My current research interests are in network security and wireless networks. My general research interests are in security and systems, with emphasis on the areas of secure systems and mobile communications. I have published papers in the areas of secure Internet routing, DDoS-resiliant forwarding, secure routing in wireless ad hoc networks, security and anonymity in peer-to-peer networks, efficient cryptographic mechanisms for routing security, and the design and evaluation of multihop wireless network routing protocols, including Quality-of-Service mechanisms for ad hoc networks.
|ECE 190/220 Computing Systems & Programming||Spring 09, Spring 10, Spring 11, Spring 12, Fall 12, Fall 13, Fall 14 (as 198KL), Fall 15, Spring 16, Spring 17, Fall 17 (at ZJU), Spring 17, Fall 18|
|ECE 424 Computer Security||Fall 06 (as 498YH), Fall 07, Fall 08, Fall 09, Fall 10|
|ECE 428 Distributed Systems||Spring 06, Spring 07, Spring 08|
|ECE 498HP Extending Mobile Computing through Cloud Computing||Spring 2011|
My research interests are generally in the areas of networking, security, and wireless networks. I have worked in a number of areas in these spaces, some of which are described here.
Much of security in wireless networks has been predecated on the idea that outsiders do not know keys or codes. In this research area, we developed protocols for Medium Access and broadcast in environments with insider adversaries.
I developed numerous mechanisms for securing routing, origin and path authentication, and efficient algorithms for hash chains.
Vehicles can avoid accidents through the use of short-range (< 1km) position and velocity reporting. My work includes modeling, simulation, performance evaluation, and security evaluation.
The Internet was designed to allow traffic from any sender to reach any destination. Compromised PCs and IoT devices has led to the ability to flood servers with traffic, knocking them offline. I have developed numerous protocols that allow servers to selectively receive traffic.
Energy Denial-of-Service is a difficult attack in battery-powered devices. I am exploring ways to join wireless charging with data communication to shift the energy burden onto the requestor, eliminating energy DoS. I've also explored using energy limits to mitigate an energy-limited jammer.
Ad hoc networks route traffic over multiple hops from one host to another to expand the range of a wireless signal. I helped develop numerous features in the Dynamic Source Routing (DSR) protocol, as well as security mechanisms for ad hoc network routing. I also developed a secure protocol from the ground up.
Trains pose an interesting security environment: devices are expensive, old, and often cannot be easily retrofit. They also operate in dedicated infrastructure, which can provide distinct wireless properties.
Explored the same-body detection problem, where two devices will share a key if they are on the same body. I'm generally interested in security issues in health care, especially in the US primary care delivery environment.