Share This Author
A key-management scheme for distributed sensor networks
- Laurent Eschenauer, V. Gligor
- Computer ScienceConference on Computer and Communications…
- 18 November 2002
A key-management scheme designed to satisfy both operational and security requirements of DSNs is presented, which relies on probabilistic key sharing among the nodes of a random graph and uses simple protocols for shared-key discovery and path-key establishment, and for key revocation, re-keying, and incremental addition of nodes.
Distributed detection of node replication attacks in sensor networks
It is shown that emergent algorithms represent a promising new approach to sensor network security; moreover, the results naturally extend to other classes of networks in which nodes can be captured, replicated and re-inserted by an adversary.
TrustVisor: Efficient TCB Reduction and Attestation
TrustVisor is presented, a special-purpose hypervisor that provides code integrity as well as data integrity and secrecy for selected portions of an application that has a very small code base that makes verification feasible.
The Crossfire Attack
We present the Crossfire attack -- a powerful attack that degrades and often cuts off network connections to a variety of selected server targets (e.g., servers of an enterprise, a city, a state, or…
MiniSec: A Secure Sensor Network Communication Architecture
- M. Luk, G. Mezzour, A. Perrig, V. Gligor
- Computer ScienceInternational Symposium on Information Processing…
- 25 April 2007
A publicly available implementation of MiniSec is presented, one tailored for single-source communication, and another tailored for multi-source broadcast communication, that scales to large networks.
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks
- M. Raya, Panos Papadimitratos, V. Gligor, J. Hubaux
- Computer ScienceIEEE INFOCOM - The 27th Conference on Computer…
- 13 April 2008
This paper proposes a framework for data-centric trust establishment: first, trust in each individual piece of data is computed; then multiple, related but possibly contradictory, data are combined; finally, their validity is inferred by a decision component based on one of several evidence evaluation techniques.
On the distribution and revocation of cryptographic keys in sensor networks
- Haowen Chan, V. Gligor, A. Perrig, Gautam Muralidharan
- Computer ScienceIEEE Transactions on Dependable and Secure…
- 1 July 2005
An overview of key-distribution methods in sensor networks and their salient features are presented to provide context for understanding key and node revocation and define basic properties that distributed sensor-node revocation protocols must satisfy.
Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure
- T. Kim, Lin-Shung Huang, A. Perrig, C. Jackson, V. Gligor
- Computer ScienceThe Web Conference
- 13 May 2013
This paper proposes AKI as a new public-key validation infrastructure, to reduce the level of trust in CAs, and proposes an architecture for key revocation of all entities through checks-and-balances.
On Trust Establishment in Mobile Ad-Hoc Networks
It is argued that peer-to-peer networks are especially suitable to solve the problems of generation, distribution, and discovery of trust evidence in mobile ad-hoc networks, and the importance of evaluation metrics in trust establishment is illustrated.
SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks
A software-defined network (SDN) based system called SPIFFY is designed that addresses key practical challenges in turning this high-level idea into a concrete defense mechanism, and provides a practical solution to force a tradeoff between cost vs. detectability for linkflooding attacks.