About Me

I am an associate professor in the Department of Electrical and Computer Engineering at the University of Illinois at Urbana-Champaign, an affiliate faculty of Computer Science, and faculty of the Advanced Digital Sciences Center. I am a member of the Coordinated Science Laboratory and the Information Trust Institute. I joined the University of Illinois in August 2005; previously I was a Postdoctoral Researcher at the University of California, Berkeley under Doug Tygar. I received my Ph.D. in 2003 from the Computer Science Department at Carnegie Mellon University while I was a Visiting Graduate Student in the Computer Science Department at Rice University; my advisor throughout graduate school was Dave Johnson. I received my B.S. Magna Cum Laude in 1997 in Computer Science and Mathematics from the University of Washington.

My current research interests are in network security and wireless networks. My general research interests are in security and systems, with emphasis on the areas of secure systems and mobile communications. I have published papers in the areas of secure Internet routing, DDoS-resiliant forwarding, secure routing in wireless ad hoc networks, security and anonymity in peer-to-peer networks, efficient cryptographic mechanisms for routing security, and the design and evaluation of multihop wireless network routing protocols, including Quality-of-Service mechanisms for ad hoc networks.

Altgeld Hall


ECE 190/220 Computing Systems & Programming Spring 09, Spring 10, Spring 11, Spring 12, Fall 12, Fall 13, Fall 14 (as 198KL), Fall 15, Spring 16, Spring 17, Fall 17 (at ZJU), Spring 17, Fall 18
ECE 424 Computer Security Fall 06 (as 498YH), Fall 07, Fall 08, Fall 09, Fall 10
ECE 428 Distributed Systems Spring 06, Spring 07, Spring 08
ECE 498HP Extending Mobile Computing through Cloud Computing Spring 2011
Wesley UMC


Associate editor for:
  • IEEE Transactions on Networking (May 2012–May 2016)
  • ACM Transactions on Mobile Computing (August 2013–present)
Conference organizing committee roles, including:
  • Co-Technical Program Chair, The Thirteenth International Conference on Mobile Computing and Networking (ACM MobiHoc 2012)
  • Co-Web and Publicity Chair, The Seventeenth International Conference on Mobile Computing and Networking (ACM MobiCom 2011)
  • Co-Web Chair, The Sixteenth International Conference on Mobile Computing and Networking (ACM MobiCom 2010) and The Eleventh ACM International Symposium on Mobile Ad Hoc Networking and Computing (ACM MobiHoc 2010).
  • Technical Program Committee Co-Chair for the Fifth ACM International Workshop on Vehicular Ad Hoc Networks (VANET 2008)
  • Technical Program Committee Co-Chair for the Fourth ACM International Workshop on Vehicular Ad Hoc Networks (VANET 2007)
  • Publicity Chair for the Third ACM International Workshop on Vehicular Ad Hoc Networks (VANET 2006).
Grand Canyon

Research Interests

My research interests are generally in the areas of networking, security, and wireless networks. I have worked in a number of areas in these spaces, some of which are described here.

Insider Wireless Attacks

Much of security in wireless networks has been predecated on the idea that outsiders do not know keys or codes. In this research area, we developed protocols for Medium Access and broadcast in environments with insider adversaries.

Network Security Mechanisms

I developed numerous mechanisms for securing routing, origin and path authentication, and efficient algorithms for hash chains.

Vehicular Safety Networks

Vehicles can avoid accidents through the use of short-range (< 1km) position and velocity reporting. My work includes modeling, simulation, performance evaluation, and security evaluation.

DDoS Defense

The Internet was designed to allow traffic from any sender to reach any destination. Compromised PCs and IoT devices has led to the ability to flood servers with traffic, knocking them offline. I have developed numerous protocols that allow servers to selectively receive traffic.

Energy Impacts of Wireless

Energy Denial-of-Service is a difficult attack in battery-powered devices. I am exploring ways to join wireless charging with data communication to shift the energy burden onto the requestor, eliminating energy DoS. I've also explored using energy limits to mitigate an energy-limited jammer.

Ad Hoc Networks

Ad hoc networks route traffic over multiple hops from one host to another to expand the range of a wireless signal. I helped develop numerous features in the Dynamic Source Routing (DSR) protocol, as well as security mechanisms for ad hoc network routing. I also developed a secure protocol from the ground up.

Train Security

Trains pose an interesting security environment: devices are expensive, old, and often cannot be easily retrofit. They also operate in dedicated infrastructure, which can provide distinct wireless properties.

Medical Security

Explored the same-body detection problem, where two devices will share a key if they are on the same body. I'm generally interested in security issues in health care, especially in the US primary care delivery environment.