Share This Author
Random key predistribution schemes for sensor networks
- Haowen Chan, A. Perrig, D. Song
- Computer Science, MathematicsSymposium on Security and Privacy, .
- 11 May 2003
The random-pairwise keys scheme is presented, which perfectly preserves the secrecy of the rest of the network when any node is captured, and also enables node-to-node authentication and quorum-based revocation.
Practical techniques for searches on encrypted data
- D. Song, D. Wagner, A. Perrig
- Computer Science, MathematicsProceeding IEEE Symposium on Security and…
- 14 May 2000
This work describes the cryptographic schemes for the problem of searching on encrypted data and provides proofs of security for the resulting crypto systems, and presents simple, fast, and practical algorithms that are practical to use today.
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks
This paper presents attacks against routing in ad hoc networks, and the design and performance evaluation of a new secure on-demand ad hoc network routing protocol, called Ariadne, which prevents attackers or compromised nodes from tampering with uncompromising routes consisting of uncompromised nodes.
Efficient authentication and signing of multicast streams over lossy channels
- A. Perrig, R. Canetti, J. Tygar, D. Song
- Computer ScienceProceeding IEEE Symposium on Security and…
- 14 May 2000
This work proposes two efficient schemes, TESLA and EMSS, for secure lossy multicast streams, and offers sender authentication, strong loss robustness, high scalability and minimal overhead at the cost of loose initial time synchronization and slightly delayed authentication.
Packet leashes: a defense against wormhole attacks in wireless networks
- Yih-Chun Hu, A. Perrig, David B. Johnson
- Computer ScienceIEEE INFOCOM . Twenty-second Annual Joint…
- 9 July 2003
A new, general mechanism, called packet leashes, is presented for detecting and thus defending against wormhole attacks, and a specific protocol is presented, called TIK, that implements leashes.
The TESLA Broadcast Authentication Protocol
The TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast authentication protocol is presented, an efficient protocol with low communication and computation overhead, which scales to large numbers of receivers, and tolerates packet loss.
Distributed detection of node replication attacks in sensor networks
- Bryan Parno, A. Perrig, V. Gligor
- Computer ScienceIEEE Symposium on Security and Privacy (S&P'05)
- 8 May 2005
It is shown that emergent algorithms represent a promising new approach to sensor network security; moreover, the results naturally extend to other classes of networks in which nodes can be captured, replicated and re-inserted by an adversary.
SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks
- Yih-Chun Hu, David B. Johnson, A. Perrig
- Computer ScienceProceedings Fourth IEEE Workshop on Mobile…
- 20 June 2002
The Secure Efficient Ad hoc Distance vector routing protocol is designed and evaluated, a secure ad hoc network routing protocol based on the design of the Destination-Sequenced Distance-Vector routing protocol (DSDV), which performs well over the range of scenarios, and is robust against multiple uncoordinated attackers creating incorrect routing state in any other node.
The Sybil attack in sensor networks: analysis & defenses
- J. Newsome, E. Shi, D. Song, A. Perrig
- Computer ScienceThird International Symposium on Information…
- 26 April 2004
It is demonstrated that the Sybil attack can be exceedingly detrimental to many important functions of the sensor network such as routing, resource allocation, misbehavior detection, etc.
Deja Vu-A User Study: Using Images for Authentication
Deja Vu is a recognition-based authentication system, which authenticates a user through her ability to recognize previously seen images, which is more reliable and easier to use than traditional recall-based schemes, which require the user to precisely recall passwords or PINs.