Peter Hawrylak, PhD

Peter Hawrylak, PhD
Associate Professor of Electrical and Computer Engineering
College of Engineering & Natural Sciences
Computer Science
Electrical and Computer Engineering
918-631-3277 Rayzor Hall Room 1100

Education

PhD – University of Pittsburgh MS – University of Pittsburgh BS – University of Pittsburgh

Bio

Peter J. Hawrylak, Ph.D. received the B.S. degree in computer engineering, the M.S. degree in electrical engineering, and the Ph.D. in electrical engineering from the University of Pittsburgh, Pittsburgh, PA, USA, in 2002, 2004, and 2006 respectively. He is an Associate Professor in the Department of Electrical and Computer Engineering, with a joint appointment in the Tandy School for Computer Science, at The University of Tulsa, Tulsa, OK, USA. He has published more than 40 publications and holds 14 patents in the radio frequency identification (RFID), energy harvesting, and cyber-security areas. His research interests include RFID (radio frequency identification), security for low-power wireless devices, Internet of Things (IoT) applications, and digital design. Dr. Hawrylak is a member of the IEEE and IEEE Computer Society, and is currently the Secretary of the Tulsa Section of the IEEE. He served as chair of the RFID Experts Group (REG) of Association for Automatic Identification and Mobility (AIM) in 2012-2013. Peter received AIM Inc.’s Ted Williams Award in 2015 for his contributions to the RFID industry. Dr. Hawrylak is the Publication Chair of the International IEEE RFID Conference, and is the Editor-in-Chief of the International Journal of Radio Frequency Identification Technology and Applications (IJRFITA) journal published by InderScience Publishers, which focuses on the application and development of RFID technology. Dr. Hawrylak is also the Editor-in-Cheif of the IEEE RFID Virtual Journal which provides a single source for high-quality and high-impact publications in the areas of RFID and Internet of Things (IoT).

Research Interests

Embedded Systems
Radio Frequency Identification
Internet of Things
Wireless Systems
Embedded System Security
Wireless System Security
Digital Hardware Design
Computer Architecture

Teaching Interests

Computer Organization
Digital Logic
Computer Architecture
Digital Hardware Design and Implementation
Radio Frequency Identification

Publications

Journal Articles

  • Hawrylak, Peter et al. “The Access of Things: Spatial Access Control For.” Handbook of Research on Progressive Trends in Wireless Communications and Networking (2014): 189. Print.

  • Hawrylak, Peter et al. “Using Hybrid Attack Graphs to Model and Analyze Attacks against the Critical Information Infrastructure.” Critical Information Infrastructure Protection and Resilience in the ICT Sector (2013): 173. Print.

  • A. Ogirala, P. Hawrylak, and M. Mickle, “Interoperability Verification in ISO 18000-7 Active RFID Systems: Experimental Setup and Results,” Wireless Personal Communications, vol. 68, no. 3, pp. 619–635, 2013.

  • [1]
    P. Hawrylak, N. Schimke, J. Hale, and M. Papa, “Security Risks Associated with Radio Frequency Identification in Medical Environments”, vol. 36, pp. 3491–3505, 2012.
  • [1]
    P. Hawrylak, N. Schimke, J. Hale, and M. Papa, “RFID in E-Health: Technology, Implementation”, Telemedicine and E-Health Services, Policies, and Applications: Advancements and Developments: Advancements and Developments, 2012, p. 347.
  • [1]
    A. Ogirala, “Ultra High-Speed and Low-Power Flexible Architecture Using State Transition Matrix Model For EPC Gen-2 Communication Protocol Processor”, vol. 32, pp. 198-205, 2012.
  • [1]
    A. Ogirala, P. Hawrylak, and M. Mickle, “Interoperability Test Methodology for ISO 18000-7 Active RFID”, vol. 65, pp. 253-271, 2012.
  • [1]
    P. Hawrylak and C. Hart, “Using Radio Frequency Identification (RFID) Tags to Store Medical Information Needed by First Responders: Data Format, Privacy, and Security”, vol. 3, pp. 10-26, 2012.
  • [1]
    S. Ravilla, A. Ogirala, A. Murari, P. Hawrylak, and M. Mickle, “Anti-collision policy for RFID systems: fast predict tags in field algorithm”, vol. 3, pp. 215-228, 2011.
  • [1]
    A. Ogirala, “Impact of ISO 18000 Series RF Signals On CRMDs: A Unified Approach”, vol. 31, pp. 250-258, 2011.
  • [1]
    L. Maillart, A. Kamrani, B. Norman, J. Rajgopal, and P. Hawrylak, “Optimizing RFID tag-inventorying algorithms”, vol. 42, pp. 690-702, 2010.
  • [1]
    Y. Sun, P. Hawrylak, Z.-H. Mao, and M. Mickle, “Collision resolution in ISO 18000-6c passive RFID”, vol. 25, pp. 239-262, 2010.
  • [1]
    A. Jones, “Radio Frequency Identification Prototyping”, vol. 13, pp. 29:1–29:22, 2008.
  • [1]
    P. Hawrylak, J. Cain, and M. Mickle, “Analytic modelling methodology for analysis of energy consumption for ISO 18000-7 RFID networks”, vol. 1, pp. 371-400, 2007.
  • [1]
    A. Jones, “Passive active radio frequency identification tags”, vol. 1, pp. 52-73, 2006.
  • [1]
    P. Hawrylak, L. Mats, J. T. Cain, A. Jones, S. Tung, and M. Mickle, “Ultra Low-Power Computing Systems for Wireless Devices”, vol. 1, pp. 1-10, 2006.

Conference Proceedings

  • [1]
    M. Li, P. Hawrylak, and J. Hale, “Combining OpenCL and MPI to Support Heterogeneous Computing on a Cluster”, in Proceedings of the Practice and Experience in Advanced Research Computing on Rise of the Machines (Learning), 2019, p. 5:1-.
  • [1]
    P. Hawrylak, G. Louthan, J. Hale, and M. Papa, “Practical Cyber-Security Solutions for the Science DMZ”, in Proceedings of the Practice and Experience in Advanced Research Computing on Rise of the Machines (Learning), 2019, p. 50:1-.
  • W. Nichols, P. Hawrylak, J. Hale, and M. Papa, “Methodology to Estimate Attack Graph System State from a Simulation of a Nuclear Research Reactor,” in 2018 Resilience Week (RWS), 2018, pp. 84–87.

  • W. Nichols, Z. Hill, P. Hawrylak, J. Hale, and M. Papa, “Automatic Generation of Attack Scripts from Attack Graphs,” in 2018 1st International Conference on Data Intelligence and Security (ICDIS), 2018, pp. 267–274.

  • R. Raval, A. Maskus, B. Saltmiras, M. Dunn, P. Hawrylak, and J. Hale, “Competitive Learning Environment for Cyber-Physical System Security Experimentation,” in 2018 1st International Conference on Data Intelligence and Security (ICDIS), 2018, pp. 211–218.

  • [1]
    “Time delay tags for commercial ground penetrating radars”, in 2018 IEEE Radar Conference (RadarConf18), 2018, pp. 1466-1471.
  • [1]
    Z. Hill, S. Chen, D. Wall, M. Papa, J. Hale, and P. Hawrylak, “Simulation and Analysis Framework for Cyber-physical Systems”, in Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017, pp. 7:1–7:4.
  • [1]
    P. Hawrylak, J. Hale, and M. Papa, “Undergraduate Educational Pathways for Developing a High-Performance Computing Workforce”, in Proceedings of the Practice and Experience in Advanced Research Computing 2017 on Sustainability, Success and Impact, 2017, pp. 53:1–53:4.
  • [1]
    Z. Hill, W. Nichols, M. Papa, J. Hale, and P. Hawrylak, “Verifying attack graphs through simulation”, in 2017 Resilience Week (RWS), 2017, pp. 64-67.
  • [1]
    W. Nichols, P. Hawrylak, J. Hale, and M. Papa, “Introducing Priority into Hybrid Attack Graphs”, in Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017, pp. 12:1–12:4.
  • [1]
    B. Smith, W. Caruthers, D. Stewart, P. Hawrylak, and J. Hale, “Network Modeling for Security Analytics”, in Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016, pp. 22:1–22:4.
  • [1]
    K. Cook, T. Shaw, P. Hawrylak, and J. Hale, “Scalable Attack Graph Generation”, in Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016, pp. 21:1–21:4.
  • Chris Reynolds, Charles Bales, Will Nichols, Casey Strong, John Hale, Mauricio Papa, Peter J. Hawrylak, “Cyber-Security Experimentation Platform for Instrumentation and Control Systems in a Nuclear Reactor,” Advances in Nuclear Nonproliferation Technology & Policy Conference, Sept. 25-30, 2016, Santa Fe, NM, US., 4 pages.

  • [1]
    “HydroSense: A self-powered wireless device for monitoring water usage in hotel showers”, in Global Humanitarian Technology Conference (GHTC), 2015 IEEE, 2015, pp. 314-320.
  • [1]
    G. Louthan, M. Haney, P. Hardwicke, P. Hawrylak, and J. Hale, “Hybrid Extensions for Stateful Attack Graphs”, in Proceedings of the 9th Annual Cyber and Information Security Research Conference, 2014, pp. 101–104.
  • [1]
    J. Nivethan, M. Papa, and P. Hawrylak, “Modeling and Simulation of Electric Power Substation Employing an IEC 61850 Network”, in Proceedings of the 9th Annual Cyber and Information Security Research Conference, 2014, pp. 89–92.
  • [1]
    “Modular Actution Systems: A Scalable Solution for Delivering Robotic Performance”, in Proceeding of the Robot Makers Workshop: The Future of Digital Rapid Design and Fabrication of Robots (RoMa), Robotics: Science and Systems Conference, 2014, pp. 1–2.
  • [1]
    J. Nivethan, M. Papa, and P. Hawrylak, “Estimating Link Availability and Timing Delays in Ethernet-based Networks”, in Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, 2013, pp. 46:1–46:4.
  • [1]
    M. Butler, S. Reed, P. Hawrylak, and J. Hale, “Implementing Graceful RFID Privilege Reduction”, in Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, 2013, pp. 54:1–54:4.
  • [1]
    P. Hawrylak, M. Haney, M. Papa, and J. Hale, “Using hybrid attack graphs to model cyber-physical attacks in the Smart Grid”, in Resilient Control Systems (ISRCS), 2012 5th International Symposium on, 2012, pp. 161-164.
  • [1]
    M. Butler, P. Hawrylak, and J. Hale, “Graceful Privilege Reduction in RFID Security”, in Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, 2011, pp. 47:1–47:1.
  • [1]
    G. Louthan, P. Hardwicke, P. Hawrylak, and J. Hale, “Toward Hybrid Attack Dependency Graphs”, in Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, 2011, pp. 62:1–62:1.
  • [1]
    Y. Sun, P. Hawrylak, and M. Mickle, “Application of ICA in Collision Resolution for Passive RFID Communication”, 2009, pp. 1292-1297.
  • [1]
    P. Hawrylak, A. Ogirala, J. Cain, and M. Mickle, “Automated Test System for ISO 18000-7 – Active RFID”, in RFID, 2008 IEEE International Conference on, 2008, pp. 9-18.
  • [1]
    L. Mats, P. Hawrylak, and M. Mickle, “In-Situ characterization of passive rfid tag performance at absolute minimum power levels”, in Antennas and Propagation Society International Symposium, 2007 IEEE, 2007, pp. 2741-2744.

Book Chapters

  • P. Hawrylak and J. Hale, “Medical Data Privacy Handbook,” A. Gkoulalas-Divanis and G. Loukides, Eds. Springer International Publishing, 2015, pp. 549–567.

  • P. Hawrylak and J. Hale, “The use of Body-Area Networks and Radio Frequency Identification in Healthcare,” in Encyclopedia of Information Science and Technology, no. 3rd Edition, M. Khosrow-Pour, Ed. IGI Global, 2015, pp. 6318–6326.

  • Hawrylak, Peter et al. “The Access of Things: Spatial Access Control For.” Handbook of Research on Progressive Trends in Wireless Communications and Networking (2014): 189. Print.

  • [1]
    P. Hawrylak, S. Reed, M. Butler, and J. Hale, “The Access of Things: Spatial Access Control for the Internet of Things”, in Handbook of Research on Progressive Trends in Wireless Communications and Networking, IGI Global, 2014, pp. 189-207.
  • [1]
    C. Hart and P. Hawrylak, “Using Radio Frequency Identification Technology to Store Patients’ Medical Information”, in Handbook of Research on Patient Safety and Quality Care through Health Informatics, IGI Global, 2014, pp. 159-178.
  • [1]
    P. Hawrylak, J. Nivethan, and M. Papa, “Automating Electric Substations Using IEC 61850”, in Optimization and Security Challenges in Smart Power Grids, Springer Berlin Heidelberg, 2013, pp. 117-140.
  • [1]
    M. Brundage, A. Mavridou, J. Johnson, M. Papa, and P. Hawrylak, “Distributed monitoring: A framework for securing data acquisition”, Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection, 2013, pp. 144-167.
  • [1]
    P. Hawrylak, C. Hartney, M. Haney, J. Hamm, and J. Hale, “Techniques to model and derive a cyber-attacker’s intelligence”, Efficiency and Scalability Methods for Computational Intellect, 2013, pp. 162-180.
  • Hawrylak, Peter et al. “Using Hybrid Attack Graphs to Model and Analyze Attacks against the Critical Information Infrastructure.” Critical Information Infrastructure Protection and Resilience in the ICT Sector (2013): 173. Print.

  • [1]
    P. Hawrylak, A. Ogirala, B. Norman, J. Rajgopal, and M. Mickle, “Enabling Real-Time Management and Visibility with RFID”, in Management Engineering for Effective Healthcare Delivery: Principles and Applications, IGI Global, 2012, pp. 172-190.
  • [1]
    P. Hawrylak, N. Schimke, J. Hale, and M. Papa, “RFID in E-Health: Technology, Implementation”, Telemedicine and E-Health Services, Policies, and Applications: Advancements and Developments: Advancements and Developments, 2012, p. 347.
  • [1]
    P. Hawrylak, N. Schimke, J. Hale, and M. Papa, “RFID in E-Health: Technology, Implementation, and Security Issues”, in Telemedicine and E-Health Services, Policies and Applications: Advancements and Developments, IGI Global, 2012, pp. 347-368.
  • [1]
    P. Hawrylak, J. Hale, and M. Papa, “Security Issues for ISO 18000-6 Type C RFID: Identification and Solutions”, in Developments in Wireless Network Prototyping, Design and Deployment: Future Generations, IGI Global, 2012, pp. 38-55.
  • G. Louthan, J. Daily, J. Hale, M. Papa, and P. Hawrylak, “Attack Graphs and Scenario Driven Wireless Computer Network Defense,” to appear in Situational Awareness in Computer Network Defense: Principles, Methods and Applications, IGI Global, Hershey, PA, 2011.

  • G. Louthan, J. Daily, J. Hale, M. Papa, and P. Hawrylak, “Attack Graphs and Scenario Driven Wireless Computer Network Defense,” to appear in Situational Awareness in Computer Network Defense: Principles, Methods and Applications, IGI Global, Hershey, PA, 2011.

  • [1]
    P. Hawrylak, J. Cain, and M. Mickle, “Analysis Methods for Sensor Networks”, in Guide to Wireless Sensor Networks, Springer London, 2009, pp. 635-658.
  • [1]
    P. Hawrylak and M. Mickle, “EPC Gen-2 Standard for RFID”, in RFID and Sensor Networks: Architectures, Protocols, Security and Integrations, Taylor & Francis Group, CRC Press, 2009, pp. 97-123.
  • [1]
    M. Mickle, L. Mats, and P. Hawrylak, “Resolution and integration of HF and UHF”, in RFID Technology and Applications, Cambridge University Press, 2008, pp. 47-60.
  • [1]
    P. Hawrylak, J. T. Cain, and M. Mickle, “RFID Tags”, in The Internet of Things: from RFID to Pervasive Networked Systems, Taylor & Francis Group, 2008, pp. 1-32.
  • [1]
    S. Tung, “Layers of Security for Active RFID Tags”, in RFID Handbook: Applications, Technology, Security, and Privacy, CRC Press, Taylor and Francis Group, 2008, pp. 603-630.
  • [1]
    A. Jones, “Minimum Energy/Power Considerations”, in RFID Handbook: Applications, Technology, Security, and Privacy, CRC Press, Taylor and Francis Group, 2008, pp. 199-230.
  • [1]
    M. Mickle, L. Mats, and P. Hawrylak, “Physics and Geometry of RFID”, in RFID Technologies and Applications, Technology, Security, and Privacy, CRC Press, Taylor and Francis Group, 2008, pp. 3-16.

Courses Taught

  • Research and Dissertation
  • Computer Architecture
  • Advanced Hardware Architecture
  • Computer Engineering
  • Computer Hardware Techniques
  • Research and Thesis

Professional Affiliations

  • IEEE Computer Society
  • IEEE

Awards & Honors

  • Ted Williams Award
  • Zelimir Schmidt Award for Outstanding Researcher