFY
    EDIFY - Disruption Tolerant Network (DTN) (DARPA funded Project)
    Phase 3 (Oct 2008- now)
    Principal Investigator: Prof M. Chuah
    Phase 2 (Aug 06 - Sept 2008)
    Principal Investigator: Prof M. Chuah
    Past Collaborators: Dr K. Chang (Telcordia)
    Phase 1 (Oct, 2005-June 2006)
    Collaborators: Prof B. Davison, Prof L. Cheng.
    EDIFY project is supported by Darpa STO

    For more information on EDIFY , click here

    Conference/Journal Publications for EDIFY project

    Anomaly Detection and Mitigation for Interdomain Routing Exchanges (ADMIRE)
    In this project, we propose a new anomaly detection and mitigation framework for interdomain routing exchanges. Our work will include (a) using data mining techniques to distinguish different BGP anomaly events - joint work with Prof Pottenger, (b) combined path change analysis and proactive probing for detecting BGP selective dropping attacks.

    Selected Publications

  • M. Ganiz, W. Pottenger, S. Kanitkar, M. Chuah, "Detection of Interdomain Routing Anomalies Based on Higher-Order Path Analysis", CSE Tech Report, LU-CSE-06-008, May, 2006
  • M. Ganiz, W. Pottenger, S. Kanitkar, M. Chuah, "Detection of Interdomain Routing Anomalies Based on Higher-Order Path Analysis", to appear as short paper at ICDM 2006
  • M. Chuah, K. Huang, "Detecting BGP Selective Dropping Attacks", to appear at IEEE LCN Workshop on Network Security, 2006
  • Sensor-Based Medical Information System (SBMIS) - funded by PITA
    In this project, we used data mining techniques to detect anomaly in medical sensor data stream and also to correlate vital signals from multiple sensor streams. We have designed an adaptive window-based scheme for detecting anomaly in ECG time series. Our initial results using the ECG dataset taken from the MIT-BH database indicate that our Adaptive Window-Based Discord Discovery (AWDD)scheme is quite promising. We built some integrated mote-based medical sensors that CodeBlue (Harvard) has designed.
    Network-based Intrusion Detection
    Network-based Worm Detection - Network worms are a growing threat to today's Internet-connected networks and hosts. Modern worms can spread very quickly and widely so automatic response is required to contain worm outbreaks. In our first piece of work, we propose a system that can automatically generate useful signatures that can be used by indrusion detection systems such as bro and snort to filter out or slow down the spread of the worm elsewhere in the network. Our system makes use of three sliding window techniques coupled with the Rabin fingerprint digest algorithm. A technical report (LU-CSE-05-025) summarizing the results has been published. This work was also presented at an NSF-funded workshop on network security in Aug 2005. The results also appear in an invited CISS 2006 paper. We also work on network intrusion detection system with semantic-aware capability. A conference paper based on this work has been accepted at 2nd International workshop on Security in Systems and Networks (SSN2006).

    DDOS Migitation Techniques
    PacketScore Architecture Sample CLP Score Sample Packetscore Results
    PacketScore: Joint work with Y. Kim, J. Chao, W. Lau.
    Invited PacketScore Presentations in 2003: Polytechnic University Poly Podium Lecture Seminar, and Princeton University's EE Department.

    Selected Publications

  • Y. Kim, W. Lau, M. Chuah, J. Chao, "PacketScore: A statistical-based overload control against DDoS attacks", Proceedings of IEEE Infocom, March, 2004
  • Y. Kim, W. Lau, M. Chuah, J. Chao, "Packetscore: A statistical-based packet filtering scheme against DDoS attacks", IEEE Transaction on Dependable and Secure Computing, 2006.
  • M. Chuah, W. Ma, V. Goel, "Performance Evaluation of Distributed Packet Score Scheme", CSE Technical Report, June, 2005.
  • Previous Research:

    Traffic Management in 3G Networks

    Mobility Management in Wireless Networks


    Contact information:

    Department of Computer Science and Engineering
    19 Memorial Drive West
    Lehigh University
    Bethlehem, PA 18015
    Phone: (610)758-4061
    Office: 506 Packard Lab
    E-mail : chuah@cse.lehigh.edu

    Last modified: Wed April 24 12:45:21 Eastern Standard Time 2010