Search Results - "Capkun, S."
-
1
Secure positioning in wireless networks
Published in IEEE journal on selected areas in communications (01-02-2006)“…So far, the problem of positioning in wireless networks has been studied mainly in a nonadversarial setting. In this paper, we analyze the resistance of…”
Get full text
Journal Article -
2
Key Agreement in Peer-to-Peer Wireless Networks
Published in Proceedings of the IEEE (01-02-2006)“…We present a set of simple techniques for key establishment over a radio link in peer-to-peer networks. Our approach is based on the Diffie-Hellmankey…”
Get full text
Journal Article -
3
Secure positioning of wireless devices with application to sensor networks
Published in Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies (2005)“…So far, the problem of positioning in wireless networks has been mainly studied in a non-adversarial setting. In this work, we analyze the resistance of…”
Get full text
Conference Proceeding -
4
Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels
Published in IEEE transactions on dependable and secure computing (01-10-2008)“…Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit errors are possible (e.g., it is possible to change a…”
Get full text
Journal Article -
5
ROPE: robust position estimation in wireless sensor networks
Published in IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005 (2005)“…We address the problem of secure location determination, known as secure localization, and the problem of verifying the location claim of a node, known as…”
Get full text
Conference Proceeding -
6
SoK: Secure Data Deletion
Published in 2013 IEEE Symposium on Security and Privacy (01-05-2013)“…Secure data deletion is the task of deleting data irrecoverably from a physical medium. In the digital world, data is not securely deleted by default; instead,…”
Get full text
Conference Proceeding -
7
Distance Hijacking Attacks on Distance Bounding Protocols
Published in 2012 IEEE Symposium on Security and Privacy (01-05-2012)“…After several years of theoretical research on distance bounding protocols, the first implementations of such protocols have recently started to appear. These…”
Get full text
Conference Proceeding -
8
GPS-free positioning in mobile ad-hoc networks
Published in Proceedings of the 34th Annual Hawaii International Conference on System Sciences (2001)“…We consider the problem of node positioning in ad-hoc networks. We propose a distributed, infrastructure-free positioning algorithm that does not rely on…”
Get full text
Conference Proceeding -
9
On Limitations of Friendly Jamming for Confidentiality
Published in 2013 IEEE Symposium on Security and Privacy (01-05-2013)“…Wireless communication provides unique security challenges, but also enables novel ways to defend against attacks. In the past few years, a number of works…”
Get full text
Conference Proceeding -
10
Secure Localization with Hidden and Mobile Base Stations
Published in Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications (01-04-2006)Get full text
Conference Proceeding -
11
On the Security of End-to-End Measurements Based on Packet-Pair Dispersions
Published in IEEE transactions on information forensics and security (01-01-2013)“…The packet-pair technique is a widely adopted method to estimate the capacity of a path. The use of the packet-pair technique has been suggested in numerous…”
Get full text
Journal Article -
12
Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks
Published in 2009 22nd IEEE Computer Security Foundations Symposium (01-07-2009)“…We present a formal model for modeling and reasoning about security protocols. Our model extends standard, inductive, trace-based, symbolic approaches with a…”
Get full text
Conference Proceeding -
13
Self-organized public-key management for mobile ad hoc networks
Published in IEEE transactions on mobile computing (01-01-2003)“…In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they…”
Get full text
Magazine Article -
14
Transient-based identification of wireless sensor nodes
Published in 2009 International Conference on Information Processing in Sensor Networks (13-04-2009)“…Identification of wireless sensor nodes based on the characteristics of their radio transmissions can provide an additional layer of security in all-wireless…”
Get full text
Conference Proceeding -
15
Protecting Sensitive Business Information While Sharing Serial-Level Data
Published in 2008 12th Enterprise Distributed Object Computing Conference Workshops (01-09-2008)“…Within supply chains, the adoption of RFID technology promises to have a beneficial impact: by sharing serial-level data, supply chain partners can optimize…”
Get full text
Conference Proceeding -
16
Secure Location Verification with Hidden and Mobile Base Stations
Published in IEEE transactions on mobile computing (01-04-2008)“…In this work, we propose and analyze a new approach for securing localization and location verification in wireless networks based on hidden and mobile base…”
Get full text
Magazine Article -
17
Wormhole-Based Antijamming Techniques in Sensor Networks
Published in IEEE transactions on mobile computing (01-01-2007)“…Due to their very nature, wireless sensor networks are probably the category of wireless networks most vulnerable to "radio channel jamming"-based…”
Get full text
Magazine Article -
18
Integrity (I) codes: message integrity protection and authentication over insecure channels
Published in 2006 IEEE Symposium on Security and Privacy (S&P'06) (2006)“…Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit errors are possible (e.g., it is possible to change a…”
Get full text
Conference Proceeding -
19
Mobility helps peer-to-peer security
Published in IEEE transactions on mobile computing (01-01-2006)“…We propose a straightforward technique to provide peer-to-peer security in mobile networks. We show that far from being a hurdle, mobility can be exploited to…”
Get full text
Magazine Article -
20
The security and privacy of smart vehicles
Published in IEEE security & privacy (01-05-2004)“…Road safety, traffic management, and driver convenience continue to improve, in large part thanks to appropriate usage of information technology. But this…”
Get full text
Magazine Article