• Publications
  • Influence
Securing vehicular ad hoc networks
TLDR
Vehicular networks are very likely to be deployed in the coming years and thus become the most relevant form of mobile ad hoc networks. Expand
  • 983
  • 111
  • PDF
The security of vehicular ad hoc networks
TLDR
Vehicular networks are likely to become the most relevant form of mobile ad hoc networks. Expand
  • 1,073
  • 89
  • PDF
GPS-free positioning in mobile ad-hoc networks
TLDR
We propose a distributed, infrastructure-free positioning algorithm that does not rely on Global Positioning System (GPS). Expand
  • 1,303
  • 80
  • PDF
Quantifying Location Privacy
TLDR
We revise location privacy by giving a simple, yet comprehensive, model to formulate all types of location-information disclosure attacks. Expand
  • 569
  • 68
  • PDF
Minimum-energy broadcast in all-wireless networks: NP-completeness and distribution issues
TLDR
We provide a formal proof that the problem of power-optimal broadcast is NP-complete and propose a new heuristic, Embedded Wireless Multicast Advantage, to solve it. Expand
  • 551
  • 65
  • PDF
Joint mobility and routing for lifetime elongation in wireless sensor networks
  • Jun Luo, J. Hubaux
  • Computer Science
  • Proceedings IEEE 24th Annual Joint Conference of…
  • 13 March 2005
TLDR
In this paper, we have first shown that, with a static base station, the sensor nodes located close to the base station suffer premature battery depletion, leading to an early disconnection of the network. Expand
  • 999
  • 64
  • PDF
Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks
TLDR
In military and rescue applications of mobile ad hoc networks, all the nodes belong to the same authority and they are motivated to cooperate in order to support the basic functions of the network. Expand
  • 1,264
  • 63
  • PDF
SECURING VEHICULAR COMMUNICATIONS
TLDR
The road to a successful introduction of vehicular communications has to pass through the analysis of potential security threats and the design of a robust security architecture able to cope with these threats. Expand
  • 642
  • 47
  • PDF
Secure positioning in wireless networks
TLDR
We propose a mechanism for secure positioning of wireless devices, that we call verifiable multilateration. Expand
  • 438
  • 40
  • PDF
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
TLDR
We propose a fully self-organized public-key management system that allows users to generate their public-private key pairs, to issue certificates, and to perform authentication regardless of the network partitions and without any centralized services. Expand
  • 660
  • 39
  • PDF