Dr. Peng Ning  


Security in Ad Hoc and Sensor Networks


People

  • Dr. Peng Ning
  • An Liu (PhD student; co-advise with Dr. Cliff Wang)
  • Sangwon Hyun (PhD student)
  • Attila Altay Yavuz (PhD student)

Alumni

  • Dr. Pan Wang (PhD, 2007; co-advise with Dr. Douglas Reeves; now with Microsoft)
  • Dr. Kun Sun (PhD, 2006; co-advised with Dr. Cliff Wang; now with IAI)
  • Dr. Donggang Liu (PhD, 2005; now with University of Texas at Arlington)
  • Pratik Shah (MS student)
  • Srinath Anantharaju (MS, 2005; now with Google)

Collaborators

Research Topics

  • Broadcast Authentication for Sensor Networks
  • Key Management for Sensor Networks
  • Secure Location Discovery in Sensor Networks
  • Secure Clock Synchronization in Sensor Networks
  • Intrusion Detection in Sensor Networks
  • Security in Mobile Ad Hoc Networks

Software

Related Publications

  1. Donggang Liu, Peng Ning. Security for Wireless Sensor Networks. Springer. ISBN: 0387327231. December 2006.
  2. Peng Ning, Donggang Liu, Wenliang Du, “Secure and Resilient Location Discovery in Wireless Sensor Networks,” To appear in Cliff Wang, Radha Poovendran, Sumit Roy (Eds), WSN Localization and Time Synchronization, Springer, 2006.
  3. Kun Sun, Cliff Wang, Peng Ning, “Secure and Resilient Clock Synchronization in Wireless Sensor Networks,” To appear in Cliff Wang, Radha Poovendran, Sumit Roy (Eds), WSN Localization and Time Synchronization, Springer, 2006.
  4. Wenliang Du, Lei Fang, Peng Ning, “Beaconless Location Discovery in Wireless Sensor Networks,” To appear in Cliff Wang, Radha Poovendran, Sumit Roy (Eds), WSN Localization and Time Synchronization, Springer, 2006.
  5. Kun Sun, Pai Peng, Peng Ning, Cliff Wang, "Secure Distributed Cluster Formation in Wireless Sensor Networks,'' To appear in Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC'06), December 2006.
  6. Kun Sun, Peng Ning, Cliff Wang, An Liu, Yuzheng Zhou, "TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks," To appear in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06), Alexandria, Virginia, November 2006.
  7. Qing Zhang, Ting Yu, Peng Ning, "A Framework for Identifying Compromised Nodes in Sensor Networks," in Proceedings of 2nd IEEE Communications Society/CreateNet International Conference on Security and Privacy in Communication Networks (SecureComm 2006), August 2006.
  8. Wenliang Du, Lei Fang, Peng Ning, "LAD: Localization Anomaly Detection for Wireless Sensor Networks," To appear in Journal of Parallel and Distributed Computing, Special Issue on Papers Selected from IPDPS 05, 2006.
  9. Kun Sun, Peng Ning, Cliff Wang, "Secure and Resilient Clock Synchronization in Wireless Sensor Networks (Invited Paper)," in IEEE Journal on Selected Areas in Communications, Vol. 24, No. 2, Pages 395--408, February 2006.
  10. Pan Wang, Peng Ning, Douglas S. Reeves, "Network Access Control for Mobile Ad-Hoc Networks," in Proceedings of the 7th International Conference on Information and Communications Security (ICICS '05), pages 350-362, December 2005.
  11. Donggang Liu, Peng Ning, “Improving Key Pre-Distribution with Deployment Knowledge in Static Sensor Networks,” in ACM Transactions on Sensor Networks (TOSN), Vol. 1, No. 2, pages 204-239, November 2005.
  12. Donggang Liu, Peng Ning, Wenliang Du, “Group-Based Key Pre-Distribution in Wireless Sensor Networks,” in Proceedings of 2005 ACM Workshop on Wireless Security (WiSe 2005), September 2005.
  13. Kun Sun, Peng Ning, Cliff Wang, "Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks," in IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 2, No. 3, pages 177-189, July-September 2005.
  14. Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodia, "Practical Broadcast Authentication in Sensor Networks," in Proceedings of The 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous 2005), pages 118--129, July 2005.
  15. Pan Wang, Douglas S. Reeves, Peng Ning, "Secure Address Auto-Configuration for Mobile Ad Hoc Networks," Poster, in The 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous 2005), July 2005.
  16. Donggang Liu, Peng Ning, Wenliang Du, "Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks," in Proceedings of the The 25th International Conference on Distributed Computing Systems (ICDCS '05), pages 609--619, June 2005.
  17. Wenliang Du, Ronghua Wang, and Peng Ning, "An Efficient Scheme for Authenticating Public Keys in Sensor Networks," in Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '05), pages 58–67, May 2005.
  18. Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning, "Defending Sybil Attacks in Sensor Networks," in Proceedings of the International Workshop on Security in Distributed Computing Systems (SDCS-2005), June 2005.
  19. Donggang Liu, Peng Ning, Wenliang Du, "Attack-Resistant Location Estimation in Sensor Networks," in Proceedings of The Fourth International Conference on Information Processing in Sensor Networks (IPSN '05), pages 99 -- 106, April 2005.
  20. Wenliang Du, Lei Fang, Peng Ning, "LAD: Localization Anomaly Detection for Wireless Sensor Networks," in Proceedings of the 19th IEEE International Parallel & Distributed Processing Symposium (IPDPS '05), April 2005. (Best Paper Award)
  21. Lei Fang, Wenliang Du, Peng Ning, "A Beacon-Less Location Discovery Scheme for Wireless Sensor Networks," in Proceedings of the IEEE INFOCOM'05, March 13-17, 2005.
  22. Peng Ning, Donggang Liu, "Broadcast Authentication and Key Management for Secure Sensor Networks," in Ivan Stojmenovic (Ed.), Sensor Networks, John Wiley & Sons, 2005.
  23. Donggang Liu, Peng Ning, Rongfang Li, "Establishing Pairwise Keys in Distributed Sensor Networks", in ACM Transactions on Information and System Security, Vol. 8, No.1, pages 41 -- 77, February 2005. (More results than the conference version, including actual implementation and performance results on MICA2 motes.)
  24. Peng Ning, Kun Sun, "How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols," in Ad Hoc Networks, Vol. 3, No. 6, pages 795-819, November 2005.
  25. Donggang Liu, Peng Ning, "Multi-Level µTESLA: Broadcast Authentication for Distributed Sensor Networks," ACM Transactions in Embedded Computing Systems (TECS), Vol. 3, No. 4, pages 800--836, November 2004.
  26. Sencun Zhu, Sanjeev Setia, Sushil Jajodia, and Peng Ning, "An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data in Sensor Networks," in Proceedings of IEEE Symposium on Security and Privacy, pages 259–271, Oakland, California, May 2004.
  27. Donggang Liu, Peng Ning, "Location-Based Pairwise Key Establishments for Static Sensor Networks," in 2003 ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN '03), October 2003. (Acceptance ratio: 14/71)
  28. Donggang Liu, Peng Ning, Kun Sun, "Efficient Self-Healing Group Key Distribution with Revocation Capability," in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), pages 231--240, Washington D.C., October, 2003. (Acceptance ratio: 35/253) (Full version)
  29. Donggang Liu, Peng Ning, "Establishing Pairwise Keys in Distributed Sensor Networks," in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), pages 52--61, Washington D.C., October, 2003. (Acceptance ratio: 35/253) (journal version)
  30. Peng Ning, Kun Sun, "How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols," in Proceedings of the 4th Annual IEEE Information Assurance Workshop, pages 60-67, West Point, June 2003. (Best Paper Award) (journal version)
  31. Donggang Liu, Peng Ning, "Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks," in Proceedings of the 10th Annual Network and Distributed System Security Symposium, pages 263--276, February 2003. (Acceptance ratio:17/82)

Sponsors

This material is based upon work supported by the National Science Foundation (NSF) under Grant No. 0430223 and CAREER-0447761, and by the Army Research Office (ARO) under Grant No. W911NF-05-1-0247 (subcontract through Syracuse University). Any opinions, findings and conclusions or recomendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the NSF or the ARO.


© 2002 Peng Ning. Last Updated 05/28/2007 .