Yih-Chun Hu

20002019
If you made any changes in Pure, your changes will be visible here soon.

Research Output 2000 2019

Filter
Article
2019

BGP with BGPsec: Attacks and Countermeasures

Li, Q., Liu, J., Hu, Y. C., Xu, M. & Wu, J., Jul 1 2019, In : IEEE Network. 33, 4, p. 194-200 7 p., 8594708.

Research output: Contribution to journalArticle

Network protocols
Internet

Convolution Attack on Frequency Hopping by Full-Duplex Radios

Jagadeesh, H. & Hu, Y. C., Jun 2019, In : IEEE Transactions on Vehicular Technology. 68, 6, p. 5642-5656 15 p., 8676089.

Research output: Contribution to journalArticle

Frequency Hopping
Frequency hopping
Radio receivers
Convolution
Frequency shift keying

Power-positive networking: Wireless-charging-based networking to protect energy against battery DoS attacks

Chang, S. Y., Kumar, S. L. S., Hu, Y-C. & Park, Y., Jan 1 2019, In : ACM Transactions on Sensor Networks. 15, 3, 27.

Research output: Contribution to journalArticle

Embedded systems
Data transfer
Authentication
Availability
Hardware
2018

Practical Proactive DDoS-Attack Mitigation via Endpoint-Driven In-Network Traffic Control

Liu, Z., Jin, H., Hu, Y-C. & Bailey, M. D., Aug 2018, In : IEEE/ACM Transactions on Networking. 26, 4, p. 1948-1961 14 p., 8418343.

Research output: Contribution to journalArticle

Traffic control
Internet
Testbeds
Computer hardware
Industry
2017

A Clean Slate Approach to Secure Ad Hoc Wireless Networking-Open Unsynchronized Networks

Ponniah, J., Hu, Y-C. & Kumar, P. R., Mar 2017, In : IEEE Transactions on Control of Network Systems. 4, 1, p. 37-48 12 p., 7478115.

Research output: Contribution to journalArticle

Slate
Networking
Network protocols
Wireless Ad Hoc Networks
Wireless ad hoc networks

SecureMAC: Securing Wireless Medium Access Control Against Insider Denial-of-Service Attacks

Chang, S. Y. & Hu, Y-C., Dec 1 2017, In : IEEE Transactions on Mobile Computing. 16, 12, p. 3527-3540 14 p., 7898430.

Research output: Contribution to journalArticle

Medium access control
Jamming
Atmospheric spectra
Wireless networks
Bandwidth
2016

A System-Theoretic Clean Slate Approach to Provably Secure Ad-Hoc Wireless Networking

Ponniah, J., Hu, Y. C. & Kumar, P. R., Jun 2016, In : IEEE Transactions on Control of Network Systems. 3, 2, p. 206-217 12 p., 7100909.

Research output: Contribution to journalArticle

Slate
Networking
Network protocols
Vertex of a graph
Jamming

SimpleMAC: A simple wireless MAC-layer countermeasure to intelligent and insider jammers

Chang, S. Y., Hu, Y-C. & Laurenti, N., Apr 2016, In : IEEE/ACM Transactions on Networking. 24, 2, p. 1095-1108 14 p., 7091035.

Research output: Contribution to journalArticle

Medium access control
Jamming
Network protocols
Channel capacity
Transmitters
2015

A clean slate approach to secure wireless networking

Ponniah, J., Hu, Y. C. & Kumar, P. R., Jan 1 2015, In : Foundations and Trends in Networking. 9, 1, p. 1-105 105 p.

Research output: Contribution to journalArticle

Slate
Network protocols
Wireless ad hoc networks
Communication systems
2014

A study on false channel condition reporting attacks in wireless networks

Kim, D. & Hu, Y-C., May 2014, In : IEEE Transactions on Mobile Computing. 13, 5, p. 935-947 13 p., 6579605.

Research output: Contribution to journalArticle

Wireless networks
Network protocols
Feedback
Network performance
Managers
2012

Secure location verification using simultaneous multilateration

Chiang, J. T., Haas, J. J., Choi, J. & Hu, Y. C., Feb 1 2012, In : IEEE Transactions on Wireless Communications. 11, 2, p. 584-591 8 p., 6108305.

Research output: Contribution to journalArticle

Collusion Attack
Enlargement
Attack
Time-of-flight
Synchronization
2011

Cross-layer jamming detection and mitigation in wireless broadcast networks

Chiang, J. T. & Hu, Y-C., Feb 1 2011, In : IEEE/ACM Transactions on Networking. 19, 1, p. 286-298 13 p., 5575381.

Research output: Contribution to journalArticle

Jamming
Wireless networks
Transmitters
MATLAB
Communication systems

Efficient certificate revocation list organization and distribution

Haas, J. J., Hu, Y-C. & Laberteaux, K. P., Mar 1 2011, In : IEEE Journal on Selected Areas in Communications. 29, 3, p. 595-604 10 p., 5719271.

Research output: Contribution to journalArticle

Vehicle to vehicle communications
Hardware
Bandwidth
Radio receivers
Communication

Optimal physical carrier sense in wireless networks

Park, K. J., Choi, J., Hou, J. C., Hu, Y-C. & Lim, H., Jan 1 2011, In : Ad Hoc Networks. 9, 1, p. 16-27 12 p.

Research output: Contribution to journalArticle

Wireless networks
Throughput
Medium access control
Parallel algorithms
Carrier sense multiple access
2010

The impact of key assignment on VANET privacy

Haas, J. J., Hu, Y-C. & Laberteaux, K. P., Jan 1 2010, In : Security and Communication Networks. 3, 2-3, p. 233-249 17 p.

Research output: Contribution to journalArticle

Vehicular ad hoc networks
2009

SEAR: A secure efficient ad hoc on demand routing protocol for wireless networks

Li, Q., Zhao, M., Walker, J., Hu, Y-C., Perrig, A. & Trappe, W., Jan 1 2009, In : Security and Communication Networks. 2, 4, p. 325-340 16 p.

Research output: Contribution to journalArticle

Routing protocols
Wireless networks
Cryptography
Hash functions
Wireless ad hoc networks
2007

Portcullis: Protecting connection setup from denial-of-capability attacks

Parno, B., Wendlandt, D., Shi, E., Perrig, A., Maggs, B. & Hu, Y-C., Oct 1 2007, In : Computer Communication Review. 37, 4, p. 289-300 12 p.

Research output: Contribution to journalArticle

Telecommunication links
Topology
Bandwidth
Denial-of-service attack
2006

Wormhole attacks in wireless networks

Hu, Y-C. & Perrig, A., Feb 1 2006, In : IEEE Journal on Selected Areas in Communications. 24, 2, p. 370-379 10 p.

Research output: Contribution to journalArticle

Ad hoc networks
Wireless networks
Network routing
Routing protocols
Topology
2005

Ariadne: A secure on-demand routing protocol for ad hoc networks

Hu, Y. C., Perrig, A. & Johnson, D. B., Jan 1 2005, In : Wireless Networks. 11, 1-2, p. 21-38 18 p.

Research output: Contribution to journalArticle

Ad hoc networks
Routing protocols
Network routing
2003

SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks

Hu, Y-C., Johnson, D. B. & Perrig, A., Jul 2003, In : Ad Hoc Networks. 1, 1, p. 175-192 18 p.

Research output: Contribution to journalArticle

Wireless ad hoc networks
Mobile ad hoc networks
Routing protocols
Ad hoc networks
Network routing