Share This Author
AMOEBA: Robust Location Privacy Scheme for VANET
- K. Sampigethaya, Mingyan Li, Leping Huang, R. Poovendran
- Computer ScienceIEEE Journal on Selected Areas in Communications
- 1 October 2007
This paper addresses the problem of mitigating unauthorized tracking of vehicles based on their broadcast communications, to enhance the user location privacy in VANET with a scheme called AMOEBA, that provides location privacy by utilizing the group navigation of vehicles.
SeRLoc: secure range-independent localization for wireless sensor networks
This is the first work that provides a security-aware range-independent localization scheme for WSN, and it is shown that SeRLoc is robust against severe WSN attacks, such as the wormhole attack, the sybil attack and compromised sensors.
CARAVAN: Providing Location Privacy for VANET
- K. Sampigethaya, Leping Huang, Mingyan Li, R. Poovendran, Kanta Matsuura, K. Sezaki
- Computer Science
This paper proposes a location privacy scheme called CARAVAN, and evaluates the privacy enhancement achieved under some existing standard constraints of VANET applications, and in the presence of a global adversary.
SeRLoc: Robust localization for wireless sensor networks
This article shows that SeRLoc is robust against known attacks on a WSNs such as the wormhole attack, the Sybil attack, and compromise of network entities and analytically compute the probability of success for each attack.
ROPE: robust position estimation in wireless sensor networks
- Loukas Lazos, R. Poovendran, Srdjan Capkun
- Computer ScienceIPSN . Fourth International Symposium on…
- 24 April 2005
It is shown that ROPE bounds the ability of an attacker to spoof sensors' locations, with relatively low density deployment of reference points, and is confirmed the robustness of ROPE against attacks analytically and via simulations.
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks
- Mingyan Li, I. Koutsopoulos, R. Poovendran
- Computer ScienceIEEE INFOCOM - 26th IEEE International…
- 1 May 2007
This work considers a scenario where a sophisticated jammer jams an area in a single-channel wireless sensor network and proposes a intuitive heuristic jamming strategy for that case that takes into account potential energy constraints of the jammer and the network.
Swing & swap: user-centric approaches towards maximizing location privacy
- Mingyan Li, K. Sampigethaya, Leping Huang, R. Poovendran
- Computer ScienceWorkshop on Privacy in the Electronic Society
- 30 October 2006
A user-centric scheme called Swing is proposed that increases location privacy by enabling the nodes to loosely synchronize updates when changing their velocity, and an approach called Swap is introduced that enables the node to exchange their identifiers to potentially maximize the location privacy provided by each update, hence reducing the number of updates needed to meet the desired privacy levels.
Deceiving Google's Perspective API Built for Detecting Toxic Comments
It is shown that an adversary can subtly modify a highly toxic phrase in a way that the system assigns significantly lower toxicity score to it, and this attack can consistently reduce the toxicity scores to the level of the non-toxic phrases.
The AES-CMAC Algorithm
This memo specifies an authentication algorithm based on CMAC with the 128-bit Advanced Encryption Standard (AES), named AES-CMAC, to be conveniently available to the Internet Community.
Stochastic coverage in heterogeneous sensor networks
This work derives analytical expressions of coverage for heterogeneous sensor networks as a set intersection problem, a problem studied in integral geometry, and compares the theoretical results with the spatial Poisson approximation that is widely used in modeling coverage.