• Publications
  • Influence
A key-management scheme for distributed sensor networks
TLDR
We present a key-management scheme designed to satisfy both operational and security requirements of DSNs. Expand
  • 3,987
  • 593
  • PDF
Distributed detection of node replication attacks in sensor networks
TLDR
The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. Expand
  • 786
  • 113
  • PDF
TrustVisor: Efficient TCB Reduction and Attestation
TLDR
We present TrustVisor, a special-purpose hypervisor that provides code integrity as well as data integrity and secrecy for selected portions of an application. Expand
  • 567
  • 49
  • PDF
The Crossfire Attack
TLDR
We present the Crossfire attack -- a powerful attack that degrades and often cuts off network connections to a variety of selected server targets (e.g., servers of an enterprise, a city, a state, or a small country) by flooding only a few network links. Expand
  • 161
  • 36
  • PDF
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks
TLDR
We propose a framework for data-centric trust establishment: First, trust in each individual piece of data is computed; then multiple, related but possibly contradictory, data are combined; finally, their validity is inferred by a decision component based on one of several evidence evaluation techniques. Expand
  • 387
  • 24
  • PDF
On the distribution and revocation of cryptographic keys in sensor networks
TLDR
We present an overview of key-distribution methods in sensor networks and their salient features to provide context for understanding key and node revocation. Expand
  • 217
  • 18
  • PDF
On Trust Establishment in Mobile Ad-Hoc Networks
TLDR
We present some properties of trust establishment in mobile, ad-hoc networks and illustrate how they differ from those of trust established in the Internet. Expand
  • 294
  • 13
  • PDF
Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure
TLDR
In this paper, we propose AKI as a new public-key validation infrastructure, to reduce the level of trust in CAs. Expand
  • 132
  • 13
  • PDF
KeyNote : Trust management for public-key infrastructures. Discussion
TLDR
This paper discusses the rationale for designing a simple trust-management system for public-key infrastructures, called KeyNote, based on expressibility, simplicity, and extensibility. Expand
  • 115
  • 13
On the formal definition of separation-of-duty policies and their composition
TLDR
Formally defines a wide variety of separation-of-duty (SoD) properties, including the best known to date, and establishes their relationships within a formal model of role-based access control (RBAC). Expand
  • 246
  • 12
  • PDF