Research Projects

  • Projects with Industry

News and Events

Centre of Excellence in FPGAs/ASIC Research (CEFAR) has been established at NIIT.

The two sub groups of CEFAR are:
1.) Group for Reseach in ASIC/FPGA (GRAF) and
2.) Group for Research in Reconfigurable Architectures for Security in Communication (GRASiC).
  1. Bulk Encryptor with Selected Multiplexing Combinations and Transmission Support for Multiple  Platforms

Bulk Encryption Unit (BEU), is a special-purpose device for securing data on communication links. BEUs are used in commercial, government,and military environments, where confidential or secret information may be stored and/or regularly transmitted.

The BEU, will be the result of cutting-edge research (in the field of data security and network security, both of which are considerably important areas of information technology) and high-quality indigenous system development.              

                          Grants Obtained -> Rs. 1.983 Millions

  • Postgraduate Projects (Thesis)

  1. End to End Packet Dynamics


Finding the end to end behavior of packets, looking into different packet characteristics in the internet and finding reasons and solution to routing instabilities, packet loss and routing symmetry. The project also looks into the effect of packet loss on traffic characteristics.


                  Imadud Din  (MS-IT 7)

  •  Undergraduate Projects

  1. Network Traffic Manager (NTM)


A tool to capture, monitor and analyze network traffic. NTM consists of two parts: first to capture network packets and second to analyze them. After capturing, analysis process may include rerouting network packets for quality of service (QoS).


                   Ambreen Ashfaq (BICSE-2 A)

                   Samar Nasim      (BICSE-2 A)


  1. RFID Security

Radio Frequency Identification (RFID) is an automatic identification Method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. The RFID tags carry vital information in their operation and thus concerns on privacy and security of that information arises.

The objective is to analyze the existing standards, encryption algorithms and implement the most suitable one on any RFID system.


                Kashif Sharif  (BICSE-2 B)


   3.  GSM Interceptor

By analyzing the weakness in the protocols, GSM communications can be intercepted. The attack will be done based on the security flaws of the GSM protocols, and they work whenever GSM supports a weak cipher. These attacks could be practical because they don’t require any knowledge of the content of the conversation. These attacks will provide the facility to tap conversations and then decrypts them either in real time or later time. Here the attack is passive in nature that is, the conversation would be eavesdropped and then decryption would be done. Based upon the flaws and weakness in the protocols that GSM support, communication will be cracked. Here attack is only possible because the error correction codes are employed before the encryption. Thus due to such structured redundancy before encryption majorly reduces the security of the system.

Government agencies use GSM interceptors to capture communication between criminal groups for security purposes. However these interceptors are very expensive. We aim at developing an interceptor which will basically be much cheaper then the ones already made.



                  Nida Sami Khan (BICSE-2 C)
                  Ujala Taqdees   (BICSE-2 C)
                  Rabbia Saeed    (BICSE-2 C)