Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ronald Watro is active.

Publication


Featured researches published by Ronald Watro.


security of ad hoc and sensor networks | 2004

TinyPK: securing sensor networks with public key technology

Ronald Watro; Derrick Kong; Sue-fen Cuti; Charles Gardiner; Charles Lynn; Peter Kruus

Wireless networks of miniaturized, low-power sensor/actuator devices are poised to become widely used in commercial and military environments. The communication security problems for these networks are exacerbated by the limited power and energy of the sensor devices. In this paper, we describe the design and implementation of public-key-(PK)-based protocols that allow authentication and key agreement between a sensor network and a third party as well as between two sensor networks. Our work is novel in that PK technology was commonly believed to be too inefficient for use on low-power devices. As part of our solution, we exploit the efficiency of public operations in the RSA cryptosystem and design protocols that place the computationally expensive operations on the parties external to the sensor network, when possible. Our protocols have been implemented on UC Berkeley MICA2 motes using the TinyOS development environment.


2015 Resilience Week (RWS) | 2015

Quantifying & minimizing attack surfaces containing moving target defenses

Nathaniel Soule; Borislava I. Simidchieva; Fusun Yaman; Ronald Watro; Joseph P. Loyall; Michael Atighetchi; Marco Carvalho; David Myers; Bridget Flatley

The cyber security exposure of resilient systems is frequently described as an attack surface. A larger surface area indicates increased exposure to threats and a higher risk of compromise. Ad-hoc addition of dynamic proactive defenses to distributed systems may inadvertently increase the attack surface. This can lead to cyber friendly fire, a condition in which adding superfluous or incorrectly configured cyber defenses unintentionally reduces security and harms mission effectiveness. Examples of cyber friendly fire include defenses which themselves expose vulnerabilities (e.g., through an unsecured admin tool), unknown interaction effects between existing and new defenses causing brittleness or unavailability, and new defenses which may provide security benefits, but cause a significant performance impact leading to mission failure through timeliness violations. This paper describes a prototype service capability for creating semantic models of attack surfaces and using those models to (1) automatically quantify and compare cost and security metrics across multiple surfaces, covering both system and defense aspects, and (2) automatically identify opportunities for minimizing attack surfaces, e.g., by removing interactions that are not required for successful mission execution.


Archive | 2016

Privacy-Enhanced Android for Smart Cities Applications

Matthew Lepinski; David Levin; Daniel McCarthy; Ronald Watro; Michael Lack; Daniel Hallenbeck; David Slater

Many Smart Cities applications will collect data from and otherwise interact with the mobile devices of individual users. In the past, it has been difficult to assure users that smart applications will protect their private data and use the data only for the application’s intended purpose. The current paper describes a plan for developing Privacy-Enhanced Android, an extension of the current Android OS with new privacy features based on homomorphic and functional encryption and Secure Multiparty Computation. Our goal is to make these advances in privacy-preserving technologies available to the mobile developer community, so that they can be broadly applied and enable the impactful social utility envisioned by Smart Cities.


local computer networks | 2009

An architecture for scalable network defense

Tim Strayer; Walter Clark Milliken; Ronald Watro; Walt Heimerdinger; Steven A. Harp; Robert P. Goldman; Dustin Spicuzza; Beverly Schwartz; David Patrick Mankins; Derrick Kong; Pieter Mudge Zatko

We describe a novel architecture for network defense designed for scaling to very high data rates (100 Gb/s) and very large user populations. Scaling requires both efficient attack detection algorithms as well as appropriate an execution environment. Our architecture considers the time budget of traffic data extraction and algorithmic processing, provides a suite of detection algorithms”each designed to present different and complementary views of the data—that generate many “traffic events,” and reduces false positives by correlating these traffic events into benign or malicious hypotheses.


Archive | 2009

Multi-tiered scalable network monitoring

William Timothy Strayer; Walter Clark Milliken; Ronald Watro


Archive | 2002

Probabilistic Validation of Intrusion Tolerance 1

William H. Sanders; Michel Cukier; Franklin Webber; Partha P. Pal; Ronald Watro


RFC | 2012

Certificate Policy (CP) for the Resource Public Key Infrastructure (RPKI)

Stephen Kent; Derrick Kong; Karen Seo; Ronald Watro


international conference on emerging security information systems and technologies | 2014

Ghost Map: Proving Software Correctness using Games

Ronald Watro; Kerry Moffitt; Talib S. Hussain; Daniel Wyschogrod; John Ostwald; Derrick Kong; Clint A. Bowers; Eric Church; Joshua Guttman; Qinsi Wang


international conference on networks | 2015

Lightbulb: A Toolkit for Analysis of Security Policy Interactions

Derrick Kong; David Mandelberg; Andrei Lapets; Ronald Watro; Daniel Smith; Matthew Runkle


Archive | 2005

Intrusion Tolerance By Unpredictable Adaptation (ITUA)

Partha P. Pal; Michael Atighetchi; Christopher C. Jones; Idit Keidar; David Levin; Joseph P. Loyall; Paul Rubel; Richard E. Schantz; Ronald Watro; Franklin Webber

Collaboration


Dive into the Ronald Watro's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge