• Publications
  • Influence
The feasibility of launching and detecting jamming attacks in wireless networks
TLDR
We study the problem of conducting radio interference attacks on wireless networks from both sides of the issue, and explore the critical issue of diagnosing the presence of jamming attacks. Expand
  • 1,246
  • 106
  • PDF
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
TLDR
We present a protocol that allows two users to establish a common cryptographic key by exploiting special properties of the wireless channel: the underlying channel response between any two parties is unique and decorrelates rapidly in space. Expand
  • 598
  • 100
  • PDF
Enhancing Source-Location Privacy in Sensor Network Routing
TLDR
We provide a formal model for the source-location privacy problem in sensor networks and examine the privacy characteristics of different sensor routing protocols. Expand
  • 418
  • 73
Robust statistical methods for securing wireless localization in sensor networks
Many sensor applications are being developed that require the location of wireless devices, and localization schemes have been developed to meet this need. However, as location-based services becomeExpand
  • 494
  • 46
  • PDF
Anti-collusion fingerprinting for multimedia
TLDR
Digital fingerprinting is a technique for identifying users who use multimedia content for unintended purposes, such as redistribution. Expand
  • 404
  • 42
  • PDF
Source-location privacy in energy-constrained sensor network routing
TLDR
In this paper, we focus on protecting the source's location by introducing suitable modifications to sensor routing protocols to make it difficult for an adversary to backtrack to the origin of the sensor communication. Expand
  • 396
  • 41
  • PDF
Introduction to Cryptography with Coding Theory
TLDR
This book assumes a minimal background in programming and a level of math sophistication equivalent to a course in linear algebra. Expand
  • 530
  • 38
Jamming sensor networks: attack and defense strategies
TLDR
We survey different jamming attacks that may be employed against a sensor network. Expand
  • 617
  • 36
  • PDF
ParkNet: drive-by sensing of road-side parking statistics
TLDR
In this paper we present the design, implementation and evaluation of ParkNet, a mobile system comprising vehicles that collect parking space occupancy information while driving by. Expand
  • 393
  • 26
  • PDF
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study
TLDR
This paper presents a privacy and security evaluation of wireless Tire Pressure Monitoring Systems using both laboratory experiments with isolated tire pressure sensor modules and experiments with a complete vehicle system. Expand
  • 341
  • 26
  • PDF
...
1
2
3
4
5
...