• Publications
  • Influence
Establishing pairwise keys in distributed sensor networks
TLDR
Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely with each other using cryptographic techniques. Expand
False data injection attacks against state estimation in electric power grids
TLDR
We expose an unknown vulnerability of existing bad measurement detection algorithms by presenting and analyzing a new class of attacks, called false data injection attacks, against state estimation in electric power grids. Expand
False data injection attacks against state estimation in electric power grids
TLDR
A power grid is a complex system connecting electric power generators to consumers through power transmission and distribution networks across a large geographical area. Expand
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
  • An-Lu Liu, P. Ning
  • Computer Science
  • International Conference on Information…
  • 22 April 2008
TLDR
This paper presents the design, implementation, and evaluation of TinyECC, a configurable library for ECC operations in wireless sensor networks. Expand
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
TLDR
In this paper, we present an interleaved hop-by-hop authentication scheme that guarantees that the base station will detect any injected false data packets when no more than a certain number t nodes are compromised. Expand
Detecting repackaged smartphone applications in third-party android marketplaces
TLDR
In this paper, we perform a systematic study on six popular Android-based third-party marketplaces. Expand
Location-based pairwise key establishments for static sensor networks
TLDR
This paper presents several techniques for establishing pairwise keys in static sensor networks. Expand
Efficient self-healing group key distribution with revocation capability
TLDR
This paper presents group key distribution techniques for large and dynamic groups over unreliable channels. Expand
Attack-resistant location estimation in sensor networks
TLDR
This paper presents two methods to tolerate malicious attacks against beacon-based location discovery in sensor networks by adopting an it era refined voting scheme. Expand
Constructing attack scenarios through correlation of intrusion alerts
TLDR
This paper presents a practical technique to address this issue. Expand
...
1
2
3
4
5
...