Yih-Chun Hu

20002019
If you made any changes in Pure, your changes will be visible here soon.

Research Output 2000 2019

2012

Power control for fair dynamic channel reservation in VANETs

Haghani, P. & Hu, Y-C., Nov 1 2012, 2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2012. p. 659-667 9 p. 6275841. (Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks workshops; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Vehicular ad hoc networks
Power control
Communication
Medium access control
Broadcasting

Secure location verification using simultaneous multilateration

Chiang, J. T., Haas, J. J., Choi, J. & Hu, Y. C., Feb 1 2012, In : IEEE Transactions on Wireless Communications. 11, 2, p. 584-591 8 p., 6108305.

Research output: Contribution to journalArticle

Collusion Attack
Enlargement
Attack
Time-of-flight
Synchronization

SimpleMAC: A jamming-resilient MAC-layer protocol for wireless channel coordination

Chang, S. Y., Hu, Y. C. & Laurenti, N., Sep 28 2012, MobiCom'12 - Proceedings of the 18th Annual International Conference on Mobile Computing and Networking. p. 77-88 12 p. (Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Medium access control
Jamming
Network protocols
Transmitters
Game theory
2011

A lightweight deterministic MAC protocol using low cross-correlation sequences

Kim, D., Esteki, D. J., Hu, Y. C. & Kumar, P. R., Dec 1 2011, 2011 IEEE Global Telecommunications Conference, GLOBECOM 2011. 6134489. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Gold
Network protocols
Binary sequences
Machinery
Clocks

Bankrupting the jammer

Ashraf, F., Hu, Y-C. & Kravets, R. H., Sep 20 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2011. p. 149-151 3 p. 5984887. (2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Jamming
resilience
vulnerability
energy
Sensors

Cross-layer jamming detection and mitigation in wireless broadcast networks

Chiang, J. T. & Hu, Y-C., Feb 1 2011, In : IEEE/ACM Transactions on Networking. 19, 1, p. 286-298 13 p., 5575381.

Research output: Contribution to journalArticle

Jamming
Wireless networks
Transmitters
MATLAB
Communication systems

Efficient certificate revocation list organization and distribution

Haas, J. J., Hu, Y-C. & Laberteaux, K. P., Mar 1 2011, In : IEEE Journal on Selected Areas in Communications. 29, 3, p. 595-604 10 p., 5719271.

Research output: Contribution to journalArticle

Vehicle to vehicle communications
Hardware
Bandwidth
Radio receivers
Communication

Low-cost mitigation of privacy loss due to radiometric identification

Haas, J. J., Hu, Y. C. & Laurenti, N., Oct 18 2011, MobiCom'11 - Proceedings of the 17th Annual International Conference on Mobile Computing and Networking and Co-Located Workshops - VANET 2011 Workshop, VANET'11. p. 31-40 10 p. (Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Costs
Switching frequency
Parameterization
Transmitters

Optimal physical carrier sense in wireless networks

Park, K. J., Choi, J., Hou, J. C., Hu, Y-C. & Lim, H., Jan 1 2011, In : Ad Hoc Networks. 9, 1, p. 16-27 12 p.

Research output: Contribution to journalArticle

Wireless networks
Throughput
Medium access control
Parallel algorithms
Carrier sense multiple access

Secure MAC-layer protocol for captive portals in wireless hotspots

Choi, J., Chang, S. Y., Ko, D. & Hu, Y. C., Sep 2 2011, 2011 IEEE International Conference on Communications, ICC 2011. 5963508. (IEEE International Conference on Communications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Medium access control
Network protocols
Industry
Wi-Fi
Cryptography

Short paper: A practical view of "mixing" identities in vehicular networks

Liu, B., Chiang, J. T., Haas, J. J. & Hu, Y-C., Aug 25 2011, WiSec'11 - Proceedings of the 4th ACM Conference on Wireless Network Security. p. 157-162 6 p. (WiSec'11 - Proceedings of the 4th ACM Conference on Wireless Network Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Entropy
Vehicular ad hoc networks
Authentication
Accidents
Trajectories
2010

A study on false channel condition reporting attacks in wireless networks

Kim, D. & Hu, Y-C., Dec 1 2010, Security and Privacy in Communication Networks - 6th Iternational ICST Conference, SecureComm 2010, Proceedings. p. 107-124 18 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 50 LNICST).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless networks
Network protocols
Feedback
Managers

Communication requirements for crash avoidance

Haas, J. J. & Hu, Y-C., Jan 1 2010, Proceedings of the 7th ACM Int. Workshop on VehiculAr InterNETworking, VANET '10, Co-located with MobiCom'10 and 11th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc'10. Association for Computing Machinery, p. 1-10 10 p. (Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Communication
Accidents
Power control
Authentication
Automobiles

CRAFT: A new secure congestion control architecture

Kim, D., Chiang, J. T., Hu, Y-C., Perrig, A. & Kumar, P. R., Dec 16 2010, CCS'10 - Proceedings of the 17th ACM Conference on Computer and Communications Security. p. 705-707 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Routers
Bandwidth

Partial deafness: A novel denial-of-service attack in 802.11 networks

Choi, J., Chiang, J. T., Kim, D. & Hu, Y. C., Dec 1 2010, Security and Privacy in Communication Networks - 6th Iternational ICST Conference, SecureComm 2010, Proceedings. p. 235-252 18 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 50 LNICST).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Medium access control
Power transmission
Wireless networks
Throughput
Degradation

Secure network-wide clock synchronization in wireless sensor networks

Robles, R. S., Haas, J. J., Chiang, J. T., Hu, Y-C. & Kumar, P. R., Dec 1 2010, 2010 49th IEEE Conference on Decision and Control, CDC 2010. p. 5616-5621 6 p. 5717746. (Proceedings of the IEEE Conference on Decision and Control).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Clock Synchronization
Wireless Sensor Networks
Clocks
Wireless sensor networks
Synchronization

Secure topology discovery through network-wide clock synchronization

Robles, R. S., Haas, J. J., Chiang, J. T., Hu, Y. C. & Kumar, P. R., Oct 29 2010, 2010 International Conference on Signal Processing and Communications, SPCOM 2010. 5560469. (2010 International Conference on Signal Processing and Communications, SPCOM 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Clocks
Synchronization
Topology
Network protocols
Wireless sensor networks

The impact of key assignment on VANET privacy

Haas, J. J., Hu, Y-C. & Laberteaux, K. P., Jan 1 2010, In : Security and Communication Networks. 3, 2-3, p. 233-249 17 p.

Research output: Contribution to journalArticle

Vehicular ad hoc networks
2009

Data Security in Vehicular Communication Networks

Weimerskirch, A., Haas, J. J., Hu, Y. C. & Laberteaux, K. P., Nov 23 2009, VANET: Vehicular Applications and Inter-Networking Technologies. John Wiley and Sons Ltd, p. 299-363 65 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Security of data
Telecommunication networks

Design and analysis of a lightweight certificate revocation mechanism for VANET

Haas, J. J., Hu, Y-C. & Laberteaux, K. P., Nov 9 2009, VANET'09 - Proceedings of the 6th ACM International Workshop on VehiculAr Inter-NETworking. p. 89-98 10 p. 1614285. (VANET'09 - Proceedings of the 6th ACM International Workshop on VehiculAr Inter-NETworking).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

certification
Railroad cars
Hardware
Bandwidth
Communication

Fundamental limits on secure clock synchronization and man-in-the-middle detection in fixed wireless networks

Chiang, J. T., Haas, J. J., Hu, Y-C., Kumar, P. R. & Choi, J., Oct 12 2009, IEEE INFOCOM 2009 - The 28th Conference on Computer Communications. p. 1962-1970 9 p. 5062118. (Proceedings - IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Clocks
Wireless networks
Synchronization
Network protocols
Turnaround time

Malicious or selfish? Analysis of carrier sense misbehavior in IEEE 802.11 WLAN

Park, K. J., Choi, J., Kang, K. & Hu, Y. C., Dec 1 2009, Quality of Service in Heterogeneous Networks - 6th Int. ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2009 and AAA-IDEA 2009, Proceedings. p. 351-362 12 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 22 LNICST).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless local area networks (WLAN)
Throughput
Network performance
Degradation

Real-world VANET security protocol performance

Haas, J. J., Hu, Y-C. & Laberteaux, K. P., Dec 1 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference. 5426188. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network security
Simulators
Authentication

SEAR: A secure efficient ad hoc on demand routing protocol for wireless networks

Li, Q., Zhao, M., Walker, J., Hu, Y-C., Perrig, A. & Trappe, W., Jan 1 2009, In : Security and Communication Networks. 2, 4, p. 325-340 16 p.

Research output: Contribution to journalArticle

Routing protocols
Wireless networks
Cryptography
Hash functions
Wireless ad hoc networks

Secure and precise location verification using distance bounding and simultaneous multilateration

Chiang, J. T., Haas, J. J. & Hu, Y-C., Sep 21 2009, Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09. p. 181-191 11 p. (Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Jamming
Global positioning system
Time difference of arrival

Secure unified cellular ad hoc network routing

Haas, J. J. & Hu, Y-C., Dec 1 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference. 5425789. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network routing
Ad hoc networks
Local area networks
Telecommunication traffic
Bandwidth
2008

Dynamic jamming mitigation for wireless broadcast networks

Chiang, J. T. & Hu, Y-C., Sep 15 2008, INFOCOM 2008: 27th IEEE Communications Society Conference on Computer Communications. p. 1885-1893 9 p. 4509772. (Proceedings - IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Jamming
Wireless networks
Atmospheric spectra
Communication
MATLAB

SEAR: A secure efficient ad hoc on demand routing protocol for wireless networks

Li, Q., Hu, Y. C., Zhao, M., Perrig, A., Walker, J. & Trappe, W., Dec 1 2008, Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS '08. p. 201-204 4 p. (Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS '08).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Routing protocols
Cryptography
Wireless networks
Wireless ad hoc networks
Ad hoc networks

Security certificate revocation list distribution for vanet

Laberteaux, K. P., Haas, J. J. & Hu, Y. C., Dec 1 2008, VANET'08 - Proceedings of the 5th ACM International Workshop on VehiculAr Inter-NETworking. p. 88-89 2 p. (VANET'08 - Proceedings of the 5th ACM International Workshop on VehiculAr Inter-NETworking).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

certification
Railroad cars
road
simulation
2007

Cross-layer jamming detection and mitigation in wireless broadcast networks

Chiang, J. T. & Hu, Y. C., Dec 1 2007, MobiCom'07: Proceedings of the Thirteenth ACM International Conference on Mobile Computing and Networking. p. 346-349 4 p. (Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Jamming
Wireless networks
Transmitters
Spread spectrum communication
Mobile telecommunication systems

Portcullis: Protecting connection setup from denial-of-capability attacks

Parno, B., Wendlandt, D., Shi, E., Perrig, A., Maggs, B. & Hu, Y. C., Oct 1 2007, In : Computer Communication Review. 37, 4, p. 289-300 12 p.

Research output: Contribution to journalArticle

Telecommunication links
Topology
Bandwidth
Denial-of-service attack

Portcullis: Protecting connection setup from denial-of-capability attacks

Parno, B., Wendlandt, D., Shi, E., Perrig, A., Maggs, B. & Hu, Y. C., Dec 17 2007, ACM SIGCOMM 2007: Conference on Computer Communications. p. 289-300 12 p. (ACM SIGCOMM 2007: Conference on Computer Communications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Telecommunication links
Topology
Internet
Bandwidth
Denial-of-service attack

Preserving location privacy in wireless LANs

Jiang, T., Wang, H. J. & Hu, Y-C., Oct 29 2007, MobiSys'07: Proceedings of the 5th International Conference on Mobile Systems, Applications and Services. p. 246-257 12 p. (MobiSys'07: Proceedings of the 5th International Conference on Mobile Systems, Applications and Services).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Local area networks
Wireless networks
Wi-Fi
Network protocols
Experiments
2006

Wormhole attacks in wireless networks

Hu, Y-C. & Perrig, A., Feb 1 2006, In : IEEE Journal on Selected Areas in Communications. 24, 2, p. 370-379 10 p.

Research output: Contribution to journalArticle

Ad hoc networks
Wireless networks
Network routing
Routing protocols
Topology
2005

Ariadne: A secure on-demand routing protocol for ad hoc networks

Hu, Y. C., Perrig, A. & Johnson, D. B., Jan 1 2005, In : Wireless Networks. 11, 1-2, p. 21-38 18 p.

Research output: Contribution to journalArticle

Ad hoc networks
Routing protocols
Network routing

Efficient constructions for one-way hash chains

Hu, Y. C., Jakobsson, M. & Perrig, A., Oct 17 2005, In : Lecture Notes in Computer Science. 3531, p. 423-441 19 p.

Research output: Contribution to journalConference article

Hash Chain
Network protocols
Sensor networks
Data storage equipment
Electronic document identification systems
2004

A survey of secure wireless ad hoc routing

Hu, Y. C. & Perrig, A., May 1 2004, In : IEEE Security and Privacy. 2, 3, p. 28-39 12 p.

Research output: Contribution to journalReview article

Routing protocols
Network protocols
Network routing
Network performance
Ad hoc networks

Exploiting congestion information in network and higher layer protocols in multihop wireless ad hoc networks

Hu, Y. C. & Johnson, D. B., Jun 1 2004, p. 301-310. 10 p.

Research output: Contribution to conferencePaper

Wireless ad hoc networks
Ad hoc networks
Routing protocols
Network protocols
Scalability

Friends Troubleshooting Network: Towards privacy-preserving, automatic troubleshooting

Wang, H. J., Hu, Y. C., Yuan, C., Zhang, Z. & Wang, Y. M., Dec 1 2004, In : Lecture Notes in Computer Science. 3279, p. 184-194 11 p.

Research output: Contribution to journalConference article

Peer-to-peer Systems
Privacy Preserving
Aggregation
Agglomeration
Privacy Preservation

Securing quality-of-service route discovery in on-demand routing for ad hoc networks

Hu, Y. C. & Johnson, D. B., Dec 1 2004, Proceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN'04. Swarup, V. & Setia, S. (eds.). p. 106-117 12 p. (Proceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN'04).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ad hoc networks
Quality of service
Wireless networks
Cryptography
Media streaming

SPV: Secure path vector routing for securing BGP

Hu, Y. C., Perrig, A. & Sirbu, M., Dec 1 2004, In : Computer Communication Review. 34, 4, p. 179-192 14 p.

Research output: Contribution to journalConference article

Gateways (computer networks)
Routing protocols
Network protocols
Critical infrastructures
Brittleness
2003

Design and evaluation of a metropolitan area multitier wireless ad hoc network architecture

Jetcheva, J. G., Hu, Y. C., PalChaudhuri, S., Saha, A. K. & Johnson, D. B., Jan 1 2003, Proceedings - 5th IEEE Workshop on Mobile Computing Systems and Applications, WMCSA 2003. Institute of Electrical and Electronics Engineers Inc., p. 32-43 12 p. 1240765. (Proceedings - 5th IEEE Workshop on Mobile Computing Systems and Applications, WMCSA 2003).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless ad hoc networks
Ad hoc networks
Network architecture
Network routing
Mobile ad hoc networks

Packet leashes: A defense against wormhole attacks in wireless networks

Hu, Y. C., Perrig, A. & Johnson, D. B., Sep 1 2003, In : Proceedings - IEEE INFOCOM. 3, p. 1976-1986 11 p.

Research output: Contribution to journalConference article

Ad hoc networks
Wireless networks
Network routing
Routing protocols
Communication

Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols

Hu, Y-C., Perrig, A. & Johnson, D. B., Dec 1 2003, Proceedings of the Workshop on Wireless Security. p. 30-40 11 p. (Proceedings of the Workshop on Wireless Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network routing
Wireless ad hoc networks
Routing protocols
Ad hoc networks
Network protocols

SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks

Hu, Y-C., Johnson, D. B. & Perrig, A., Jul 2003, In : Ad Hoc Networks. 1, 1, p. 175-192 18 p.

Research output: Contribution to journalArticle

Wireless ad hoc networks
Mobile ad hoc networks
Routing protocols
Ad hoc networks
Network routing
2002

Ariadne: A secure on-demand routing protocol for ad hoc networks

Hu, Y. C., Perrig, A. & Johnson, D. B., Dec 1 2002, p. 12-23. 12 p.

Research output: Contribution to conferencePaper

Ad hoc networks
Routing protocols
Network routing

Design and demonstration of live audio and video over multihop wireless ad hoc networks

Hu, Y. C. & Johnson, D. B., Dec 1 2002, p. 1211-1216. 6 p.

Research output: Contribution to conferencePaper

Wireless ad hoc networks
Ad hoc networks
Routing protocols
Demonstrations
Radio receivers

Ensuring Cache Freshness in On-Demand Ad Hoc Network Routing Protocols

Hu, Y. C. & Johnson, D. B., Dec 1 2002, Proceedings of the ACM International Workshop on Principles of Mobile Commerce. p. 25-30 6 p. (Proceedings of the ACM International Workshop on Principles of Mobile Commerce).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network routing
Wireless ad hoc networks
Ad hoc networks
Routing protocols
Pollution

SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks

Hu, Y. C., Johnson, D. B. & Perrig, A., Jan 1 2002, Proceedings - 4th IEEE Workshop on Mobile Computing Systems and Applications, WMCSA 2002. Institute of Electrical and Electronics Engineers Inc., p. 3-13 11 p. 1017480. (Proceedings - 4th IEEE Workshop on Mobile Computing Systems and Applications, WMCSA 2002).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless ad hoc networks
Mobile ad hoc networks
Routing protocols
Ad hoc networks
Network routing