• Publications
  • Influence
Geo-Spatial Location Spoofing Detection for Internet of Things
TLDR
We develop a new location spoofing detection algorithm for geo-spatial tagging and location-based services in the Internet of Things (IoT), called enhanced Location spoofing Detection using audibility (ELSA), which can be implemented at the backend server without modifying existing legacy IoT systems. Expand
  • 24
  • 1
  • PDF
Rate limiting client puzzle schemes for denial-of-service mitigation
TLDR
In this paper, we propose a leaky bucket rate limiting queue mechanism to set the puzzle difficulty according to a queue delay. Expand
  • 14
  • 1
Reliable privacy-preserving communications for wireless ad hoc networks
TLDR
We present a phantom-receiver-based routing scheme to enhance the anonymity of each source-destination pair (or contextual privacy) while using an adjustable amount of overhead. Expand
  • 6
  • 1
  • PDF
Privacy-aware incentive mechanism for mobile crowd sensing
TLDR
This paper proposes a Stackelberg framework for mobile crowd sensing applications to incentivize privacy-sensitive smartphone users to contribute sensing data so that the collected dataset has good spatial coverage. Expand
  • 6
  • 1
Distributed event detection under Byzantine attack in wireless sensor networks
TLDR
We present two novel distributed event detection algorithms based on a statistical approach that tolerate Byzantine attacks where malicious (compromised) sensors send false sensing data to gateway leading to increased false alarm rate. Expand
  • 20
  • PDF
Optimal Privacy-Preserving Probabilistic Routing for Wireless Networks
TLDR
We use a statistical decision-making framework to optimally solve the privacy-preserving routing problem in wireless networks given some utility constraints assuming a powerful global adversary that uses the optimal maximuma-posteriori estimation strategy. Expand
  • 11
  • PDF
Localizing Wireless Jamming Attacks with Minimal Network Resources
  • Jing Yang Koh, Pengfei Zhang
  • Computer Science
  • SpaCCS Workshops
  • 12 December 2017
TLDR
We propose a maximum likelihood estimator (MLE)-based localization method for the jammer node which allows each node that detected a jammed link to probabilistically transmit a jamming report. Expand
  • 4
Mitigating byzantine attacks in data fusion process for wireless sensor networks using witnesses
TLDR
This paper proposes a dynamic witness concept together with distributed forwarder node monitoring to validate the transmitted fusion data. Expand
  • 4
Privacy Considerations in Participatory Data Collection via Spatial Stackelberg Incentive Mechanisms
Mobile crowd sensing is a widely used sensing paradigm allowing applications on mobile smart devices to routinely obtain spatially distributed data on a range of user attributes: location,Expand