Yih-Chun Hu

20002019
If you made any changes in Pure, your changes will be visible here soon.

Research Output 2000 2019

Article

A Clean Slate Approach to Secure Ad Hoc Wireless Networking-Open Unsynchronized Networks

Ponniah, J., Hu, Y-C. & Kumar, P. R., Mar 2017, In : IEEE Transactions on Control of Network Systems. 4, 1, p. 37-48 12 p., 7478115.

Research output: Contribution to journalArticle

Slate
Networking
Network protocols
Wireless Ad Hoc Networks
Wireless ad hoc networks

A clean slate approach to secure wireless networking

Ponniah, J., Hu, Y. C. & Kumar, P. R., Jan 1 2015, In : Foundations and Trends in Networking. 9, 1, p. 1-105 105 p.

Research output: Contribution to journalArticle

Slate
Network protocols
Wireless ad hoc networks
Communication systems

Ariadne: A secure on-demand routing protocol for ad hoc networks

Hu, Y. C., Perrig, A. & Johnson, D. B., Jan 1 2005, In : Wireless Networks. 11, 1-2, p. 21-38 18 p.

Research output: Contribution to journalArticle

Ad hoc networks
Routing protocols
Network routing

A study on false channel condition reporting attacks in wireless networks

Kim, D. & Hu, Y-C., May 2014, In : IEEE Transactions on Mobile Computing. 13, 5, p. 935-947 13 p., 6579605.

Research output: Contribution to journalArticle

Wireless networks
Network protocols
Feedback
Network performance
Managers

A System-Theoretic Clean Slate Approach to Provably Secure Ad-Hoc Wireless Networking

Ponniah, J., Hu, Y. C. & Kumar, P. R., Jun 2016, In : IEEE Transactions on Control of Network Systems. 3, 2, p. 206-217 12 p., 7100909.

Research output: Contribution to journalArticle

Slate
Networking
Network protocols
Vertex of a graph
Jamming

BGP with BGPsec: Attacks and Countermeasures

Li, Q., Liu, J., Hu, Y. C., Xu, M. & Wu, J., Jul 1 2019, In : IEEE Network. 33, 4, p. 194-200 7 p., 8594708.

Research output: Contribution to journalArticle

Network protocols
Internet

Convolution Attack on Frequency Hopping by Full-Duplex Radios

Jagadeesh, H. & Hu, Y. C., Jun 2019, In : IEEE Transactions on Vehicular Technology. 68, 6, p. 5642-5656 15 p., 8676089.

Research output: Contribution to journalArticle

Frequency Hopping
Frequency hopping
Radio receivers
Convolution
Frequency shift keying

Cross-layer jamming detection and mitigation in wireless broadcast networks

Chiang, J. T. & Hu, Y-C., Feb 1 2011, In : IEEE/ACM Transactions on Networking. 19, 1, p. 286-298 13 p., 5575381.

Research output: Contribution to journalArticle

Jamming
Wireless networks
Transmitters
MATLAB
Communication systems

Efficient certificate revocation list organization and distribution

Haas, J. J., Hu, Y-C. & Laberteaux, K. P., Mar 1 2011, In : IEEE Journal on Selected Areas in Communications. 29, 3, p. 595-604 10 p., 5719271.

Research output: Contribution to journalArticle

Vehicle to vehicle communications
Hardware
Bandwidth
Radio receivers
Communication

Optimal physical carrier sense in wireless networks

Park, K. J., Choi, J., Hou, J. C., Hu, Y-C. & Lim, H., Jan 1 2011, In : Ad Hoc Networks. 9, 1, p. 16-27 12 p.

Research output: Contribution to journalArticle

Wireless networks
Throughput
Medium access control
Parallel algorithms
Carrier sense multiple access

Portcullis: Protecting connection setup from denial-of-capability attacks

Parno, B., Wendlandt, D., Shi, E., Perrig, A., Maggs, B. & Hu, Y. C., Oct 1 2007, In : Computer Communication Review. 37, 4, p. 289-300 12 p.

Research output: Contribution to journalArticle

Telecommunication links
Topology
Bandwidth
Denial-of-service attack

Power-positive networking: Wireless-charging-based networking to protect energy against battery DoS attacks

Chang, S. Y., Kumar, S. L. S., Hu, Y. C. & Park, Y., Jan 1 2019, In : ACM Transactions on Sensor Networks. 15, 3, 27.

Research output: Contribution to journalArticle

Embedded systems
Data transfer
Authentication
Availability
Hardware

Practical Proactive DDoS-Attack Mitigation via Endpoint-Driven In-Network Traffic Control

Liu, Z., Jin, H., Hu, Y. C. & Bailey, M., Aug 2018, In : IEEE/ACM Transactions on Networking. 26, 4, p. 1948-1961 14 p., 8418343.

Research output: Contribution to journalArticle

Traffic control
Internet
Testbeds
Computer hardware
Industry

SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks

Hu, Y-C., Johnson, D. B. & Perrig, A., Jul 2003, In : Ad Hoc Networks. 1, 1, p. 175-192 18 p.

Research output: Contribution to journalArticle

Wireless ad hoc networks
Mobile ad hoc networks
Routing protocols
Ad hoc networks
Network routing

SEAR: A secure efficient ad hoc on demand routing protocol for wireless networks

Li, Q., Zhao, M., Walker, J., Hu, Y-C., Perrig, A. & Trappe, W., Jan 1 2009, In : Security and Communication Networks. 2, 4, p. 325-340 16 p.

Research output: Contribution to journalArticle

Routing protocols
Wireless networks
Cryptography
Hash functions
Wireless ad hoc networks

Secure location verification using simultaneous multilateration

Chiang, J. T., Haas, J. J., Choi, J. & Hu, Y. C., Feb 1 2012, In : IEEE Transactions on Wireless Communications. 11, 2, p. 584-591 8 p., 6108305.

Research output: Contribution to journalArticle

Collusion Attack
Enlargement
Attack
Time-of-flight
Synchronization

SecureMAC: Securing Wireless Medium Access Control Against Insider Denial-of-Service Attacks

Chang, S. Y. & Hu, Y. C., Dec 1 2017, In : IEEE Transactions on Mobile Computing. 16, 12, p. 3527-3540 14 p., 7898430.

Research output: Contribution to journalArticle

Medium access control
Jamming
Atmospheric spectra
Wireless networks
Bandwidth

SimpleMAC: A simple wireless MAC-layer countermeasure to intelligent and insider jammers

Chang, S. Y., Hu, Y. C. & Laurenti, N., Apr 2016, In : IEEE/ACM Transactions on Networking. 24, 2, p. 1095-1108 14 p., 7091035.

Research output: Contribution to journalArticle

Medium access control
Jamming
Network protocols
Channel capacity
Transmitters

The impact of key assignment on VANET privacy

Haas, J. J., Hu, Y-C. & Laberteaux, K. P., Jan 1 2010, In : Security and Communication Networks. 3, 2-3, p. 233-249 17 p.

Research output: Contribution to journalArticle

Vehicular ad hoc networks

Wormhole attacks in wireless networks

Hu, Y-C. & Perrig, A., Feb 1 2006, In : IEEE Journal on Selected Areas in Communications. 24, 2, p. 370-379 10 p.

Research output: Contribution to journalArticle

Ad hoc networks
Wireless networks
Network routing
Routing protocols
Topology
Chapter

Data Security in Vehicular Communication Networks

Weimerskirch, A., Haas, J. J., Hu, Y. C. & Laberteaux, K. P., Nov 23 2009, VANET: Vehicular Applications and Inter-Networking Technologies. John Wiley and Sons Ltd, p. 299-363 65 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Security of data
Telecommunication networks

Deployment and Operation

Hu, Y. C., Klausmann, T., Perrig, A., Reischuk, R. M., Shirley, S., Szalachowski, P. & Ucan, E., Jan 1 2017, Information Security and Cryptography. 9783319670799 ed. Springer International Publishing, p. 191-239 49 p. (Information Security and Cryptography; no. 9783319670799).

Research output: Chapter in Book/Report/Conference proceedingChapter

Name Resolution

Asoni, D., Hu, Y. C., Reischuk, R. M. & Trammell, B., Jan 1 2017, Information Security and Cryptography. 9783319670799 ed. Springer International Publishing, p. 101-118 18 p. (Information Security and Cryptography; no. 9783319670799).

Research output: Chapter in Book/Report/Conference proceedingChapter

Internet
Communication
World Wide Web
Destination
Time scales
Conference article

Efficient constructions for one-way hash chains

Hu, Y. C., Jakobsson, M. & Perrig, A., Oct 17 2005, In : Lecture Notes in Computer Science. 3531, p. 423-441 19 p.

Research output: Contribution to journalConference article

Hash Chain
Network protocols
Sensor networks
Data storage equipment
Electronic document identification systems

Friends Troubleshooting Network: Towards privacy-preserving, automatic troubleshooting

Wang, H. J., Hu, Y. C., Yuan, C., Zhang, Z. & Wang, Y. M., Dec 1 2004, In : Lecture Notes in Computer Science. 3279, p. 184-194 11 p.

Research output: Contribution to journalConference article

Peer-to-peer Systems
Privacy Preserving
Aggregation
Agglomeration
Privacy Preservation

Lightweight source authentication and path validation

Kim, T. H. J., Basescu, C., Jia, L., Lee, S. B., Hu, Y. C. & Perrig, A., Feb 25 2015, In : Computer Communication Review. 44, 4, p. 271-282 12 p.

Research output: Contribution to journalConference article

Authentication
Routers
Scalability
Compliance

Packet leashes: A defense against wormhole attacks in wireless networks

Hu, Y. C., Perrig, A. & Johnson, D. B., Sep 1 2003, In : Proceedings - IEEE INFOCOM. 3, p. 1976-1986 11 p.

Research output: Contribution to journalConference article

Ad hoc networks
Wireless networks
Network routing
Routing protocols
Communication

SPV: Secure path vector routing for securing BGP

Hu, Y. C., Perrig, A. & Sirbu, M., Dec 1 2004, In : Computer Communication Review. 34, 4, p. 179-192 14 p.

Research output: Contribution to journalConference article

Gateways (computer networks)
Routing protocols
Network protocols
Critical infrastructures
Brittleness
Conference contribution

A clean slate design for secure wireless ad-hoc networks - Part 1: Closed synchronized networks

Ponniah, J., Hu, Y. C. & Kumar, P. R., Jul 6 2015, 2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2015. Institute of Electrical and Electronics Engineers Inc., p. 175-182 8 p. 7151070. (2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Slate
Wireless Ad Hoc Networks
Wireless ad hoc networks
Network protocols
Closed

A clean slate design for secure wireless ad-hoc networks - Part 2: Open unsynchronized networks

Ponniah, J., Hu, Y. C. & Kumar, P. R., Jul 6 2015, 2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2015. Institute of Electrical and Electronics Engineers Inc., p. 183-190 8 p. 7151071. (2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Slate
Wireless Ad Hoc Networks
Wireless ad hoc networks
Network protocols
Vertex of a graph

A lightweight deterministic MAC protocol using low cross-correlation sequences

Kim, D., Esteki, D. J., Hu, Y. C. & Kumar, P. R., Dec 1 2011, 2011 IEEE Global Telecommunications Conference, GLOBECOM 2011. 6134489. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Gold
Network protocols
Binary sequences
Machinery
Clocks

A study on false channel condition reporting attacks in wireless networks

Kim, D. & Hu, Y-C., Dec 1 2010, Security and Privacy in Communication Networks - 6th Iternational ICST Conference, SecureComm 2010, Proceedings. p. 107-124 18 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 50 LNICST).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless networks
Network protocols
Feedback
Managers

Bankrupting the jammer

Ashraf, F., Hu, Y-C. & Kravets, R. H., Sep 20 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2011. p. 149-151 3 p. 5984887. (2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Jamming
resilience
vulnerability
energy
Sensors

Bankrupting the jammer in WSN

Ashraf, F., Hu, Y-C. & Kravets, R. H., Dec 1 2012, MASS 2012 - 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems. p. 317-325 9 p. 6502531. (MASS 2012 - 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Jamming
Game theory
Sensors
Testbeds
Sensor nodes

CLEF: Limiting the damage caused by large flows in the internet core

Wu, H., Hsiao, H. C., Asoni, D. E., Scherrer, S., Perrig, A. & Hu, Y. C., Jan 1 2018, Cryptology and Network Security - 17th International Conference, CANS 2018, Proceedings. Papadimitratos, P. & Camenisch, J. (eds.). Springer-Verlag, p. 89-108 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11124 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Damage
Limiting
Internet
Router
Routers

Cognitive radio from hell: Flipping attack on direct-sequence spread spectrum

Harshan, J. & Hu, Y-C., Jun 8 2018, 2018 IEEE Wireless Communications and Networking Conference, WCNC 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-April. p. 1-6 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Channel capacity
Jamming
Cognitive radio
Transceivers
Transmitters

Cognitive Wireless Charger: Sensing-Based Real-Time Frequency Control for Near-Field Wireless Charging

Chang, S. Y., Kumar, S. L. S. & Hu, Y. C., Jul 13 2017, Proceedings - IEEE 37th International Conference on Distributed Computing Systems, ICDCS 2017. Lee, K. & Liu, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 2302-2307 6 p. 7980186. (Proceedings - International Conference on Distributed Computing Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Feedback
Internet of things

Communication requirements for crash avoidance

Haas, J. J. & Hu, Y-C., Jan 1 2010, Proceedings of the 7th ACM Int. Workshop on VehiculAr InterNETworking, VANET '10, Co-located with MobiCom'10 and 11th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc'10. Association for Computing Machinery, p. 1-10 10 p. (Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Communication
Accidents
Power control
Authentication
Automobiles

CRAFT: A new secure congestion control architecture

Kim, D., Chiang, J. T., Hu, Y-C., Perrig, A. & Kumar, P. R., Dec 16 2010, CCS'10 - Proceedings of the 17th ACM Conference on Computer and Communications Security. p. 705-707 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Routers
Bandwidth

Cross-layer jamming detection and mitigation in wireless broadcast networks

Chiang, J. T. & Hu, Y. C., Dec 1 2007, MobiCom'07: Proceedings of the Thirteenth ACM International Conference on Mobile Computing and Networking. p. 346-349 4 p. (Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Jamming
Wireless networks
Transmitters
Spread spectrum communication
Mobile telecommunication systems

Deadline-Aware Multipath Communication: An Optimization Problem

Chuat, L., Perrig, A. & Hu, Y. C., Aug 30 2017, Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017. Institute of Electrical and Electronics Engineers Inc., p. 487-498 12 p. 8023147. (Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Throughput
Communication
Packet loss
Network performance

Demo: Free data communication using wireless charging

Kumar, S. L. S., Chang, S. Y., Viswanathan, S. & Hu, Y. C., Jun 25 2016, MobiSys 2016 Companion - Companion Publication of the 14th Annual International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, 1 p. (MobiSys 2016 Companion - Companion Publication of the 14th Annual International Conference on Mobile Systems, Applications, and Services).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Embedded systems
Communication

Design and analysis of a lightweight certificate revocation mechanism for VANET

Haas, J. J., Hu, Y-C. & Laberteaux, K. P., Nov 9 2009, VANET'09 - Proceedings of the 6th ACM International Workshop on VehiculAr Inter-NETworking. p. 89-98 10 p. 1614285. (VANET'09 - Proceedings of the 6th ACM International Workshop on VehiculAr Inter-NETworking).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

certification
Railroad cars
Hardware
Bandwidth
Communication

Design and evaluation of a metropolitan area multitier wireless ad hoc network architecture

Jetcheva, J. G., Hu, Y. C., PalChaudhuri, S., Saha, A. K. & Johnson, D. B., Jan 1 2003, Proceedings - 5th IEEE Workshop on Mobile Computing Systems and Applications, WMCSA 2003. Institute of Electrical and Electronics Engineers Inc., p. 32-43 12 p. 1240765. (Proceedings - 5th IEEE Workshop on Mobile Computing Systems and Applications, WMCSA 2003).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless ad hoc networks
Ad hoc networks
Network architecture
Network routing
Mobile ad hoc networks

Detection of anomaly in train speed for intelligent railway systems

Kang, S., Sristi, S., Karachiwala, J. & Hu, Y-C., Mar 2018, 2018 International Conference on Control, Automation and Diagnosis, ICCAD 2018. Institute of Electrical and Electronics Engineers Inc., 8751374. (2018 International Conference on Control, Automation and Diagnosis, ICCAD 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intelligent systems
Railway
Anomaly
Anomaly Detection
Bayesian Learning

Did you also hear that? Spectrum sensing using Hermitian inner product

Chiang, J. T. & Hu, Y. C., Sep 2 2013, 2013 Proceedings IEEE INFOCOM 2013. p. 2229-2237 9 p. 6567026. (Proceedings - IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Detectors
Matched filters
Cognitive radio
Clocks
Uncertainty

Diffie's wireless phone: Heterodyning-based physical-layer encryption

Chiang, J. T. & Hu, Y. C., Dec 1 2013, Proceedings - 2013 IEEE Military Communications Conference, MILCOM 2013. p. 470-475 6 p. 6735667. (Proceedings - IEEE Military Communications Conference MILCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Heterodyning
Cryptography
Telephone systems
Networks (circuits)
Costs

Dynamic jamming mitigation for wireless broadcast networks

Chiang, J. T. & Hu, Y-C., Sep 15 2008, INFOCOM 2008: 27th IEEE Communications Society Conference on Computer Communications. p. 1885-1893 9 p. 4509772. (Proceedings - IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Jamming
Wireless networks
Atmospheric spectra
Communication
MATLAB

Efficient large flow detection over arbitrary windows: An algorithm exact outside an ambiguity region

Wu, H., Hsiao, H. C. & Hu, Y. C., Nov 5 2014, IMC 2014 - Proceedings of the 2014 ACM. Association for Computing Machinery, p. 209-222 14 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bandwidth
Static random access storage
Throughput
Detectors
Data storage equipment

Enabling Efficient Source and Path Verification via Probabilistic Packet Marking

Wu, B., Xu, K., Li, Q., Liu, Z., Hu, Y-C., Reed, M. J., Shen, M. & Yang, F., Jan 22 2019, 2018 IEEE/ACM 26th International Symposium on Quality of Service, IWQoS 2018. Institute of Electrical and Electronics Engineers Inc., 8624169. (2018 IEEE/ACM 26th International Symposium on Quality of Service, IWQoS 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Routers
Testbeds
Servers
Throughput
Internet