• Publications
  • Influence
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
TLDR
The security of LEAP+ under various attack models is analyzed and it is shown that it is very effective in defending against many sophisticated attacks, such as HELLO flood attacks, node cloning attacks, and wormhole attacks. Expand
LEAP: efficient security mechanisms for large-scale distributed sensor networks
In this paper, we describe LEAP (Localized Encryption and Authentication Protocol), a key management protocol for sensor networks that is designed to support in-network processing, while at the sameExpand
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
TLDR
This paper presents an interleaved hop-by-hop authentication scheme that guarantees that the base station will detect any injected false data packets when no more than a certain number t nodes are compromised. Expand
Detecting Offensive Language in Social Media to Protect Adolescent Online Safety
TLDR
This work proposes the Lexical Syntactic Feature (LSF) architecture to detect offensive content and identify potential offensive users in social media, and incorporates a user's writing style, structure and specific cyber bullying content as features to predict the user's potentiality to send out offensive content. Expand
SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks
TLDR
SDAP is a general-purpose secure aggregation protocol applicable to multiple aggregation functions and can achieve the level of efficiency close to an ordinary hop-by-hop aggregation protocol while providing certain assurance on the trustworthiness of the aggregation result. Expand
Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach
TLDR
This paper presents a scalable and distributed protocol that enables two nodes to establish a pairwise shared key on the fly, without requiring the use of any on-line key distribution center. Expand
TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors
TLDR
This paper utilizes an installed trojan application to stealthily monitor the movement and gesture changes of a smartphone using its on-board motion sensors and presents the design and implementation of TapLogger, a trojanApplication for the Android platform, which stealthily logs the password of screen lock and the numbers entered during a phone call. Expand
Towards Statistically Strong Source Anonymity for Sensor Networks
TLDR
This paper proposes a scheme called FitProbRate, which realizes statistically strong source anonymity for sensor networks, and shows that this scheme, besides providing source anonymity, can significantly reduce real event reporting latency compared to two baseline schemes. Expand
Routing in Socially Selfish Delay Tolerant Networks
TLDR
To select a forwarding node, SSAR considers both users' willingness to forward and their contact opportunity, resulting in a better forwarding strategy than purely contact-based approaches and formulates the data forwarding process as a Multiple Knapsack Problem with Assignment Restrictions to satisfy user demands for selfishness and performance. Expand
Towards event source unobservability with minimum network traffic in sensor networks
TLDR
The main idea is to introduce carefully chosen dummy traffic to hide the real event sources in combination with mechanisms to drop dummy messages to prevent explosion of network traffic. Expand
...
1
2
3
4
5
...