DONG CHEN

DONG CHEN

Golden, Colorado, United States
620 followers 500+ connections

About

Dong Chen is a tenure-track Assistant Professor in the Department of Computer Science…

Activity

Join now to see all activity

Experience

  • Colorado School of Mines Graphic

    Colorado School of Mines

    Golden, Colorado, United States

  • -

    Miami, Florida, United States

  • -

    Amherst, MA, US

  • -

    Shenyang, Liaoning, China

Education

  • University of Massachusetts Amherst Graphic

    University of Massachusetts, Amherst

    -

    I design, build, and analyze energy efficient systems for Cyber-Physical Systems with a particular emphasis on security and privacy issues.

  • -

    • Energy Data Analysis
    Analyze combine domain-specific knowledge of power systems with sophisticated machine learning techniques to reveal new insights into building energy data.
    • Occupancy Detection
    Analyze the home smart meter data with machine learning techniques to infer the home’s occupancy status-occupied/unoccupied and count the occupants in the building.
    • Privacy Preserving
    Study on low-cost and non-intrusive methods for ensuring consumer security and privacy in…

    • Energy Data Analysis
    Analyze combine domain-specific knowledge of power systems with sophisticated machine learning techniques to reveal new insights into building energy data.
    • Occupancy Detection
    Analyze the home smart meter data with machine learning techniques to infer the home’s occupancy status-occupied/unoccupied and count the occupants in the building.
    • Privacy Preserving
    Study on low-cost and non-intrusive methods for ensuring consumer security and privacy in buildings that include pervasive networked sensing and actuation.

  • -

    Research on security and privacy issues for Cyber-Physical Systems:
    -Cyber-Physcialy System/Internet of Things system structure.
    -Security challenges in wireless networks, access control, intrusion detection, authentication, and privacy preserving.
    -Lightweight Key Management Scheme for heterogeneous sensors or actuators.
    -Trust, Reputation, Fuzzy in local and global scales.

  • -

    Design and Implementation of Medium Plate Mill 2 Communication System Using ACE and TAO

Publications

  • TrafficSpy: Disaggregating VPN-encrypted IoT Network Traffic for User Privacy Inference.

    In Proc. of the 10th IEEE Conference on Communications and Network Security (CNS 2022)

  • PrivacyGuard: Enhancing Smart Home User Privacy.

    The 20th ACM/IEEE International Conference on Information Processing in Sensor Networks, IPSN’21

  • SmartSim: A Device-Accurate Smart Home Simulator for Energy Analytics.

    In Proceedings of the 2016 IEEE International Conference on Smart Grid Communications (SmartGridComm), Sydney, Australia, 2016.

    Other authors
  • SunSpot: Exposing the Location of Anonymous Solar-powered Homes.

    In Proceedings of the 2016 ACM International Conference on Systems for Energy-Efficient Built Environments (BuildSys'16), Stanford, CA, USA, 2016.

    Other authors
  • Preventing Occupancy Detection from Smart Meters

    IEEE Transactions on Smart Grid

    Utilities are rapidly deploying smart meters that measure electricity usage in real-time. Unfortunately, smart meters indirectly leak sensitive information about a home's occupancy, which is easy to detect because it highly correlates with simple statistical metrics, such as power's mean, variance, and range. To prevent occupancy detection, we propose using the thermal energy storage of electric water heaters already present in many homes. In essence, our approach, which we call combined heat…

    Utilities are rapidly deploying smart meters that measure electricity usage in real-time. Unfortunately, smart meters indirectly leak sensitive information about a home's occupancy, which is easy to detect because it highly correlates with simple statistical metrics, such as power's mean, variance, and range. To prevent occupancy detection, we propose using the thermal energy storage of electric water heaters already present in many homes. In essence, our approach, which we call combined heat and privacy (CHPr), modulates a water heater's power usage to make it look like someone is always home. We design a CHPr-enabled water heater that regulates its energy usage to thwart a variety of occupancy detection attacks without violating its objective---to provide hot water on demand---and evaluate it in simulation using real data. Our results show that a standard 50-gal CHPr-enabled water heater prevents a wide range of state-of-the-art occupancy detection attacks.

    Other authors
    See publication
  • Combined Heat and Privacy: Preventing Occupancy Detection from Smart Meters

    12th IEEE International Conference on Pervasive Computing and Communications, Percom’14

    Electric utilities are rapidly deploying smart meters that record and transmit electricity usage in real-time. As prior research shows, smart meter data indirectly leaks sensitive, and potentially valuable, information about a home’s activities. An important example of the sensitive information smart meters reveal is occupancy—whether or not someone is home and when. As prior work also shows, occupancy is surprisingly easy to detect, since it highly correlates with simple statistical metrics…

    Electric utilities are rapidly deploying smart meters that record and transmit electricity usage in real-time. As prior research shows, smart meter data indirectly leaks sensitive, and potentially valuable, information about a home’s activities. An important example of the sensitive information smart meters reveal is occupancy—whether or not someone is home and when. As prior work also shows, occupancy is surprisingly easy to detect, since it highly correlates with simple statistical metrics, such as power’s mean, variance, and range. Unfortunately, prior research that uses chemical energy storage, e.g., batteries, to prevent appliance power signature detection is prohibitively expensive when applied to occupancy detection. To address this problem, we propose preventing occupancy detection using the thermal energy storage of large elastic heating loads already present in many homes, such as electric water and space heaters. In essence,
    our approach, which we call Combined Heat and Privacy (CHPr), controls the power usage of these large loads to make it look like someone is always home. We design a CHPr-enabled water
    heater that regulates its energy usage to mask occupancy without violating its objective, e.g., to provide hot water on demand, and evaluate it in simulation and using a prototype. Our results
    show that a 50-gallon CHPr-enabled water heater decreases the Matthews Correlation Coefficient (a standard measure of a binary classifier’s performance) of a threshold-based occupancy
    detection attack in a representative home by 10x (from 0:44 to 0:045), effectively preventing occupancy detection at no extra cost.

    Other authors
  • Non-Intrusive Occupancy Monitoring using Smart Meters.

    ACM BuildSys 2013

    Detailed information about a home’s occupancy is necessary to implement many advanced energy-efficiency optimizations. How- ever, monitoring occupancy directly is intrusive, typically requir- ing the deployment of multiple environmental sensors, e.g., mo- tion, acoustic, CO2, etc. In this paper, we explore the potential for Non-Intrusive Occupancy Monitoring (NIOM) by using electricity data from smart meters to infer occupancy. We first observe that a home’s pattern of electricity usage…

    Detailed information about a home’s occupancy is necessary to implement many advanced energy-efficiency optimizations. How- ever, monitoring occupancy directly is intrusive, typically requir- ing the deployment of multiple environmental sensors, e.g., mo- tion, acoustic, CO2, etc. In this paper, we explore the potential for Non-Intrusive Occupancy Monitoring (NIOM) by using electricity data from smart meters to infer occupancy. We first observe that a home’s pattern of electricity usage generally changes when oc- cupants are present due to their interact with electrical loads. We empirically evaluate these interactions by monitoring ground truth occupancy in two homes, then correlating it with changes in statisti- cal metrics of smart meter data, such as power’s mean and variance, over short intervals. In particular, we use each metric’s maximum value at night as a proxy for its maximum value in an unoccupied home, and then signal occupancy whenever the daytime value ex- ceeds it. Our results highlight NIOM’s potential and its challenges.

    Other authors
  • Modeling access control for cyber-physical systems using reputation.

    Journal of Computers and Electrical Engineering, Vol. 38, No. 5, pp. 1088-1101

    The emergence of Cyber-Physical Systems (CPSs) heralds the ubiquitous and autonomous globally interconnected networks of embedded devices with their own means of interaction with the physical environment. The complex interactions with the physical environment significantly increase security risks. Especially, for mission-critical CPSs, sensitive data are closely related to security issues and are accessed only by authorized users. Role based access control is an essential component for…

    The emergence of Cyber-Physical Systems (CPSs) heralds the ubiquitous and autonomous globally interconnected networks of embedded devices with their own means of interaction with the physical environment. The complex interactions with the physical environment significantly increase security risks. Especially, for mission-critical CPSs, sensitive data are closely related to security issues and are accessed only by authorized users. Role based access control is an essential component for protecting CPSs from unauthorized access. However, existing mechanisms are inadequate. We argue that role assignment should not depend on the remaining energy of a node but its reputation. This paper proposes a role-based access control model, R2BAC, for CPSs using reputation. The definitions and evaluation metrics of trust and reputation are given in order to evaluate the behavior of the nodes. Then reputation evaluation scheme and role assignment scheme are presented, respectively. In addition, we give the proofs of correctness and complexity analysis for R2BAC. Eventually, a wide set of simulations are provided to evaluate its performance.

    Other authors
    • Guiran Chang
    • Dawei Sun
    • Jie Jia
    • Xingwei Wang
  • AC4E: An Access Control Model for Emergencies of Mission-Critical Cyber-Physical Systems.

    KSII Transactions on Internet and Information Systems(TIIS), Vol. 6, No. 9, pp.2052-2072

    Access control is an essential security component in protecting sensitive data and services from unauthorized access to the resources in mission-critical Cyber-Physical Systems (CPSs). CPSs are different from conventional information processing systems in such that they involve interactions between the cyber world and the physical world. Therefore, existing access control models cannot be used directly and even become disabled in an emergency situation. This paper proposes an adaptive Access…

    Access control is an essential security component in protecting sensitive data and services from unauthorized access to the resources in mission-critical Cyber-Physical Systems (CPSs). CPSs are different from conventional information processing systems in such that they involve interactions between the cyber world and the physical world. Therefore, existing access control models cannot be used directly and even become disabled in an emergency situation. This paper proposes an adaptive Access Control model for Emergences (AC4E) for mission-critical CPSs. The principal aim of AC4E is to control the criticalities in these systems by executing corresponding responsive actions. AC4E not only provides the ability to control access to data and services in normal situations, but also grants the correct set of access privileges, at the correct time, to the correct set of subjects in emergency situations. It can facilitate adaptively responsive actions altering the privileges to specific subjects in a proactive manner without the need for any explicit access requests. A semiformal validation of the AC4E model is presented, with respect to responsiveness, correctness, safety, non-repudiation and concurrency, respectively. Then a case study is given to demonstrate how the AC4E model detects, responds, and controls the emergency events for a typical CPS adaptively in a proactive manner. Eventually, a wide set of simulations and performance comparisons of the proposed AC4E model are presented.

    Other authors
    • Guiran Chang
  • A Survey on Security Issues of M2M Communications in Cyber-Physical Systems.

    KSII Transactions on Internet and Information Systems. Vol. 6, No. 1, pp.24-45, 2012

    n this paper, we present a survey of security and privacy preserving issues in M2M communications in Cyber-Physical Systems. First, we discuss the security challenges in M2M communications in wireless networks of Cyber-Physical Systems and outline the constraints, attack issues, and a set of challenges that need to be addressed for building secure Cyber-Physical Systems. Then, a secure architecture suitable for Cyber-Physical Systems is proposed to cope with these security issues. Eventually…

    n this paper, we present a survey of security and privacy preserving issues in M2M communications in Cyber-Physical Systems. First, we discuss the security challenges in M2M communications in wireless networks of Cyber-Physical Systems and outline the constraints, attack issues, and a set of challenges that need to be addressed for building secure Cyber-Physical Systems. Then, a secure architecture suitable for Cyber-Physical Systems is proposed to cope with these security issues. Eventually, the corresponding countermeasures to the security issues are discussed from four aspects: access control, intrusion detection, authentication and privacy preserving, respectively. Along the way we highlight the advantages and disadvantages of various existing security schemes and further compare and evaluate these schemes from each of these four aspects. We also point out the open research issues in each subarea and conclude with possible future research directions on security in Cyber-Physical Systems. It is believed that once these challenges are surmounted, applications with intrinsic security considerations will become immediately realizable.

    Other authors
    • Guiran Chang
  • Lightweight Key Management Scheme to Enhance the Security of Internet of Things.

    International Journal of Wireless and Mobile Computing, Vol.5, No. 2, pp. 191-198

    Trillions things of Internet of Things (IOT) or Cyber-Physical Systems (CPS) employ a unique global addressing scheme to interact to each other and corporate with others to provide intelligent services. However, people may resist the IOT as long as there is no public confidence that it will not cause any serious threats to their privacy. An effective secure key management for things authentication is the prerequisite of the security operations. Studying on the characteristics of things in the…

    Trillions things of Internet of Things (IOT) or Cyber-Physical Systems (CPS) employ a unique global addressing scheme to interact to each other and corporate with others to provide intelligent services. However, people may resist the IOT as long as there is no public confidence that it will not cause any serious threats to their privacy. An effective secure key management for things authentication is the prerequisite of the security operations. Studying on the characteristics of things in the IOT deeply, this paper proposes a lightweight security key management scheme for Things to Things (T2T) communication in wireless networks of IOT which are usually composed of heterogeneous sensors/actuators or smart sensor-embedded things. Eventually, we evaluate the proposed scheme on storage overhead, communication overhead, computation overhead and resilience against nodes compromise attack, respectively.

    Other authors
    • Guiran Chang
    • Dawei Sun
    • Jie Jia
    • Xingwei Wang
  • TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things.

    Journal of Computer Science and Information Systems, Vol. 8, No. 4, pp. 1207-1228

    Since a large scale Wireless Sensor Network (WSN) is to be completely integrated into Internet as a core part of Internet of Things (IoT) or Cyber Physical System (CPS), it is necessary to consider various security challenges that come with IoT/CPS, such as the detection of malicious attacks. Sensors or sensor embedded things may establish direct communication between each other using 6LoWPAN protocol. A trust and reputation model is recognized as an important approach to defend a large…

    Since a large scale Wireless Sensor Network (WSN) is to be completely integrated into Internet as a core part of Internet of Things (IoT) or Cyber Physical System (CPS), it is necessary to consider various security challenges that come with IoT/CPS, such as the detection of malicious attacks. Sensors or sensor embedded things may establish direct communication between each other using 6LoWPAN protocol. A trust and reputation model is recognized as an important approach to defend a large distributed sensor networks in IoT/CPS against malicious node attacks, since trust establishment mechanisms can stimulate collaboration among distributed computing and communication entities, facilitate the detection of untrustworthy entities, and assist decision-making process of various protocols. In this paper, based on in-depth understanding of trust establishment process and quantitative comparison among trust establishment methods, we present a trust and reputation model TRM-IoT to enforce the cooperation between things in a network of IoT/CPS based on their behaviors. The accuracy, robustness and lightness of the proposed model is validated through a wide set of simulations.

    Other authors
    • Guiran Chang
    • Dawei Sun
    • Jie Jia
    • Xingwei Wang
  • Study on the Interconnection Architecture and Access Technology for Internet of Things.

    In Proc. of the 2011 International Conference on Computer Science and Service System, pp. 1744-1748

    Internet of Things (IOT) is a novel paradigm developed on the basis of existing technologies and closely related to RFID, WSN, CPS, Pervasive Computing and M2M (Machine to Machine). IOT has broad prospects in transportation, logistics, healthcare, smart environment, personal living and social domain. This paper researches on the concept, characteristics and supporting technology of IOT, proposes an interconnection architecture of IOT from the view of business process and data flow. Then…

    Internet of Things (IOT) is a novel paradigm developed on the basis of existing technologies and closely related to RFID, WSN, CPS, Pervasive Computing and M2M (Machine to Machine). IOT has broad prospects in transportation, logistics, healthcare, smart environment, personal living and social domain. This paper researches on the concept, characteristics and supporting technology of IOT, proposes an interconnection architecture of IOT from the view of business process and data flow. Then agent-based and 6LoWPAN-based access models towards sensors or sensor embedded things in IOT are presented and discussed. Eventually, supporting technologies of IOT are summarized.

    Other authors
    • Guiran Chang
    • Jie Jia
  • A Novel P2P Based Grid Resource Discovery Model.

    Journal of Computers, Vol. 6, No. 10, pp. 1390-1397

    Resource discovery is a fundamental problem in grid systems. Original approaches to provide grid resource discovery services are either centralized or hierarchical and proved to be inefficient when the scale of grid systems rapidly increases. A P2P network is a distributed system with the attributes of dynamicity and scalability. P2P systems have the same goal as grid systems: to share and exchange various resources. With their development, P2P systems and grid systems can be combined into a…

    Resource discovery is a fundamental problem in grid systems. Original approaches to provide grid resource discovery services are either centralized or hierarchical and proved to be inefficient when the scale of grid systems rapidly increases. A P2P network is a distributed system with the attributes of dynamicity and scalability. P2P systems have the same goal as grid systems: to share and exchange various resources. With their development, P2P systems and grid systems can be combined into a new system which has their attributes. In this paper, a novel hierarchical P2P based grid model based on the existing grid resource discovery models is discussed. In our model, Chord and Gnutella are selected as the typical protocols to form the virtual P2P layer. Through the experiment results, we argue that the 3C-2G model performs better than the other models in resource discovery among grids oriented to the same application field.

    Other authors
    • Guiran Chang
    • Xiuying Zheng
    • Dawei Sun
    • XIngwei Wang
  • A Novel Secure Architecture for the Internet of Things.

    In Proc. of the Fifth International Conference on Genetic and Evolutionary Computing, pp. 311-314

    With the development of the IoT, different wireless communication technologies and edge network infrastructures are continuously integrated. Therefore, the corresponding communication network environment has become more complex and the security issues involved in the IoT are more complex than any existing network infrastructures. The trust relationship between the heterogeneous entities, security communication, security system and other security issues are more complex and difficult to solve…

    With the development of the IoT, different wireless communication technologies and edge network infrastructures are continuously integrated. Therefore, the corresponding communication network environment has become more complex and the security issues involved in the IoT are more complex than any existing network infrastructures. The trust relationship between the heterogeneous entities, security communication, security system and other security issues are more complex and difficult to solve. In order to solve this kind of security problems, this paper gives the system structure, analyzes the security challenges and threats, proposes a novel security architecture for the IoT based on the research of these security demands, and eventually gives details of the designed security verification system.

    Other authors
    • Guiran Chang
    • Lizhong Jin
    • Xiaodong Ren
  • Design and Implementation of a Portable ACE-Based IPC Platform.

    In Proc. of 2010 International Conference on Intelligent System Design and Engineering Application (ISDEA 2010), pp. 502-505

    ACE is a freely available, open-source object-oriented framework that implements many core design patterns for concurrent communication software. ACE provides reusable C++ wrappers, frameworks and real-time ORB available for most operating systems. In this paper, we introduce the functionality of ACE components, design an effective and portable IPC platform framework based on ACE middleware and implement the IPC platform system in C++. Eventually, we test our IPC platform, compare it with the…

    ACE is a freely available, open-source object-oriented framework that implements many core design patterns for concurrent communication software. ACE provides reusable C++ wrappers, frameworks and real-time ORB available for most operating systems. In this paper, we introduce the functionality of ACE components, design an effective and portable IPC platform framework based on ACE middleware and implement the IPC platform system in C++. Eventually, we test our IPC platform, compare it with the non-ACE system and conclude its advantages and drawbacks.

    Other authors
    • Guiran Chang
    • Xingwei Wang
  • An improvement to the Chord-based P2P routing algorithm.

    In Proc. of the 2009 Fifth International Conference on Semantics, Knowledge and Grid (SKG 2009), pp. 266-269

    Chord has been widely used as a routing protocol in structured peer-to-peer overlay networks. A fundamental problem of peer-to-peer applications is to efficiently locate the node that stores a particular data item. In fact, performance of structured peer-to-peer overlay networks depends on the routing protocols. The original Chord routing protocol based on DHT uses Finger Table to route. However, in the original model, there is redundancy information in the Finger Table. This paper analyzes the…

    Chord has been widely used as a routing protocol in structured peer-to-peer overlay networks. A fundamental problem of peer-to-peer applications is to efficiently locate the node that stores a particular data item. In fact, performance of structured peer-to-peer overlay networks depends on the routing protocols. The original Chord routing protocol based on DHT uses Finger Table to route. However, in the original model, there is redundancy information in the Finger Table. This paper analyzes the routing algorithm of Chord protocol and presents an improvement strategy of original Chord routing algorithm. Results from theoretical analysis and experiments show that the routing performance of structured Chord-based overlay networks is improved.

    Other authors
    • Guiran Chang
    • Xingwei Wang

Courses

  • Algorithms

    -

  • Applied Mathematical Statistics

    -

  • Computer Architecture

    -

  • Distributed Operating Systems

    -

  • Distributed database system

    -

  • Embedded computer systems

    -

  • High-Performance Computer Architecture

    -

  • Machine Learning

    -

  • Networking

    -

  • Numerical Analysis

    -

  • Parallel Programming

    -

  • Probabilites and Random Processes

    -

Honors & Awards

  • New Entering PhD Fellowship

    University of Massachusetts Amherst

  • Annual National Scholarship

    Ministry of Education China

  • CSC International Fellowship

    Ministry of Education, China

  • Huawei Scholarship

    Huawei

  • Innovative Design Award of National Competition on Internet of Things

    Chinese Institute of Electronics

  • New Academic Researcher Award for Doctoral Candidates

    Ministry of Education, China

  • Best Academic Paper Award

    China Institute of Communications in Liaoning

  • Outstanding Graduate Student Award of Northeastern University 2010

    Northeastern University

Organizations

  • IEEE, ACM, CCF, ISOC

    -

More activity by DONG

View DONG’s full profile

  • See who you know in common
  • Get introduced
  • Contact DONG directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named DONG CHEN in United States

Add new skills with these courses