Yih-Chun Hu

20002019
If you made any changes in Pure, your changes will be visible here soon.

Research Output 2000 2019

Filter
Conference contribution
2019

Enabling Efficient Source and Path Verification via Probabilistic Packet Marking

Wu, B., Xu, K., Li, Q., Liu, Z., Hu, Y-C., Reed, M. J., Shen, M. & Yang, F., Jan 22 2019, 2018 IEEE/ACM 26th International Symposium on Quality of Service, IWQoS 2018. Institute of Electrical and Electronics Engineers Inc., 8624169. (2018 IEEE/ACM 26th International Symposium on Quality of Service, IWQoS 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Routers
Testbeds
Servers
Throughput
Internet

SmartCrowd: Decentralized and automated incentives for distributed IoT system detection

Wu, B., Xu, K., Li, Q., Liu, Z., Hu, Y. C., Zhang, Z., Du, X., Liu, B. & Ren, S., Jul 2019, Proceedings - 2019 39th IEEE International Conference on Distributed Computing Systems, ICDCS 2019. Institute of Electrical and Electronics Engineers Inc., p. 1106-1116 11 p. 8884853. (Proceedings - International Conference on Distributed Computing Systems; vol. 2019-July).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet of things
Detectors
Intelligent buildings
Firmware
Ecosystems
2018

CLEF: Limiting the damage caused by large flows in the internet core

Wu, H., Hsiao, H. C., Asoni, D. E., Scherrer, S., Perrig, A. & Hu, Y-C., Jan 1 2018, Cryptology and Network Security - 17th International Conference, CANS 2018, Proceedings. Papadimitratos, P. & Camenisch, J. (eds.). Springer-Verlag, p. 89-108 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11124 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Damage
Limiting
Internet
Router
Routers

Cognitive radio from hell: Flipping attack on direct-sequence spread spectrum

Harshan, J. & Hu, Y-C., Jun 8 2018, 2018 IEEE Wireless Communications and Networking Conference, WCNC 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-April. p. 1-6 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Channel capacity
Jamming
Cognitive radio
Transceivers
Transmitters

Detection of anomaly in train speed for intelligent railway systems

Kang, S., Sristi, S., Karachiwala, J. & Hu, Y-C., Mar 2018, 2018 International Conference on Control, Automation and Diagnosis, ICCAD 2018. Institute of Electrical and Electronics Engineers Inc., 8751374. (2018 International Conference on Control, Automation and Diagnosis, ICCAD 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intelligent systems
Railway
Anomaly
Anomaly Detection
Bayesian Learning

Enabling Work-Conserving Bandwidth Guarantees for Multi-Tenant Datacenters via Dynamic Tenant-Queue Binding

Liu, Z., Chen, K., Wu, H., Hu, S., Hu, Y-C., Wang, Y. & Zhang, G., Oct 8 2018, INFOCOM 2018 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., p. 1-9 9 p. 8486219. (Proceedings - IEEE INFOCOM; vol. 2018-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bandwidth
Conservation
Testbeds
Switches
Experiments

Signal jamming attacks against communication-based train control: Attack impact and countermeasure

Lakshminarayana, S., Revadigar, G., Karachiwala, J. S., Sravana Kumar, S. L., Hu, Y-C., Chang, S. Y. & Yau, D. K. Y., Jun 18 2018, WiSec 2018 - Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, Inc, p. 160-171 12 p. (WiSec 2018 - Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Jamming
Communication
Control systems
Telecommunication repeaters
Coaxial cables
2017

Cognitive Wireless Charger: Sensing-Based Real-Time Frequency Control for Near-Field Wireless Charging

Chang, S. Y., Kumar, S. L. S. & Hu, Y-C., Jul 13 2017, Proceedings - IEEE 37th International Conference on Distributed Computing Systems, ICDCS 2017. Lee, K. & Liu, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 2302-2307 6 p. 7980186. (Proceedings - International Conference on Distributed Computing Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Feedback
Internet of things

Deadline-Aware Multipath Communication: An Optimization Problem

Chuat, L., Perrig, A. & Hu, Y-C., Aug 30 2017, Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017. Institute of Electrical and Electronics Engineers Inc., p. 487-498 12 p. 8023147. (Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Throughput
Communication
Packet loss
Network performance

Insider-attacks on physical-layer group secret-key generation in wireless networks

Harshan, J., Chang, S. Y. & Hu, Y-C., May 10 2017, 2017 IEEE Wireless Communications and Networking Conference, WCNC 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7925526. (IEEE Wireless Communications and Networking Conference, WCNC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless networks
Communication
Broadcasting
Topology
Network protocols

Key update at train stations: Two-layer dynamic key update scheme for secure train communications

Chang, S. Y., Cai, S., Seo, H. & Hu, Y. C., Jan 1 2017, Security and Privacy in Communication Networks -12th International Conference, SecureComm 2016, Proceedings. Deng, R., Yegneswaran, V., Weng, J. & Ren, K. (eds.). Springer-Verlag, p. 125-143 19 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 198 LNICST).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Seed
Communication
Information technology

Performance of Cognitive Wireless Charger for Near-Field Wireless Charging

Chang, S. Y., Kumar, S. L. S. & Hu, Y-C., Jul 13 2017, Proceedings - IEEE 37th International Conference on Distributed Computing Systems, ICDCS 2017. Lee, K. & Liu, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 2555-2556 2 p. 7980230. (Proceedings - International Conference on Distributed Computing Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Transmitters
Feedback
Internet of things

Power-positive networking using wireless charging: Protecting energy against battery exhaustion attacks

Chang, S. Y., Kumar, S. L. S., Tran, B. A. N., Viswanathan, S., Park, Y. & Hu, Y-C., Jul 18 2017, Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017. Association for Computing Machinery, Inc, p. 52-57 6 p. (Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Embedded systems
Authentication
Availability
Hardware
Communication

Protecting vehicular networks privacy in the presence of a single adversarial authority

Chen, C. W., Chang, S. Y., Hu, Y-C. & Chen, Y. W., Dec 19 2017, 2017 IEEE Conference on Communications and Network Security, CNS 2017. Institute of Electrical and Electronics Engineers Inc., p. 1-9 9 p. (2017 IEEE Conference on Communications and Network Security, CNS 2017; vol. 2017-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Leakage (fluid)
Simulators
Systems analysis
Experiments

Securing balise-based train control systems using cryptographic random fountains

Harshan, J., Chang, S. Y., Kang, S. & Hu, Y-C., Dec 19 2017, 2017 IEEE Conference on Communications and Network Security, CNS 2017. Institute of Electrical and Electronics Engineers Inc., p. 405-410 6 p. (2017 IEEE Conference on Communications and Network Security, CNS 2017; vol. 2017-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fountains
Control systems
Communication
Transponders
Antennas

The case for in-network replay suppression

Lee, T., Pappas, C., Perrig, A., Gligor, V. & Hu, Y-C., Apr 2 2017, ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 862-873 12 p. (ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Routers
Network layers
Authentication
Program processors
Synchronization

TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network

Liu, Z., Liu, Y., Winter, P., Mittal, P. & Hu, Y-C., Nov 21 2017, 2017 IEEE 25th International Conference on Network Protocols, ICNP 2017. IEEE Computer Society, 8117564. (Proceedings - International Conference on Network Protocols, ICNP; vol. 2017-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Communication
Law enforcement
Botnet
2016

Demo: Free data communication using wireless charging

Kumar, S. L. S., Chang, S. Y., Viswanathan, S. & Hu, Y-C., Jun 25 2016, MobiSys 2016 Companion - Companion Publication of the 14th Annual International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, 1 p. (MobiSys 2016 Companion - Companion Publication of the 14th Annual International Conference on Mobile Systems, Applications, and Services).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Embedded systems
Communication

Jamming with power boost: Leaky waveguide vulnerability in train systems

Chang, S. Y., Tran, B. A. N., Hu, Y-C. & Jones, D. L., Jan 15 2016, Proceedings - 2015 IEEE 21st International Conference on Parallel and Distributed Systems, ICPADS 2015. IEEE Computer Society, p. 37-43 7 p. 7384276. (Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS; vol. 2016-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Jamming
Waveguides
Communication
Telecommunication repeaters
Security systems

Middlepolice: Toward enforcing destination-defined policies in the middle of the internet

Liu, Z., Jiny, H., Hu, Y-C. & Bailey, M. D., Oct 24 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1268-1279 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Scheduling
Feedback
Bandwidth
2015

A clean slate design for secure wireless ad-hoc networks - Part 1: Closed synchronized networks

Ponniah, J., Hu, Y. C. & Kumar, P. R., Jul 6 2015, 2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2015. Institute of Electrical and Electronics Engineers Inc., p. 175-182 8 p. 7151070. (2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Slate
Wireless Ad Hoc Networks
Wireless ad hoc networks
Network protocols
Closed

A clean slate design for secure wireless ad-hoc networks - Part 2: Open unsynchronized networks

Ponniah, J., Hu, Y. C. & Kumar, P. R., Jul 6 2015, 2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2015. Institute of Electrical and Electronics Engineers Inc., p. 183-190 8 p. 7151071. (2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Slate
Wireless Ad Hoc Networks
Wireless ad hoc networks
Network protocols
Vertex of a graph

Noah: Keyed noise flooding for wireless confidentiality

Chang, S. Y., Lee, J. & Hu, Y-C., Nov 2 2015, Q2SWinet 2015 - Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks. Association for Computing Machinery, Inc, p. 141-148 8 p. (Q2SWinet 2015 - Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Jamming
Telecommunication links
Transmitters
Antennas
Communication

Securing wireless medium access control against insider denial-of-service attackers

Chang, S. Y., Hu, Y. C. & Liu, Z., Dec 3 2015, 2015 IEEE Conference on Communications and NetworkSecurity, CNS 2015. Institute of Electrical and Electronics Engineers Inc., p. 370-378 9 p. 7346848. (2015 IEEE Conference on Communications and NetworkSecurity, CNS 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Medium access control
Jamming
Bandwidth
Atmospheric spectra
Network protocols
2014

Efficient large flow detection over arbitrary windows: An algorithm exact outside an ambiguity region

Wu, H., Hsiao, H. C. & Hu, Y-C., Nov 5 2014, IMC 2014 - Proceedings of the 2014 ACM. Association for Computing Machinery, p. 209-222 14 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bandwidth
Static random access storage
Throughput
Detectors
Data storage equipment

Lightweight source authentication and path validation

Kim, T. H. J., Basescu, C., Jia, L., Lee, S. B., Hu, Y-C. & Perrig, A., Jan 1 2014, SIGCOMM 2014 - Proceedings of the 2014 ACM Conference on Special Interest Group on Data Communication. Association for Computing Machinery, p. 271-282 12 p. (SIGCOMM 2014 - Proceedings of the 2014 ACM Conference on Special Interest Group on Data Communication).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Routers
Scalability
Compliance

Mechanized network origin and path authenticity proofs

Zhang, F., Jia, L., Basescu, C., Kim, T. H. J., Hu, Y-C. & Perrig, A., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 346-357 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network protocols
Internet
Routing protocols
Authentication
Data structures
2013

Did you also hear that? Spectrum sensing using Hermitian inner product

Chiang, J. T. & Hu, Y-C., Sep 2 2013, 2013 Proceedings IEEE INFOCOM 2013. p. 2229-2237 9 p. 6567026. (Proceedings - IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Detectors
Matched filters
Cognitive radio
Clocks
Uncertainty

Diffie's wireless phone: Heterodyning-based physical-layer encryption

Chiang, J. T. & Hu, Y. C., Dec 1 2013, Proceedings - 2013 IEEE Military Communications Conference, MILCOM 2013. p. 470-475 6 p. 6735667. (Proceedings - IEEE Military Communications Conference MILCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Heterodyning
Cryptography
Telephone systems
Networks (circuits)
Costs

JIM-beam: Jamming-resilient wireless flooding based on spatial randomness

Chiang, J. T. & Hu, Y-C., Dec 1 2013, Proceedings - 2013 IEEE Military Communications Conference, MILCOM 2013. p. 464-469 6 p. 6735666. (Proceedings - IEEE Military Communications Conference MILCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Jamming
Availability
Antennas
Monte Carlo simulation

Redundancy offset narrow spectrum: Countermeasure for signal-cancellation based jamming

Chang, S. Y., Hu, Y-C., Chiang, J. & Chang, S. Y., Jan 1 2013, MobiWac 2013 - Proceedings of the 11th ACM International Symposium on Mobility Management and Wireless Access, Co-located with ACM MSWiM 2013. Association for Computing Machinery, p. 51-58 8 p. (MobiWac 2013 - Proceedings of the 11th ACM International Symposium on Mobility Management and Wireless Access, Co-located with ACM MSWiM 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Radar countermeasures
Atmospheric spectra
Jamming
Redundancy
Information theory

Secure cooperative spectrum sensing based on Sybil-resilient clustering

Chiang, J. T., Hu, Y-C. & Yadav, P., Jan 1 2013, 2013 IEEE Global Communications Conference, GLOBECOM 2013. Institute of Electrical and Electronics Engineers Inc., p. 1075-1081 7 p. 6831217. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Statistics
2012

Bankrupting the jammer in WSN

Ashraf, F., Hu, Y-C. & Kravets, R. H., Dec 1 2012, MASS 2012 - 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems. p. 317-325 9 p. 6502531. (MASS 2012 - 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Jamming
Game theory
Sensors
Testbeds
Sensor nodes

JIM-beam: Using spatial randomness to build jamming-resilient wireless flooding networks

Chiang, J. T., Kim, D. & Hu, Y-C., Jul 11 2012, MobiHoc'12 - Proceedings of the 13th ACM International Symposium on Mobile Ad Hoc Networking and Computing. p. 255-256 2 p. (Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Frequency hopping
Jamming
Transmitters
Antennas

Load disaggregation using harmonic analysis and regularized optimization

Chiang, J. T., Zhang, T., Chen, B. & Hu, Y-C., Dec 1 2012, 2012 Conference Handbook - Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC 2012. 6411916. (2012 Conference Handbook - Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Harmonic analysis
Integer programming
Experiments

Power control for fair dynamic channel reservation in VANETs

Haghani, P. & Hu, Y-C., Nov 1 2012, 2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2012. p. 659-667 9 p. 6275841. (Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks workshops; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Vehicular ad hoc networks
Power control
Communication
Medium access control
Broadcasting

SimpleMAC: A jamming-resilient MAC-layer protocol for wireless channel coordination

Chang, S. Y., Hu, Y-C. & Laurenti, N., Sep 28 2012, MobiCom'12 - Proceedings of the 18th Annual International Conference on Mobile Computing and Networking. p. 77-88 12 p. (Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Medium access control
Jamming
Network protocols
Transmitters
Game theory
2011

A lightweight deterministic MAC protocol using low cross-correlation sequences

Kim, D., Esteki, D. J., Hu, Y. C. & Kumar, P. R., Dec 1 2011, 2011 IEEE Global Telecommunications Conference, GLOBECOM 2011. 6134489. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Gold
Network protocols
Binary sequences
Machinery
Clocks

Bankrupting the jammer

Ashraf, F., Hu, Y-C. & Kravets, R. H., Sep 20 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2011. p. 149-151 3 p. 5984887. (2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Jamming
resilience
vulnerability
energy
Sensors

Low-cost mitigation of privacy loss due to radiometric identification

Haas, J. J., Hu, Y. C. & Laurenti, N., Oct 18 2011, MobiCom'11 - Proceedings of the 17th Annual International Conference on Mobile Computing and Networking and Co-Located Workshops - VANET 2011 Workshop, VANET'11. p. 31-40 10 p. (Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Costs
Switching frequency
Parameterization
Transmitters

Secure MAC-layer protocol for captive portals in wireless hotspots

Choi, J., Chang, S. Y., Ko, D. & Hu, Y. C., Sep 2 2011, 2011 IEEE International Conference on Communications, ICC 2011. 5963508. (IEEE International Conference on Communications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Medium access control
Network protocols
Industry
Wi-Fi
Cryptography

Short paper: A practical view of "mixing" identities in vehicular networks

Liu, B., Chiang, J. T., Haas, J. J. & Hu, Y-C., Aug 25 2011, WiSec'11 - Proceedings of the 4th ACM Conference on Wireless Network Security. p. 157-162 6 p. (WiSec'11 - Proceedings of the 4th ACM Conference on Wireless Network Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Entropy
Vehicular ad hoc networks
Authentication
Accidents
Trajectories
2010

A study on false channel condition reporting attacks in wireless networks

Kim, D. & Hu, Y-C., Dec 1 2010, Security and Privacy in Communication Networks - 6th Iternational ICST Conference, SecureComm 2010, Proceedings. p. 107-124 18 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 50 LNICST).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless networks
Network protocols
Feedback
Managers

Communication requirements for crash avoidance

Haas, J. J. & Hu, Y-C., Jan 1 2010, Proceedings of the 7th ACM Int. Workshop on VehiculAr InterNETworking, VANET '10, Co-located with MobiCom'10 and 11th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc'10. Association for Computing Machinery, p. 1-10 10 p. (Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Communication
Accidents
Power control
Authentication
Automobiles

CRAFT: A new secure congestion control architecture

Kim, D., Chiang, J. T., Hu, Y-C., Perrig, A. & Kumar, P. R., Dec 16 2010, CCS'10 - Proceedings of the 17th ACM Conference on Computer and Communications Security. p. 705-707 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Routers
Bandwidth

Partial deafness: A novel denial-of-service attack in 802.11 networks

Choi, J., Chiang, J. T., Kim, D. & Hu, Y. C., Dec 1 2010, Security and Privacy in Communication Networks - 6th Iternational ICST Conference, SecureComm 2010, Proceedings. p. 235-252 18 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 50 LNICST).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Medium access control
Power transmission
Wireless networks
Throughput
Degradation

Secure network-wide clock synchronization in wireless sensor networks

Robles, R. S., Haas, J. J., Chiang, J. T., Hu, Y-C. & Kumar, P. R., Dec 1 2010, 2010 49th IEEE Conference on Decision and Control, CDC 2010. p. 5616-5621 6 p. 5717746. (Proceedings of the IEEE Conference on Decision and Control).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Clock Synchronization
Wireless Sensor Networks
Clocks
Wireless sensor networks
Synchronization

Secure topology discovery through network-wide clock synchronization

Robles, R. S., Haas, J. J., Chiang, J. T., Hu, Y. C. & Kumar, P. R., Oct 29 2010, 2010 International Conference on Signal Processing and Communications, SPCOM 2010. 5560469. (2010 International Conference on Signal Processing and Communications, SPCOM 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Clocks
Synchronization
Topology
Network protocols
Wireless sensor networks
2009

Design and analysis of a lightweight certificate revocation mechanism for VANET

Haas, J. J., Hu, Y-C. & Laberteaux, K. P., Nov 9 2009, VANET'09 - Proceedings of the 6th ACM International Workshop on VehiculAr Inter-NETworking. p. 89-98 10 p. 1614285. (VANET'09 - Proceedings of the 6th ACM International Workshop on VehiculAr Inter-NETworking).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

certification
Railroad cars
Hardware
Bandwidth
Communication

Fundamental limits on secure clock synchronization and man-in-the-middle detection in fixed wireless networks

Chiang, J. T., Haas, J. J., Hu, Y-C., Kumar, P. R. & Choi, J., Oct 12 2009, IEEE INFOCOM 2009 - The 28th Conference on Computer Communications. p. 1962-1970 9 p. 5062118. (Proceedings - IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Clocks
Wireless networks
Synchronization
Network protocols
Turnaround time