CSC 774 Network Security

Spring 2004

Presentations for the Advanced Topics

Grading policy for presentations

You can get most of the papers by searching in our library or citeseer.

You can choose any paper if it hasn't been assigned. Requests are accommodated in the order in which they are received. If you don't decide by March 29, the instructor will assign a paper to you.

You need to send your presentation slides in ppt or pdf to the instructor by Friday in the week prior to your presentation.

Topic Area
Date
Paper
Presenter
Slides
Security in Wireless Sensor Networks
1
Bartosz Przydatek, Dawn Song, Adrian Perrig, "SIA: Secure Information Aggregation in Sensor Networks", In Proceedings of ACM SenSys 2003.
Nikhil Baradwaj
2
Sencun Zhu, Sanjeev Setia, Sushil Jajodia, and Peng Ning, "An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data in Sensor Networks," To appear in the Proceedings of IEEE Symposium on Security and Privacy, Oakland, California, May 2004.
Qinghua Zhang
3
    Fan Ye, Haiyun Luo, Songwu Lu, Lixia Zhang, ``Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks,'' to appear in IEEE INFOCOM 2004 Li Yang  
4
H. Chan, A. Perrig, and D. Song, “Random Key Predistribution Schemes for Sensor Networks,” in Proceedings of IEEE Symposium on Research in Security and Privacy, pages 197—213, May 2003. Arvind Soni
5
Wenliang Du, Jing Deng, Yunghsiang S. Han, Shigang Chen and Pramod Varshney. "A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge," To appear in IEEE INFOCOM'04, March 7-11, 2004, Hongkong, China.
Annika Edwards
6
Donggang Liu, Peng Ning, "Location-Based Pairwise Key Establishments for Static Sensor Networks," in 2003 ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN '03), October 2003.
Angana Ghosh
7
  Wenliang Du, Jing Deng, Yunghsiang S. Han, and Pramod Varshney. "A Witness-Based Approach For Data Fusion Assurance In Wireless Sensor Network," in Proceedings of the IEEE 2003 Global Communications Conference (GLOBECOM). San Francisco, CA, USA. December 1-5, 2003. Mithun Acharya  
Group Key Management
 
8
S. Banerjee and B. Bhattacharjee, "Scalable Secure Group Communication over IP Mulitcast," in Proceedings of Internation Conference on Network Protocols, November, 2001.
Pierre Mouallem
9
Dalit Naor, Moni Naor, Jeff Lotspiech, "Revocation and Tracing Schemes for Stateless Receivers", in Lecture Notes in Computer Science, volume 2139, pages 41--??, 2001.
Yan Zhai
10
Weifeng Chen, Lakshminath R. Dondeti, "Performance Comparison of Stateful and Stateless Group Rekeying Algorithms," in Fourth International Workshop on Networked Group Communication (NGC'02), October, 2002.
 
11
G. Ateniese and M. Steiner and G. Tsudik, "Authenticated Group Key Agreement and Friends," in Proceedings of the 5th ACM Conference on Computer and Communications Security, pages 17 -- 26, 1998.
Jaideep Mahalati
12
Donggang Liu, Peng Ning, Kun Sun, "Efficient Self-Healing Group Key Distribution with Revocation Capability," in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), pages 231--240, Washington D.C., October, 2003.
Rick Flynn
Broadcast Authentication
 
13
Adrian Perrig, "The BiBa One-Time Signature and Broadcast Authentication Protocol," in Proceedings of the ACM Conference on Computer and Communications Security, November, 2001.
Rott Adsadawuttijaroen
14
Leonid Reyzin and Natan Reyzin, "Better than BiBa: Short One-time Signatures with Fast Signing and Verifying," in Proceedings of 7th Australasian Conference on Information Security and Privacy, LNCS ????, 2002.
Michael Lee
15
Chris Karlof, Naveen Sastry, Yaping Li, Adrian Perrig, and J.D. Tygar, "Distillation Codes and Applications to DoS Resistant Multicast Authentication", In Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS '04), February 2004. Pratik Shah
16
Adrian Perrig and Robert Szewczyk and Victor Wen and David Culler and J.D. Tygar, "SPINS: Security Protocols for Sensor Networks," in Proceedings of Seventh Annual International Conference on Mobile Computing and Networks, July 2001. Tanu Sharma
17
Donggang Liu, Peng Ning, "Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks," in Proceedings of the 10th Annual Network and Distributed System Security Symposium, pages 263-276, February 2003.
Richard Reid
18
  Dawn Song, David Zuckerman, and J. D. Tygar, "Expander Graphs for Digital Stream Authentication and Robust Overlay Networks," in Proceedings of the 2002 IEEE Symposium on Security and Privacy, pages Julie Starr  
 
MANET Security
   
19
D. Balfanz and D.K. Smetters and P. Stewart and H.C. Wong, "Talking to Strangers: Authentication in Ad-Hoc Wireless Networks," in Proceedings of 2002 Symposium on Network and Distributed Systems Security (NDSS '02), February 2002.
Phu Dinh
20
Lingxuan Hu and David Evans, "Using Directional Antennas to Prevent Wormhole Attacks," In Proceedings of NDSS '04.
Ishan Kapoor
21     S. Buchegger and J. L. Boudec, "Performance Analysis of the CONFIDANT Protocol (Cooperation of Nodes: Fairness in Dynamic Ad-hoc Networks)," in Proceedings of The Third ACM International Symposium on Mobile Ad Hoc Networking and Computing, pages 226--236, June, 2002. Srinath Anantharaju  
22     Yih-Chun Hu, Adrian Perrig, and David B. Johnson. "Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks," In Proceedings of the INFOCOM 2003. Qiao Xu  
23     Yih-Chun Hu, Adrian Perrig, David Johnson, "Efficient Security Mechanisms for Routing Protocols", In Proceedings of NDSS 2003.
Qing Zhang