google-plus
utulsa.edu

Peter Hawrylak PhD

Associate Professor of Electrical and Computer Engineering College of Engineering & Natural Sciences
Tandy School of Computer Science, Electrical and Computer Engineering
Rayzor Hall 1100 918-631-3277
peter-hawrylak@utulsa.edu
Curriculum Vitae [PDF]
faculty-photo

Biography

Peter J. Hawrylak, Ph.D. received the B.S. degree in computer engineering, the M.S. degree in electrical engineering, and the Ph.D. in electrical engineering from the University of Pittsburgh, Pittsburgh, PA, USA, in 2002, 2004, and 2006 respectively. He is an Associate Professor in the Department of Electrical and Computer Engineering, with a joint appointment in the Tandy School for Computer Science, at The University of Tulsa, Tulsa, OK, USA. He has published more than 40 publications and holds 13 patents in the radio frequency identification (RFID), energy harvesting, and cyber-security areas. His research interests include RFID (radio frequency identification), security for low-power wireless devices, Internet of Things (IoT) applications, and digital design. Dr. Hawrylak is a member of the IEEE and IEEE Computer Society, and is currently the Secretary of the Tulsa Section of the IEEE. He served as chair of the RFID Experts Group (REG) of Association for Automatic Identification and Mobility (AIM) in 2012-2013. Peter received AIM Inc.’s Ted Williams Award in 2015 for his contributions to the RFID industry. Dr. Hawrylak is the Publication Chair of the International IEEE RFID Conference, and is the Editor-in-Chief of the International Journal of Radio Frequency Identification Technology and Applications (IJRFITA) journal published by InderScience Publishers, which focuses on the application and development of RFID technology. Dr. Hawrylak is also the Editor-in-Cheif of the IEEE RFID Virtual Journal which provides a single source for high-quality and high-impact publications in the areas of RFID and Internet of Things (IoT).


Ph.D., University of Pittsburgh
M.S., University of Pittsburgh
B.S., University of Pittsburgh


Embedded Systems
Radio Frequency Identification
Internet of Things
Wireless Systems
Embedded System Security
Wireless System Security
Digital Hardware Design
Computer Architecture

Computer Organization
Digital Logic
Computer Architecture
Digital Hardware Design and Implementation
Radio Frequency Identification


The following may be selected publications rather than a comprehensive list.

Journal Articles


P. Hawrylak, S. Reed, M. Butler, and J. Hale, “The Access of Things: Spatial Access Control for,” Handbook of Research on Progressive Trends in Wireless Communications and Networking, p. 189, 2014.

A. Ogirala, P. Hawrylak, and M. Mickle, “Interoperability Verification in ISO 18000-7 Active RFID Systems: Experimental Setup and Results,” Wireless Personal Communications, vol. 68, no. 3, pp. 619–635, 2013.

P. Hawrylak, C. Hartney, M. Papa, and J. Hale, “Using Hybrid Attack Graphs to Model and Analyze Attacks against the Critical Information Infrastructure,” Critical Information Infrastructure Protection and Resilience in the ICT Sector, p. 173, 2013.

P. Hawrylak, N. Schimke, J. Hale, and M. Papa, “Security Risks Associated with Radio Frequency Identification in Medical Environments,” Journal of Medical Systems Special Issue on Radio Frequency Identification in the Healthcare Sector: Applications, Business Models, Drivers and Challenges, vol. 36, no. 6, pp. 3491–3505, 2012.

A. Ogirala, P. Hawrylak, and M. Mickle, “Interoperability Test Methodology for ISO 18000-7 Active RFID,” Wireless Personal Communications, vol. 65, no. 2, pp. 253–271, 2012.

P. Hawrylak and C. Hart, “Using Radio Frequency Identification (RFID) Tags to Store Medical Information Needed by First Responders: Data Format, Privacy, and Security,” International Journal on Computational Methods and Algorithms in Medicine, vol. 3, no. 3, pp. 10–26, 2012.

P. Hawrylak, N. Schimke, J. Hale, and M. Papa, “Security risks associated with radio frequency identification in medical environments,” Journal of medical systems, vol. 36, no. 6, pp. 3491–3505, 2012.

P. Hawrylak, N. Schimke, J. Hale, and M. Papa, “RFID in E-Health: Technology, Implementation,” Telemedicine and E-Health Services, Policies, and Applications: Advancements and Developments: Advancements and Developments, p. 347, 2012.

A. Ogirala, V. Sai, A. Kamrani, J. Rajgopal, B. Norman, P. Hawrylak, and M. Mickle, “Ultra High-Speed and Low-Power Flexible Architecture Using State Transition Matrix Model For EPC Gen-2 Communication Protocol Processor,” International Journal of Modelling and Simulation, vol. 32, no. 6, pp. 198–205, 2012.

S. Ravilla, A. Ogirala, A. Murari, P. Hawrylak, and M. Mickle, “Anti-collision policy for RFID systems: fast predict tags in field algorithm,” International Journal of Radio Frequency Identification Technology and Applications, vol. 3, no. 3, pp. 215–228, 2011.

A. Ogirala, J. Stachel, P. Hawrylak, D. Rong, R. Yalamanchili, M. Rothfuss, X. Liu, S. Saba, and M. Mickle, “Impact of ISO 18000 Series RF Signals On CRMDs: A Unified Approach,” International Journal of Modelling and Simulation, vol. 31, no. 3, pp. 250–258, 2011.

L. Maillart, A. Kamrani, B. Norman, J. Rajgopal, and P. Hawrylak, “Optimizing RFID tag-inventorying algorithms,” IIE Transactions, vol. 42, no. 9, pp. 690–702, 2010.

Y. Sun, P. Hawrylak, Z.-H. Mao, and M. Mickle, “Collision resolution in ISO 18000-6c passive RFID,” Applied Computational Electromagnetics Society (ACES) Journal, Special Issue: Computational and Experimental Techniques for RFID Systems and Applications, vol. 25, no. 3, pp. 239–262, 2010.

A. Jones, S. Dontharaju, S. Tung, L. Mats, P. Hawrylak, R. Hoare, J. Cain, and M. Mickle, “Radio Frequency Identification Prototyping,” ACM Trans. Des. Autom. Electron. Syst., vol. 13, no. 2, pp. 29:1–29:22, 2008.

P. Hawrylak, J. T. Cain, and M. Mickle, “Analytic modelling methodology for analysis of energy consumption for ISO 18000-7 RFID networks,” International Journal of Radio Frequency Identification Technology and Applications, vol. 1, no. 4, pp. 371–400, 2007.

P. Hawrylak, L. Mats, J. T. Cain, A. Jones, S. Tung, and M. Mickle, “Ultra Low-Power Computing Systems for Wireless Devices,” International Review on Computers and Software, vol. 1, no. 1, pp. 1–10, 2006.

A. Jones, S. Dontharaju, S. Tung, P. Hawrylak, L. Mats, R. Hoare, J. Cain, and M. Mickle, “Passive active radio frequency identification tags,” International Journal of Radio Frequency Identification Technology and Applications, vol. 1, no. 1, pp. 52–73, 2006.

Book Chapters


P. Hawrylak and J. Hale, “Medical Data Privacy Handbook,” A. Gkoulalas-Divanis and G. Loukides, Eds. Springer International Publishing, 2015, pp. 549–567.

P. Hawrylak and J. Hale, “The use of Body-Area Networks and Radio Frequency Identification in Healthcare,” in Encyclopedia of Information Science and Technology, no. 3rd Edition, M. Khosrow-Pour, Ed. IGI Global, 2015, pp. 6318–6326.

C. Hart and P. Hawrylak, “Using Radio Frequency Identification Technology to Store Patients’ Medical Information,” in Handbook of Research on Patient Safety and Quality Care through Health Informatics, D. R.-L. V. Michell, S. Gulliver, and W. Currie, Eds. IGI Global, 2014, pp. 159–178.

P. Hawrylak, S. Reed, M. Butler, and J. Hale, “The Access of Things: Spatial Access Control for the Internet of Things,” in Handbook of Research on Progressive Trends in Wireless Communications and Networking, M. A. Matin, Ed. IGI Global, 2014, pp. 189–207.

P. Hawrylak, C. Hartney, M. Haney, J. Hamm, and J. Hale, “Techniques to model and derive a cyber-attacker’s intelligence,” B. Igelnik and J. Zurada, Eds. Efficiency and Scalability Methods for Computational Intellect, 2013, pp. 162–180.

M. Brundage, A. Mavridou, J. Johnson, M. Papa, and P. Hawrylak, “Distributed monitoring: A framework for securing data acquisition,” P. Théron and S. Bologna, Eds. Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection, 2013, pp. 144–167.

P. Hawrylak, J. Nivethan, and M. Papa, “Automating Electric Substations Using IEC 61850,” in Optimization and Security Challenges in Smart Power Grids, V. Pappu, M. Carvalho, and P. Pardalos, Eds. Springer Berlin Heidelberg, 2013, pp. 117–140.

P. Hawrylak, N. Schimke, J. Hale, and M. Papa, “RFID in E-Health: Technology, Implementation, and Security Issues,” in Telemedicine and E-Health Services, Policies and Applications: Advancements and Developments, I. de la T. D. Joel J. P. C. Rodrigues and B. S. de Abajo, Eds. IGI Global, 2012, pp. 347–368.

P. Hawrylak, A. Ogirala, B. Norman, J. Rajgopal, and M. Mickle, “Enabling Real-Time Management and Visibility with RFID,” in Management Engineering for Effective Healthcare Delivery: Principles and Applications, A. Kolker and P. Story, Eds. IGI Global, 2012, pp. 172–190.

P. Hawrylak, J. Hale, and M. Papa, “Security Issues for ISO 18000-6 Type C RFID: Identification and Solutions,” in Developments in Wireless Network Prototyping, Design and Deployment: Future Generations, M. A. Matin, Ed. IGI Global, 2012, pp. 38–55.

G. Louthan, J. Daily, J. Hale, M. Papa, and P. Hawrylak, “Attack Graphs and Scenario Driven Wireless Computer Network Defense,” to appear in Situational Awareness in Computer Network Defense: Principles, Methods and Applications, IGI Global, Hershey, PA, 2011.

P. Hawrylak, J. Cain, and M. Mickle, “Analysis Methods for Sensor Networks,” in Guide to Wireless Sensor Networks, S. C. Misra, I. Woungang, and S. Misra, Eds. Springer London, 2009, pp. 635–658.

P. Hawrylak and M. Mickle, “EPC Gen-2 Standard for RFID,” in RFID and Sensor Networks: Architectures, Protocols, Security and Integrations, L. T. Y. Y. Zhang and J. Chen, Eds. Taylor & Francis Group, CRC Press, 2009, pp. 97–123.

M. Mickle, L. Mats, and P. Hawrylak, “Physics and Geometry of RFID,” in RFID Technologies and Applications, Technology, Security, and Privacy, S. Ahson and M. Ilyas, Eds. CRC Press, Taylor and Francis Group, 2008, pp. 3–16.

A. Jones, G. Dhanabalan, S. Dontharaju, S. Tung, P. Hawrylak, L. Mats, M. Mickle, and J. T. Cain, “Minimum Energy/Power Considerations,” in RFID Handbook: Applications, Technology, Security, and Privacy, S. Ahson and M. Ilyas, Eds. CRC Press, Taylor and Francis Group, 2008, pp. 199–230.

S. Tung, S. Dontharaju, L. Mats, P. Hawrylak, M. Mickle, J. T. Cain, and A. Jones, “Layers of Security for Active RFID Tags,” in RFID Handbook: Applications, Technology, Security, and Privacy, S. Ahson and M. Ilyas, Eds. CRC Press, Taylor and Francis Group, 2008, pp. 603–630.

P. Hawrylak, J. T. Cain, and M. Mickle, “RFID Tags,” in The Internet of Things: from RFID to Pervasive Networked Systems, Y. Z. L. Yan, L. T. Yang, and H. Ning, Eds. Taylor & Francis Group, 2008, pp. 1–32.

M. Mickle, L. Mats, and P. Hawrylak, “Resolution and integration of HF and UHF,” in RFID Technology and Applications, S. E. S. S. B. Miles and J. R. Williams, Eds. Cambridge University Press, 2008, pp. 47–60.

Conference Proceedings


P. Hawrylak, J. Hale, and M. Papa, “Undergraduate Educational Pathways for Developing a High-Performance Computing Workforce,” in Proceedings of the Practice and Experience in Advanced Research Computing 2017 on Sustainability, Success and Impact, 2017, pp. 53:1–53:4.

Z. Hill, S. Chen, D. Wall, M. Papa, J. Hale, and P. Hawrylak, “Simulation and Analysis Framework for Cyber-physical Systems,” in Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017, pp. 7:1–7:4.

W. Nichols, P. Hawrylak, J. Hale, and M. Papa, “Introducing Priority into Hybrid Attack Graphs,” in Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017, pp. 12:1–12:4.

Chris Reynolds, Charles Bales, Will Nichols, Casey Strong, John Hale, Mauricio Papa, Peter J. Hawrylak, “Cyber-Security Experimentation Platform for Instrumentation and Control Systems in a Nuclear Reactor,” Advances in Nuclear Nonproliferation Technology & Policy Conference, Sept. 25-30, 2016, Santa Fe, NM, US., 4 pages.

B. Smith, W. Caruthers, D. Stewart, P. Hawrylak, and J. Hale, “Network Modeling for Security Analytics,” in Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016, pp. 22:1–22:4.

K. Cook, T. Shaw, P. Hawrylak, and J. Hale, “Scalable Attack Graph Generation,” in Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016, pp. 21:1–21:4.

P. Hawrylak, W. Nichols, X. Li, T. Johannes, R. DeCook, K. Mongold, C. Cornell, L. Flint, and A. Singh, “HydroSense: A self-powered wireless device for monitoring water usage in hotel showers,” in Global Humanitarian Technology Conference (GHTC), 2015 IEEE, 2015, pp. 314–320.

G. Louthan, M. Haney, P. Hardwicke, P. Hawrylak, and J. Hale, “Hybrid Extensions for Stateful Attack Graphs,” in Proceedings of the 9th Annual Cyber and Information Security Research Conference, 2014, pp. 101–104.

J. Nivethan, M. Papa, and P. Hawrylak, “Modeling and Simulation of Electric Power Substation Employing an IEC 61850 Network,” in Proceedings of the 9th Annual Cyber and Information Security Research Conference, 2014, pp. 89–92.

J. Schultz and P. Hawrylak, “Modular Actution Systems: A Scalable Solution for Delivering Robotic Performance,” in Proceeding of the Robot Makers Workshop: The Future of Digital Rapid Design and Fabrication of Robots (RoMa), Robotics: Science and Systems Conference, 2014, pp. 1–2.

M. Butler, S. Reed, P. Hawrylak, and J. Hale, “Implementing Graceful RFID Privilege Reduction,” in Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, 2013, pp. 54:1–54:4.

J. Nivethan, M. Papa, and P. Hawrylak, “Estimating Link Availability and Timing Delays in Ethernet-based Networks,” in Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, 2013, pp. 46:1–46:4.

P. J. Hawrylak, M. Haney, M. Papa, and J. Hale, “Using hybrid attack graphs to model cyber-physical attacks in the Smart Grid,” in Resilient Control Systems (ISRCS), 2012 5th International Symposium on, 2012, pp. 161–164.

M. Butler, P. Hawrylak, and J. Hale, “Graceful Privilege Reduction in RFID Security,” in Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, 2011, pp. 47:1–47:1.

G. Louthan, P. Hardwicke, P. Hawrylak, and J. Hale, “Toward Hybrid Attack Dependency Graphs,” in Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, 2011, pp. 62:1–62:1.

Y. Sun, P. Hawrylak, and M. Mickle, “Application of ICA in Collision Resolution for Passive RFID Communication,” 2009, pp. 1292–1297.

P. J. Hawrylak, A. Ogirala, J. T. Cain, and M. H. Mickle, “Automated Test System for ISO 18000-7 - Active RFID,” in RFID, 2008 IEEE International Conference on, 2008, pp. 9–18.

L. Mats, P. J. Hawrylak, and M. H. Mickle, “In-Situ characterization of passive rfid tag performance at absolute minimum power levels,” in Antennas and Propagation Society International Symposium, 2007 IEEE, 2007, pp. 2741–2744.


IEEE Computer Society
IEEE


EE 2063 Introduction to Computer Organization And Microprocessors
EE 4163 Computer Hardware Techniques
EE 4523 Radio Frequency Identification TechNology and Applications
EE 4863 Special Topics
EE 7063 Computer Engineering
EE 7981 Research and Thesis