E-WiNS Lab

Impact and Context

The transition from 5G to 6G represents a fundamental shift toward an interconnected global intelligence. With the number of connected devices projected to reach into the tens of billions by 2030, the reliance on heterogeneous networks, spanning from satellite links to local sensor clusters, has never been greater. As demand for seamless automation, autonomous driving, and resilient global infrastructure grows, the need for robust, standardized communication protocols becomes a matter of critical infrastructure. Our work translates academic innovation into scalable solutions, facilitating the transition from conceptual network models to real-world deployment in the global digital economy.

Research Statement

Our lab is dedicated to advancing high-performance, secure, and resilient wireless communication and mobile systems, enabling seamless "ground-to-satellite" connectivity that powers the next generation of autonomous systems and global communications; we architect the future of connectivity across handheld devices, large-scale Internet of Things deployments, vehicular networks (V2X), and satellite links through the integration of advanced machine learning, cross-layer protocol design, and network optimization.

Current Projects

  • 6G & Future Wireless Architectures
    We are researching the foundational protocols for 6G networks, focusing on extreme throughput, ultra-low latency, and intelligent resource allocation. Our goal is to develop native-AI network architectures that can adapt to highly dynamic traffic demands and complex spectrum environments.

  • Integrated Space-Air-Ground Networks (ISAGN)
    We are developing integrated frameworks that unify terrestrial base stations with UAV-enabled aerial platforms and Low-Earth Orbit (LEO) satellite constellations. This research addresses the challenges of wide-area coverage, seamless mobility management, and network resilience, ensuring robust connectivity for remote regions, emergency response, and high-speed global mobility.

  • Connected Mobile & Health Systems (Smartphones, IoTs, mHealth)
    We investigate the performance and security of mobile computing systems, with a focus on Smartphones, IoTs, and mHealth platforms. By analyzing the interaction between mobile endpoints and network infrastructure, we are developing lightweight, robust mechanisms to enhance data integrity and transmission efficiency. Our research ensures secure, high-performance connectivity across diverse mobile healthcare and autonomous ecosystems.

Our Team

Ph.D. Students

Two Ph.D. students joining - details coming soon.

Master's Students

DeMarko Fulcher

DeMarko Fulcher

Fall 2025 - Present

M.S. in Computer Science, specializing in network security, formal verification, and cryptographic protocol analysis.

Dharani Nadendla

Dharani Nadendla

Fall 2025

M.S. student researching mobile health systems and secure communication for healthcare applications.

Undergraduate Students

Bella Goltser

Bella Goltser

Fall 2025 - Present

CWIT Scholar at UMBC interested in exploring innovative methods for identifying and mitigating vulnerabilities in networked systems.

Shayne Hewitt

Shayne Hewitt

Fall 2025 - Present

A diligent and precise cybersecurity enthusiast, with attention to detail and a motive to prioritize the privacy that users deserve.

Dipa Myae

Dipa Myae

Fall 2025 - Present

UMBC Cyber Scholars Program member with a focus on satellite security and resilient space-ground communication.

Olaoluwa Ogunsanya

Olaoluwa Ogunsanya

Fall 2025 - Present

Undergraduate researcher with a keen interest in network security and protocol vulnerability analysis.

Chief Security Officer

Xiaohua

Xiaohua Hu

Since Day One - Present (and Forever)

Lab mascot, morale officer, and self-appointed Chief Security Officer. Xiaohua oversees all lab operations from her favorite nap spot, ensuring network threats are kept at bay through vigilant snoring. Specializes in penetration testing of treat bags, vulnerability assessment of couch cushions, and denial-of-service attacks on productivity. Her threat model is simple: if it's edible, eat it; if it's not, sleep on it.

Gallery