Keeping the Internet Secure

Dr. Atam Dhawan

Data watermarking, intrusion alarm systems and distortion-less data hiding are some of the techniques under study at the Center for Wireless Networking and Internet Security. A partnership between NJIT's Department of Electrical and Computer Engineering and Princeton University, the new center is supported by a $2.6 million R&D Excellence Grant from New Jersey Commission on Science and Technology. Among the projects are:

  • A project to develop a dynamic watermarking and encryption method, led by Dr. Atam Dhawan (photo above), professor and chair of electrical and computer engineering and director of the center. Watermarking uses keys or codes, which permit users to access classified data. Dhawan's method breaks down the data into subsets. To download each subset, a user needs a watermark. Only authorized users--not hackers--will know the watermarks.
  • A new distortion-less marking technique based on the integer wavelet transform has been developed recently by a group headed by Yun  Q. Shi, professor of electrical and computer engineering. The system can embed a larger amount of data up to 1 million bits into a medium-sized grayscale image.
  • Methods to predict and intercept on-line intruders are the focus of Constantine Manikopoulos, associate professor of electrical and computer engineering. He is developing detection systems to recognize the onset of an attack, start the search for a remedy and provide an early alarm, quickly triggering a defensive shield.


Mobile ad hoc networking, in which there are no dedicated base stations and all nodes interact as peers for packet forwarding, is the focus of research by Assistant Professor Symeon Papavassiliou. The goal is to establish an "instant" communication infrastructure for military and civilian applications where both hosts and routers are mobile.

Mobility modeling and trajectory prediction techniques for wireless networks are under study by Assistant Professor Siran Tekinay (photo left), with the goal of reducing vulnerability to hostile threats.