Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Shrirang Mare is active.

Publication


Featured researches published by Shrirang Mare.


ieee symposium on security and privacy | 2014

ZEBRA: Zero-Effort Bilateral Recurring Authentication

Shrirang Mare; Andrés Molina Markham; Cory Cornelius; Ronald A. Peterson; David Kotz

Common authentication methods based on passwords, tokens, or fingerprints perform one-time authentication and rely on users to log out from the computer terminal when they leave. Users often do not log out, however, which is a security risk. The most common solution, inactivity timeouts, inevitably fail security (too long a timeout) or usability (too short a timeout) goals. One solution is to authenticate users continuously while they are using the terminal and automatically log them out when they leave. Several solutions are based on user proximity, but these are not sufficient: they only confirm whether the user is nearby but not whether the user is actually using the terminal. Proposed solutions based on behavioral biometric authentication (e.g., keystroke dynamics) may not be reliable, as a recent study suggests. To address this problem we propose Zero-Effort Bilateral Recurring Authentication (ZEBRA). In ZEBRA, a user wears a bracelet (with a built-in accelerometer, gyroscope, and radio) on her dominant wrist. When the user interacts with a computer terminal, the bracelet records the wrist movement, processes it, and sends it to the terminal. The terminal compares the wrist movement with the inputs it receives from the user (via keyboard and mouse), and confirms the continued presence of the user only if they correlate. Because the bracelet is on the same hand that provides inputs to the terminal, the accelerometer and gyroscope data and input events received by the terminal should correlate because their source is the same - the users hand movement. In our experiments ZEBRA performed continuous authentication with 85% accuracy in verifying the correct user and identified all adversaries within 11s. For a different threshold that trades security for usability, ZEBRA correctly verified 90% of users and identified all adversaries within 50s.


communication systems and networks | 2010

Experimental validation of analytical performance models for IEEE 802.11 networks

Shrirang Mare; David Kotz; Anurag Kumar

We consider the simplest IEEE 802.11 WLAN networks for which analytical models are available and seek to provide an experimental validation of these models. Our experiments include the following cases: (i) two nodes with saturated queues, sending fixed-length UDP packets to each other, and (ii) a TCP-controlled transfer between two nodes. Our experiments are based entirely on Aruba AP-70 access points operating under Linux. We report our observations on certain non-standard behavior of the devices. In cases where the devices adhere to the standards, we find that the results from the analytical models estimate the experimental data with a mean error of 3–5%.


communication systems and networks | 2013

Provenance framework for mHealth

Aarathi Prasad; Ronald A. Peterson; Shrirang Mare; Jacob Sorber; Kolin Paul; David Kotz

Mobile health technologies allow patients to collect their health information outside the hospital and share this information with others. But how can data consumers know whether to trust the sensor-collected and human-entered data they receive? Data consumers might be able to verify the accuracy and authenticity of the data if they have information about its origin and about changes made to it, i.e., the provenance of the data. We propose a provenance framework for mHealth devices, to collect and share provenance metadata and help the data consumer verify whether certain provenance properties are satisfied by the data they receive. This paper describes the programming model for this framework, which describes the rules to be implemented for providing provenance-collecting capabilities to an mHealth application.


Mobile Networks and Applications | 2014

Hide-n-Sense: Preserving Privacy Efficiently in Wireless mHealth

Shrirang Mare; Jacob Sorber; Minho Shin; Cory Cornelius; David Kotz

As healthcare in many countries faces an aging population and rising costs, mobile sensing technologies promise a new opportunity. Using mobile health (mHealth) sensing, which uses medical sensors to collect data about the patients, and mobile phones to act as a gateway between sensors and electronic health record systems, caregivers can continuously monitor the patients and deliver better care. Furthermore, individuals can become better engaged in monitoring and managing their own health. Although some work on mHealth sensing has addressed security, achieving strong privacy for low-power sensors remains a challenge. We make three contributions. First, we propose an mHealth sensing protocol that provides strong security and privacy properties at the link layer, with low energy overhead, suitable for low-power sensors. The protocol uses three novel techniques: adaptive security, to dynamically modify transmission overhead; MAC striping, to make forgery difficult even for small-sized Message Authentication Codes; and asymmetric resource requirements, in recognition of the limited resources in tiny mHealth sensors. Second, we demonstrate its feasibility by implementing a prototype on a Chronos wrist device, and evaluating it experimentally. Third, we provide a security, privacy, and energy analysis of our system.


workshop on privacy in the electronic society | 2011

Adapt-lite: privacy-aware, secure, and efficient mhealth sensing

Shrirang Mare; Jacob Sorber; Minho Shin; Cory Cornelius; David Kotz

As healthcare in many countries faces an aging population and rising costs, mobile sensing technologies promise a new opportunity. Using mobile health (mHealth) sensing, which uses medical sensors to collect data about the patients, and mobile phones to act as a gateway between sensors and electronic health record systems, caregivers can continuously monitor the patients and deliver better care. Although some work on mHealth sensing has addressed security, achieving strong security and privacy for low-power sensors remains a challenge. We make three contributions. First, we propose Adapt-lite, a set of two techniques that can be applied to existing wireless protocols to make them energy efficient without compromising their security or privacy properties. The techniques are: adaptive security, which dynamically modifies packet overhead; and MAC striping, which makes forgery difficult even for small-sized MACs. Second, we apply these techniques to an existing wireless protocol, and demonstrate a prototype on a Chronos wrist device. Third, we provide security, privacy, and energy analysis of our techniques.


Archive | 2014

Wearable computing device for secure control of physiological sensors and medical devices, with secure storage of medical records, and bioimpedance biometric

David Kotz; Ryan J. Halter; Cory Cornelius; Jacob Sorber; Minho Shin; Ronald A. Peterson; Shrirang Mare; Aarathi Prasad; Joseph Skinner; Andres Molina-Markham


workshop on mobile computing systems and applications | 2012

An amulet for trustworthy wearable mHealth

Jacob Sorber; Minho Shin; Ronald A. Peterson; Cory Cornelius; Shrirang Mare; Aarathi Prasad; Zachary Marois; Emma Smithayer; David Kotz


Archive | 2014

System, Method And Authorization Device For Biometric Access Control To Digital Devices

Shrirang Mare; Andres Molina-Markham; Ronald A. Peterson; David Kotz


symposium on usable privacy and security | 2016

A Study of Authentication in Daily Life

Shrirang Mare; Mary Baker; Jeremy Gummeson


HealthSec'11 Proceedings of the 2nd USENIX conference on Health security and privacy | 2011

Adaptive security and privacy for mHealth sensing

Shrirang Mare; Jacob Sorber; Minho Shin; Cory Cornelius; David Kotz

Collaboration


Dive into the Shrirang Mare's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge