Mobile Security

Sandia's 'MegaDroid' connects 300,000 virtual mobile devices

Amid the push toward a more mobile federal workforce and initiatives to encourage BYOD, one research-and-development facility with ties to the Energy Department is working toward better mobile security by studying large networks of smartphones.

Researchers at Sandia National Laboratories -- operated by Lockheed Martin subsidiary Sandia Corporation on behalf of the National Nuclear Security Administration -- have built a self-contained Android-based network of 300,000 virtual mobile devices to study cyber disruptions in hopes of making devices more secure.

Dubbed MegaDroid, the project is expected to result in a software tool that will enable cyber researchers to model similar environments and examine the behaviors of smartphone networks. The ultimate goal, however, is overall better mobile security.

“Smartphones are now ubiquitous and used as general-purpose computing devices as much as desktop or laptop computers,” said Sandia’s David Fritz (pictured). “But even though they are easy targets, no one appears to be studying them at the scale we’re attempting.”

Megadroid represents an important step in understanding and limiting the damage from network disruptions due to glitches in software or protocols, natural disasters, acts of terrorism, or other causes, according to the researchers.

"You can't defend against something you don't understand," said John Floren, a computer scientist at Sandia. The larger the scale, the better, he said, because more computer nodes will provide researchers with more data to study.

MegaDroid will mainly be useful to flush out problems that manifest themselves when large numbers of smartphones interact, said Keith Vanderveen, manager of Sandia's Scalable and Secure Systems Research department.

"You could also extend the technology to other platforms besides Android," he said. "Apple's iOS, for instance, could take advantage of our body of knowledge and the toolkit we're developing."

MegaDroid will also be used to explore issues around data protection and data leakage, which Vanderveen said concern agencies such as the departments of Defense and Homeland Security.

About the Author

Camille Tuutti is a former FCW staff writer who covered federal oversight and the workforce.

The Fed 100

Read the profiles of all this year's winners.

Featured

  • Shutterstock image (by wk1003mike): cloud system fracture.

    Does the IRS have a cloud strategy?

    Congress and watchdog agencies have dinged the IRS for lacking an enterprise cloud strategy seven years after it became the official policy of the U.S. government.

  • Shutterstock image: illuminated connections between devices.

    Who won what in EIS

    The General Services Administration posted detailed data on how the $50 billion Enterprise Infrastructure Solutions contract might be divvied up.

  • Wikimedia Image: U.S. Cyber Command logo.

    Trump elevates CyberCom to combatant command status

    The White House announced a long-planned move to elevate Cyber Command to the status of a full combatant command.

  • Photo credit: John Roman Images / Shutterstock.com

    Verizon plans FirstNet rival

    Verizon says it will carve a dedicated network out of its extensive national 4G LTE network for first responders, in competition with FirstNet.

  • AI concept art

    Can AI tools replace feds?

    The Heritage Foundation is recommending that hundreds of thousands of federal jobs be replaced by automation as part of a larger government reorganization strategy.

  • DOD Common Access Cards

    DOD pushes toward CAC replacement

    Defense officials hope the Common Access Card's days are numbered as they continue to test new identity management solutions.

Reader comments

Tue, Oct 2, 2012 jnffarrell1

What can you do with 300,000 zombies? Sandia wants to find out.

Tue, Oct 2, 2012

Try linking more than a dozen iphones...hell, maybe more than 2 and see what happens

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group