Forensic Physical Object Identification

S. Voloshynovskiy, O. Taran, S. Rezaeifar

The main goal is to extend and further develop a new information-theoretic framework for physical object identification in the high-dimensional space of forensic features and apply it to practical systems. This goal will be achieved based on a novel interpretation of links between the encoding techniques, machine learning and forensic identification, which will be theoretically introduced and explored in this project.

Link

 


 

Machine Learning based Analytics for Big Data in Astronomy

S. Voloshynovskiy, D. Ullmann

Astronomical observations produce a wealth of data in excess of several TB per day. Clearly, even a fraction of such data cannot be analyzed manually. In this project, we will investigate the use of big data analytics tools such as machine learning techniques applied to astronomical data. Specifically, we will consider observations of solar flares – magnetic eruptions that influence the whole solar system and cause space weather phenomena on Earth such as blackouts and problems in aircraft communication and GPS positioning. 

Link

 


 

Identification for the Internet-of-Things

S. Voloshynovskiy, B. Razeghi

The IoT will contain a huge number of devices and objects that have very low or nonexistent processing and communication resources, coupled to a small number of high-power devices. The weakest devices, which are most ubiquitous, will not be able to authenticate themselves using cryptographic methods. Other important tasks in the IoT will be to verify if an object is authentic, or to identify an object. Our plan is to address these issues using Physical Unclonable Functions (PUFs). PUFs, and especially Quantum Readout PUFs, are ideally suited to the IoT setting because they allow for the authentication and identification of physical objects without requiring any crypto or storage of secret information. Furthermore, we foresee that back-end systems will not be able to provide security and privacy via cryptographic primitives due to the sheer number of IoT devices. Our plan is to address these problems using privacy-preserving database structures and algorithms with good scaling behaviour. Approximate Nearest Neighbour (ANN) search algorithms, which have remarkably good scaling behaviour, have recently become highly efficient, but do not yet have the right security properties and have not yet been applied to PUF data. Summarised in a nutshell, the project aims to improve the theory and practice of technologies such as PUFs and ANN search in the context of generic IoT authentication and identification scenarios.

Link