• Publications
  • Influence
Securing vehicular ad hoc networks
This paper provides a set of security protocols, it is shown that they protect privacy and it is analyzed their robustness and efficiency, and describes some major design decisions still to be made. Expand
The security of vehicular ad hoc networks
A set of security protocols are provided, it is shown that they protect privacy and the robustness of these protocols are analyzed, and a quantitative assessment of the proposed solution is carried out. Expand
GPS-free positioning in mobile ad-hoc networks
A distributed, infrastructure-free positioning algorithm that does not rely on Global Positioning System (GPS) is proposed that uses the distances between the nodes to build a relative coordinate system in which the node positions are computed in two dimensions. Expand
Quantifying Location Privacy
This paper provides a formal framework for the analysis of LPPMs, it captures the prior information that might be available to the attacker, and various attacks that he can perform, and clarifies the difference between three aspects of the adversary's inference attacks, namely their accuracy, certainty, and correctness. Expand
Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks
This paper proposes a simple mechanism based on a counter in each node to stimulate the nodes for packet forwarding and studies the behavior of the proposed mechanism analytically and by means of simulations, and detail the way in which it could be protected against misuse. Expand
Minimum-energy broadcast in all-wireless networks: NP-completeness and distribution issues
A new heuristic is described, Embedded Wireless Multicast Advantage, that compares well with other proposals and is explained how it can be distributed, and a formal proof that the problem of power-optimal broadcast is NP-complete is provided. Expand
Joint mobility and routing for lifetime elongation in wireless sensor networks
  • Jun Luo, J. Hubaux
  • Computer Science
  • Proceedings IEEE 24th Annual Joint Conference of…
  • 13 March 2005
This paper suggests that the base station be mobile; in this way, the nodes located close to it change over time and the obtained improvement in terms of network lifetime is in the order of 500%. Expand
The road to a successful introduction of vehicular communications has to pass through the analysis of potential security threats and the design of a robust security architecture able to cope withExpand
Secure positioning in wireless networks
This paper proposes a mechanism for secure positioning of wireless devices, that is verifiable multilateration, and shows how this mechanism can be used to secure positioning in sensor networks. Expand
Enforcing service availability in mobile ad-hoc WANs
This work presents a secure mechanism to stimulate end users to keep their devices turned on, to refrain from overloading the network, and to thwart tampering aimed at converting the device into a "selfish" one. Expand