Yih-Chun Hu

If you made any changes in Pure these will be visible here soon.

Research Output

2000

Caching strategies in on-demand routing protocols for wireless ad hoc networks

Hu, Y. C. & Johnson, D. B., Dec 1 2000, p. 231-242. 12 p.

Research output: Contribution to conferencePaper

2001

Implicit source routes for on-demand ad hoc network routing

Hu, Y-C. & Johnson, D. B., Dec 1 2001, Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing: MobiHoc 2001. p. 1-10 10 p. (Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing: MobiHoc 2001).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2002

Ariadne: A secure on-demand routing protocol for ad hoc networks

Hu, Y. C., Perrig, A. & Johnson, D. B., 2002, p. 12-23. 12 p.

Research output: Contribution to conferencePaper

Design and demonstration of live audio and video over multihop wireless ad hoc networks

Hu, Y. C. & Johnson, D. B., Dec 1 2002, p. 1211-1216. 6 p.

Research output: Contribution to conferencePaper

Ensuring Cache Freshness in On-Demand Ad Hoc Network Routing Protocols

Hu, Y. C. & Johnson, D. B., Dec 1 2002, Proceedings of the ACM International Workshop on Principles of Mobile Commerce. p. 25-30 6 p. (Proceedings of the ACM International Workshop on Principles of Mobile Commerce).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks

Hu, Y. C., Johnson, D. B. & Perrig, A., Jan 1 2002, Proceedings - 4th IEEE Workshop on Mobile Computing Systems and Applications, WMCSA 2002. Institute of Electrical and Electronics Engineers Inc., p. 3-13 11 p. 1017480. (Proceedings - 4th IEEE Workshop on Mobile Computing Systems and Applications, WMCSA 2002).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2003

Design and evaluation of a metropolitan area multitier wireless ad hoc network architecture

Jetcheva, J. G., Hu, Y. C., PalChaudhuri, S., Saha, A. K. & Johnson, D. B., Jan 1 2003, Proceedings - 5th IEEE Workshop on Mobile Computing Systems and Applications, WMCSA 2003. Institute of Electrical and Electronics Engineers Inc., p. 32-43 12 p. 1240765. (Proceedings - 5th IEEE Workshop on Mobile Computing Systems and Applications, WMCSA 2003).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Packet leashes: A defense against wormhole attacks in wireless networks

Hu, Y. C., Perrig, A. & Johnson, D. B., Sep 1 2003, In : Proceedings - IEEE INFOCOM. 3, p. 1976-1986 11 p.

Research output: Contribution to journalConference article

Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols

Hu, Y. C., Perrig, A. & Johnson, D. B., Jan 1 2003, Proceedings of the Workshop on Wireless Security. Association for Computing Machinery, p. 30-40 11 p. (Proceedings of the Workshop on Wireless Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks

Hu, Y. C., Johnson, D. B. & Perrig, A., Jul 2003, In : Ad Hoc Networks. 1, 1, p. 175-192 18 p.

Research output: Contribution to journalArticle

2004

A survey of secure wireless ad hoc routing

Hu, Y. C. & Perrig, A., May 1 2004, In : IEEE Security and Privacy. 2, 3, p. 28-39 12 p.

Research output: Contribution to journalReview article

Exploiting congestion information in network and higher layer protocols in multihop wireless ad hoc networks

Hu, Y. C. & Johnson, D. B., Jun 1 2004, p. 301-310. 10 p.

Research output: Contribution to conferencePaper

Friends Troubleshooting Network: Towards privacy-preserving, automatic troubleshooting

Wang, H. J., Hu, Y. C., Yuan, C., Zhang, Z. & Wang, Y. M., Dec 1 2004, In : Lecture Notes in Computer Science. 3279, p. 184-194 11 p.

Research output: Contribution to journalConference article

Securing quality-of-service route discovery in on-demand routing for ad hoc networks

Hu, Y. C. & Johnson, D. B., Dec 1 2004, Proceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN'04. Swarup, V. & Setia, S. (eds.). p. 106-117 12 p. (Proceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN'04).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

SPV: Secure path vector routing for securing BGP

Hu, Y. C., Perrig, A. & Sirbu, M., Dec 1 2004, In : Computer Communication Review. 34, 4, p. 179-192 14 p.

Research output: Contribution to journalConference article

2005

Ariadne: A secure on-demand routing protocol for ad hoc networks

Hu, Y. C., Perrig, A. & Johnson, D. B., Jan 1 2005, In : Wireless Networks. 11, 1-2, p. 21-38 18 p.

Research output: Contribution to journalArticle

Efficient constructions for one-way hash chains

Hu, Y. C., Jakobsson, M. & Perrig, A., Oct 17 2005, In : Lecture Notes in Computer Science. 3531, p. 423-441 19 p.

Research output: Contribution to journalConference article

2006

Wormhole attacks in wireless networks

Hu, Y. C. & Perrig, A., Feb 1 2006, In : IEEE Journal on Selected Areas in Communications. 24, 2, p. 370-379 10 p.

Research output: Contribution to journalArticle

2007

Cross-layer jamming detection and mitigation in wireless broadcast networks

Chiang, J. T. & Hu, Y. C., Dec 1 2007, MobiCom'07: Proceedings of the Thirteenth ACM International Conference on Mobile Computing and Networking. p. 346-349 4 p. (Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Portcullis: Protecting connection setup from denial-of-capability attacks

Parno, B., Wendlandt, D., Shi, E., Perrig, A., Maggs, B. & Hu, Y. C., Oct 1 2007, In : Computer Communication Review. 37, 4, p. 289-300 12 p.

Research output: Contribution to journalArticle

Portcullis: Protecting connection setup from denial-of-capability attacks

Parno, B., Wendlandt, D., Shi, E., Perrig, A., Maggs, B. & Hu, Y. C., Dec 17 2007, ACM SIGCOMM 2007: Conference on Computer Communications. p. 289-300 12 p. (ACM SIGCOMM 2007: Conference on Computer Communications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Preserving location privacy in wireless LANs

Jiang, T., Wang, H. J. & Hu, Y-C., Oct 29 2007, MobiSys'07: Proceedings of the 5th International Conference on Mobile Systems, Applications and Services. p. 246-257 12 p. (MobiSys'07: Proceedings of the 5th International Conference on Mobile Systems, Applications and Services).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2008

Dynamic jamming mitigation for wireless broadcast networks

Chiang, J. T. & Hu, Y-C., Sep 15 2008, INFOCOM 2008: 27th IEEE Communications Society Conference on Computer Communications. p. 1885-1893 9 p. 4509772. (Proceedings - IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

SEAR: A secure efficient ad hoc on demand routing protocol for wireless networks

Li, Q., Hu, Y. C., Zhao, M., Perrig, A., Walker, J. & Trappe, W., Dec 1 2008, Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS '08. p. 201-204 4 p. (Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS '08).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security certificate revocation list distribution for vanet

Laberteaux, K. P., Haas, J. J. & Hu, Y. C., Dec 1 2008, VANET'08 - Proceedings of the 5th ACM International Workshop on VehiculAr Inter-NETworking. p. 88-89 2 p. (VANET'08 - Proceedings of the 5th ACM International Workshop on VehiculAr Inter-NETworking).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2009

Data Security in Vehicular Communication Networks

Weimerskirch, A., Haas, J. J., Hu, Y. C. & Laberteaux, K. P., Nov 23 2009, VANET: Vehicular Applications and Inter-Networking Technologies. John Wiley and Sons Ltd, p. 299-363 65 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Design and analysis of a lightweight certificate revocation mechanism for VANET

Haas, J. J., Hu, Y. C. & Laberteaux, K. P., Nov 9 2009, VANET'09 - Proceedings of the 6th ACM International Workshop on VehiculAr Inter-NETworking. p. 89-98 10 p. 1614285. (VANET'09 - Proceedings of the 6th ACM International Workshop on VehiculAr Inter-NETworking).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fundamental limits on secure clock synchronization and man-in-the-middle detection in fixed wireless networks

Chiang, J. T., Haas, J. J., Hu, Y-C., Kumar, P. R. & Choi, J., Oct 12 2009, IEEE INFOCOM 2009 - The 28th Conference on Computer Communications. p. 1962-1970 9 p. 5062118. (Proceedings - IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Malicious or selfish? Analysis of carrier sense misbehavior in IEEE 802.11 WLAN

Park, K. J., Choi, J., Kang, K. & Hu, Y. C., Dec 1 2009, Quality of Service in Heterogeneous Networks - 6th Int. ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2009 and AAA-IDEA 2009, Proceedings. p. 351-362 12 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 22 LNICST).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Real-world VANET security protocol performance

Haas, J. J., Hu, Y. C. & Laberteaux, K. P., Dec 1 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference. 5426188. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

SEAR: A secure efficient ad hoc on demand routing protocol for wireless networks

Li, Q., Zhao, M., Walker, J., Hu, Y-C., Perrig, A. & Trappe, W., Jan 1 2009, In : Security and Communication Networks. 2, 4, p. 325-340 16 p.

Research output: Contribution to journalArticle

Secure and precise location verification using distance bounding and simultaneous multilateration

Chiang, J. T., Haas, J. J. & Hu, Y-C., Sep 21 2009, Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09. p. 181-191 11 p. (Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Secure unified cellular ad hoc network routing

Haas, J. J. & Hu, Y-C., Dec 1 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference. 5425789. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2010

A study on false channel condition reporting attacks in wireless networks

Kim, D. & Hu, Y-C., Dec 1 2010, Security and Privacy in Communication Networks - 6th Iternational ICST Conference, SecureComm 2010, Proceedings. p. 107-124 18 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 50 LNICST).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Communication requirements for crash avoidance

Haas, J. J. & Hu, Y. C., Jan 1 2010, Proceedings of the 7th ACM Int. Workshop on VehiculAr InterNETworking, VANET '10, Co-located with MobiCom'10 and 11th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc'10. Association for Computing Machinery, p. 1-10 10 p. (Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

CRAFT: A new secure congestion control architecture

Kim, D., Chiang, J. T., Hu, Y-C., Perrig, A. & Kumar, P. R., Dec 16 2010, CCS'10 - Proceedings of the 17th ACM Conference on Computer and Communications Security. p. 705-707 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Partial deafness: A novel denial-of-service attack in 802.11 networks

Choi, J., Chiang, J. T., Kim, D. & Hu, Y. C., Dec 1 2010, Security and Privacy in Communication Networks - 6th Iternational ICST Conference, SecureComm 2010, Proceedings. p. 235-252 18 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 50 LNICST).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Secure network-wide clock synchronization in wireless sensor networks

Robles, R. S., Haas, J. J., Chiang, J. T., Hu, Y. C. & Kumar, P. R., Dec 1 2010, 2010 49th IEEE Conference on Decision and Control, CDC 2010. p. 5616-5621 6 p. 5717746. (Proceedings of the IEEE Conference on Decision and Control).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Secure topology discovery through network-wide clock synchronization

Robles, R. S., Haas, J. J., Chiang, J. T., Hu, Y. C. & Kumar, P. R., Oct 29 2010, 2010 International Conference on Signal Processing and Communications, SPCOM 2010. 5560469. (2010 International Conference on Signal Processing and Communications, SPCOM 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

The impact of key assignment on VANET privacy

Haas, J. J., Hu, Y-C. & Laberteaux, K. P., Jan 1 2010, In : Security and Communication Networks. 3, 2-3, p. 233-249 17 p.

Research output: Contribution to journalArticle

2011

A lightweight deterministic MAC protocol using low cross-correlation sequences

Kim, D., Esteki, D. J., Hu, Y. C. & Kumar, P. R., Dec 1 2011, 2011 IEEE Global Telecommunications Conference, GLOBECOM 2011. 6134489. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bankrupting the jammer

Ashraf, F., Hu, Y-C. & Kravets, R. H., Sep 20 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2011. p. 149-151 3 p. 5984887. (2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cross-layer jamming detection and mitigation in wireless broadcast networks

Chiang, J. T. & Hu, Y. C., Feb 1 2011, In : IEEE/ACM Transactions on Networking. 19, 1, p. 286-298 13 p., 5575381.

Research output: Contribution to journalArticle

Efficient certificate revocation list organization and distribution

Haas, J. J., Hu, Y-C. & Laberteaux, K. P., Mar 1 2011, In : IEEE Journal on Selected Areas in Communications. 29, 3, p. 595-604 10 p., 5719271.

Research output: Contribution to journalArticle

Low-cost mitigation of privacy loss due to radiometric identification

Haas, J. J., Hu, Y. C. & Laurenti, N., 2011, MobiCom'11 - Proceedings of the 17th Annual International Conference on Mobile Computing and Networking and Co-Located Workshops - VANET 2011 Workshop, VANET'11. p. 31-40 10 p. (Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Optimal physical carrier sense in wireless networks

Park, K. J., Choi, J., Hou, J. C., Hu, Y. C. & Lim, H., Jan 2011, In : Ad Hoc Networks. 9, 1, p. 16-27 12 p.

Research output: Contribution to journalArticle

Secure MAC-layer protocol for captive portals in wireless hotspots

Choi, J., Chang, S. Y., Ko, D. & Hu, Y. C., Sep 2 2011, 2011 IEEE International Conference on Communications, ICC 2011. 5963508. (IEEE International Conference on Communications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Short paper: A practical view of "mixing" identities in vehicular networks

Liu, B., Chiang, J. T., Haas, J. J. & Hu, Y-C., Aug 25 2011, WiSec'11 - Proceedings of the 4th ACM Conference on Wireless Network Security. p. 157-162 6 p. (WiSec'11 - Proceedings of the 4th ACM Conference on Wireless Network Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2012

Bankrupting the jammer in WSN

Ashraf, F., Hu, Y-C. & Kravets, R. H., Dec 1 2012, MASS 2012 - 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems. p. 317-325 9 p. 6502531. (MASS 2012 - 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution