Research Interests

My research interests are generally in the areas of networking, security, and wireless networks. I have worked in a number of areas in these spaces, some of which are described here.

Insider Wireless Attacks

Much of security in wireless networks has been predecated on the idea that outsiders do not know keys or codes. In this research area, we developed protocols for Medium Access and broadcast in environments with insider adversaries.

Network Security Mechanisms

I developed numerous mechanisms for securing routing, origin and path authentication, and efficient algorithms for hash chains.

Vehicular Safety Networks

Vehicles can avoid accidents through the use of short-range (< 1km) position and velocity reporting. My work includes modeling, simulation, performance evaluation, and security evaluation.

DDoS Defense

The Internet was designed to allow traffic from any sender to reach any destination. Compromised PCs and IoT devices has led to the ability to flood servers with traffic, knocking them offline. I have developed numerous protocols that allow servers to selectively receive traffic.

Energy Impacts of Wireless

Energy Denial-of-Service is a difficult attack in battery-powered devices. I am exploring ways to join wireless charging with data communication to shift the energy burden onto the requestor, eliminating energy DoS. I've also explored using energy limits to mitigate an energy-limited jammer.

Ad Hoc Networks

Ad hoc networks route traffic over multiple hops from one host to another to expand the range of a wireless signal. I helped develop numerous features in the Dynamic Source Routing (DSR) protocol, as well as security mechanisms for ad hoc network routing. I also developed a secure protocol from the ground up.

Train Security

Trains pose an interesting security environment: devices are expensive, old, and often cannot be easily retrofit. They also operate in dedicated infrastructure, which can provide distinct wireless properties.

Medical Security

Explored the same-body detection problem, where two devices will share a key if they are on the same body. I'm generally interested in security issues in health care, especially in the US primary care delivery environment.

Publications

Book Chapters

  1. Yih-Chun Hu, Tobias Klausmann, Adrian Perrig, Raphael M. Reischuk, Stephen Shirley, Pawel Szalachowski, and Ercan Ucan. Deployment and Operation. SCION: A Secure Internet Architecture. Edited by Adrian Perrig, Pawel Szalachowski, Raphael M. Reischuk, and Laurent Chuat. Springer International Publishing, 2017.
  2. André Weimerskirch, Jason J. Haas, Yih-Chun Hu, and Kenneth P. Laberteaux. Data Security in Vehicular Communication Networks. VANET Vehicular Applications and Inter-Networking Technologies, Edited by Hannes Hartenstein and Kenneth P. Laberteaux. John Wiley & Sons, Ltd., March 2010.

Journal and Periodical Papers

  1. Ertem Esiner, Utku Tefek, Hasan S. M. Erol, Daisuke Mashima, Binbin Chen, Yih-Chun Hu, Zbigniew Kalbarczyk, and David M. Nicol. LoMoS: Less-Online/More-Offline Signatures for Extremely Time-Critical Systems, IEEE Transactions on Smart Grid 13(4):3214–3226, IEEE July 2022.
  2. Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Qi Li, Yih-Chun Hu. Make Web3.0 Connected, IEEE Transactions on Dependable and Secure Computing 19(5):2965–2981, IEEE May 2021.
    Revised from Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Yih-Chun Hu. HyperService: Interoperability and Programmability across Heterogeneous Blockchains. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS 2019), ACM, London, UK, November 2019, pp. 549–566.
  3. Harshan Jagadeesh, Amogh Vithalkar, Manthan Kabra, Naman Jhunjhunwala, Prafull Manav, and Yih-Chun Hu. Double-Edge Embedding Based Provenance Recovery for Low-Latency Applications in Wireless Networks, Transactions on Dependable and Secure Computing 19(2):1194–1211, IEEE March 2022.
    Revised from {Bloom Filter Based Low-Latency Provenance Embedding Schemes in Wireless Networks.} Proceedings of the 2020 IEEE Wireless Communications and Networking Conference (WCNC), IEEE, Seoul, Korea, May 2020, pp. 1–7.
  4. Taehyoung Kim, Im Y. Jung, and Yih-Chun Hu. Automatic, Location-Privacy Preserving Dashcam Video Sharing Using Blockchain and Deep Learning, Human-centric Computing and Information Sciences, Springer August 2020.
  5. Qi Li, Jiajia Liu, Yih-Chun Hu, Mingwei Xu, and Jianping Wu. BGP with BGPsec: Attacks and Countermeasures, IEEE Network 33(4):194–200, IEEE July 2019.
  6. Harshan Jagadeesh and Yih-Chun Hu. Convolution Attack on Frequency Hopping by Full-Duplex Radios, Transactions on Vehicular Technology 68(6):5642–5656, IEEE June 2019.
  7. Zhuotao Liu, Hao Jin, Yih-Chun Hu, and Michael Bailey. Practical Proactive DDoS Attack Mitigation Via Endpoint-Driven In-Network Traffic Control, IEEE/ACM Transactions on Networking (ToN) 26(4):1948–1961, IEEE July 2018.
    Revised from MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet. Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS 2016), ACM, Vienna, Austria, October 2016, pp. 1268–1279.
  8. Sang-Yoon Chang and Yih-Chun Hu. SecureMAC: Securing Wireless Medium Access Control Against Insider Denial-of-Service Attacks, IEEE Transactions on Mobile Computing (TMC) 16(12):3527–3540, IEEE April 2017.
  9. Jonathan Ponniah, Yih-Chun Hu, and P. R. Kumar. A Clean Slate Approach to Secure Ad-Hoc Wireless Networking — Open Unsynchronized Networks, IEEE Transactions on Control of Network Systems, Special Issue on Cyberphysical Systems 4(1):37–48, May 2016.
    Revised from A Clean Slate Design for Secure Wireless Ad-hoc Networks — Part 2: Open Unsynchronized Networks, 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt 2015), Mumbai India, May 2015.
  10. Jonathan Ponniah, Yih-Chun Hu, and P. R. Kumar. A System-Theoretic Clean Slate Approach to Provably Secure Ad-Hoc Wireless Networking, IEEE Transactions on Control of Network Systems, 3(2):206–217, IEEE June 2016.
    Revised from A Clean Slate Design for Secure Wireless Ad-hoc Networks — Part 1: Closed Synchronized Networks, 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt 2015), Mumbai India, May 2015.
  11. Sang-Yoon Chang, Yih-Chun Hu, and Nicola Laurenti. SimpleMAC: A Simple Wireless MAC-Layer Countermeasure to Intelligent and Insider Jammers, IEEE/ACM Transactions on Networking (ToN), 24(2):1095–1108, IEEE April 2016.
    Revised from SimpleMAC: a Jamming-Resilient MAC-Layer Protocol for Wireless Channel Coordination. Proceedings of the Eighteenth Annual International Conference on Mobile Computing and Networking (MobiCom 2012), ACM, Istanbul, Turkey, August 2012, pp. 77–88.
  12. Jonathan Ponniah, Yih-Chun Hu, and P. R. Kumar. A Clean Slate Approach to Secure Wireless Networking, Foundations and Trends in Networking, 9(1):1–105, August 2015.
  13. Dongho Kim and Yih-Chun Hu. A Study on False Channel Condition Reporting Attacks in Wireless Networks. IEEE Transactions on Mobile Computing (TMC), 13(5):935–947, IEEE August 2013.
    Revised from A Study on False Channel Condition Reporting Attacks in Wireless Networks. Proceedings of the Sixth International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2010), Singapore, September 2010, pp. 235–252.
  14. Jonathan Ponniah, Yih-Chun Hu, and P. R. Kumar. An Orthogonal Multiple-Access Coding Scheme, Communications in Information and Systems, 12(1):41–76, 2012.
  15. Jerry T. Chiang, Jason J. Haas, Jihyuk Choi, and Yih-Chun Hu. Secure Location Verification Using Simultaneous Multilateration. IEEE Transactions on Wireless Communications (TWC), 11(2):584–591, IEEE February 2012.
    Revised from Jerry T. Chiang, Jason J. Haas, and Yih-Chun Hu Secure and Precise Location Verification Using Distance Bounding and Simultaneous Multilateration. Proceedings of the Second ACM Conference on Wireless Network Security (WiSec 2009), ACM, Zurich, Switzerland, March 2009, pp. 181–192.
  16. Jason J. Haas, Yih-Chun Hu, and Kenneth P. Laberteaux. Efficient Certificate Revocation List Distribution. Journal of Selected Areas in Communications (JSAC), Special Issue on Vehicular Communications and Networks, 29(3):595–604, IEEE, March 2011.
    Revised from Security Certificate Revocation List Distribution for VANET. Proceedings of the Fifth ACM International Workshop on VehiculAr Inter-NETworking (VANET 2008), ACM, San Francisco, CA, September 2008, pp. 88–89.
  17. Jerry T. Chiang and Yih-Chun Hu. Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks. IEEE/ACM Transactions on Networking, 19(1):286–298, IEEE, February 2011.
    Revised from Dynamic Jamming Mitigation for Wireless Broadcast Networks. Proceedings of the Twenty-Seventh Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2008), IEEE, Phoenix, Arizona, April 2008, pp. 1211–1219.
  18. Kyung-Joon Park, Jihyuk Choi, Jennifer C. Hou, Yih-Chun Hu and Hyuk Lim. Optimal Physical Carrier Sense in Wireless Networks. Ad Hoc Networks Journal, 9(1):16–27, Elsevier Science, January 2011.
  19. Jason J. Haas, Yih-Chun Hu, and Kenneth P. Laberteaux. The Impact of Key Assignment on VANET Privacy. Security and Communication Networks, 3(2):233–249, John Wiley & Sons, Ltd., March 2010.
  20. Qing Li, Meiyuan Zhao, Jesse Walker, Yih-Chun Hu, Adrian Perrig, and Wade Trappe. SEAR: A Secure Efficient Ad Hoc On Demand Routing Protocol for Wireless Networks. Security and Communications Networks, 2(4):325–340, John Wiley & Sons, Ltd., July 2009.
    Revised from SEAR: A Secure Efficient Ad Hoc On Demand Routing Protocol for Wireless Networks. Proceedings of the 3rd annual ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS 2008), ACM, Tokyo, Japan, March 2008, pp. 201–204.
  21. Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Wormhole Attacks in Wireless Networks. Journal of Selected Areas in Communications (JSAC), Special Issue on Security in Wireless Ad Hoc Networks, IEEE, February 2006.
    Revised from Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003), pp. 1976–1986, IEEE, San Francisco, CA, April 2003.
    Revised from Technical Report TR01-384, Department of Computer Science, Rice University, December 2001.
  22. Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. Wireless Networks (WINET) 11(1–2):21–38, special issue of best papers from MobiCom 2002, ACM and Kluwer Academic Publishers, January 2005.
    Revised from Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom 2002), pp. 12–23, ACM, Altanta, GA, September 2002.
    Revised from Technical Report TR01-383, Department of Computer Science, Rice University, December 2001. Revised March 2002.
  23. Yih-Chun Hu and Adrian Perrig. A Survey of Secure Wireless Ad Hoc Routing. IEEE Security & Privacy 2(3):28–39, special issue on Making Wireless Work, IEEE, May/June 2004.
  24. Yih-Chun Hu, David B. Johnson, and Adrian Perrig. SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks, Ad Hoc Networks Journal 1(1):175–192, Elsevier Science, July 2003.
    Revised from SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks, Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002), pp. 3–13, IEEE, Calicoon, NY, June 2002.

Conference and Workshop Papers

  1. Seyedali Tabaeiaghdaei, Filippo Costa, Jonghoon Kwon, Patrick Bamert, Yih-Chun Hu and Adrian Perrig. Debuglet: Programmable and Verifiable Inter-domain Network Telemetry. Proceedings of the 44th IEEE International Conference on Distributed Computing Systems (ICDCS 2024), IEEE, Jersey City, New Jersey, July 2024, pp. 255–265.
  2. Bo-Rong Chen, Jiayu Zhu, Yanxin Jiang, and Yih-Chun Hu. vRetention: A User Viewing Dataset for Popular Video Streaming Services. Proceedings of the 15th ACM Multimedia Systems Conference (MMSys '24), ACM, Bari, Italy, April 2024, pp. 313–318.
  3. Jinhui Song, Bo-Rong Chen, Bowen Song, Anyu Ying, and Yih-Chun Hu. FlowBot: A Learning based Co-bottleneck Flow Detector for Video Servers. Proceedings of the 31st IEEE International Conference on Network Protocols (ICNP 2023), IEEE, Reykjavik, Iceland, October 2023.
  4. Bo-Rong Chen, Zhuotao Liu, Jinhui Song, Fanhui Zeng, Zhoushi Zhu, Siva Phani Keshav Bachu, and Yih-Chun Hu. FlowTele: Remotely Shaping Traffic on Internet-Scale Networks. Proceedings of the 18th International Conference on emerging Networking EXperiments and Technologies (CoNEXT 2022), ACM, Rome, Italy, December 2022, pp. 349–-368.
  5. Bo-Rong Chen, Hsin-Tien Chiang, Heng-Cheng Kuo, Yu Tsao, and Yih-Chun Hu. Key Generation with Ambient Audio. Proceedings of the IEEE Global Communications Conference (GLOBECOM 2022), IEEE, Rio de Janeiro, Brazil, December 2022, pp. 5510–5515.
  6. Utku Tefek, Ertem Esiner, Daisuke Mashima, and Yih-Chun Hu. Analysis of Message Authentication Solutions for IEC 61850 in Substation Automation Systems. Proceedings of the 2022 IEEE International Conference on Smart Grid Communications (SmartGridComm), IEEE, Singapore, Singapore, October 2022, pp. 224–230.
  7. Utku Tefek, Ertem Esiner, Lin Wei, and Yih-Chun Hu. TASC: Transparent, Agnostic, Secure Channel for CBTC Under Failure or Cyberattack. Proceedings of Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification (RSSRail 2022), Springer-Verlag Lecture Notes in Computer Science (LNCS), Springer-Verlag, Paris, France, June 2022, pp. 211–237.
  8. Utku Tefek, Ertem Esiner, Daisuke Mashima, Binbin Chen, and Yih-Chun Hu. Caching-based Multicast Message Authentication in Time-critical Industrial Control Systems. Proceedings of the 41st IEEE International Conference on Computer Communications (INFOCOM 2022), IEEE, Online, May 2022, pp. 1039–1048.
  9. Hsun Lee, Yuming Hsu, Jing-Jie Wang, Hao Cheng Yang, Yu-Heng Chen, Yih-Chun Hu, and Hsu-Chun Hsiao. HeadStart: Efficiently Verifiable and Low-Latency Participatory Randomness Generation at Scale. Proceedings of the 29th Annual Network and Distributed System Security Symposium (NDSS 2022), ISOC, San Diego, CA, April 2022.
  10. Hsin-Tien Chiang, Yi-Chiao Wu, Cheng Yu, Tomoki Toda, Hsin-Min Wang, Yih-Chun Hu, and Yu Tsao. HASA-Net: A Non-Intrusive Hearing-Aid Speech Assessment Network. Proceedings of the 2021 IEEE Automatic Speech Recognition and Understanding Workshop (ASRU), IEEE, Cartagena, Colombia, December 2021, pp. 907–913.
  11. Bo-Rong Chen and Yih-Chun Hu. Mitigating denial-of-service attacks on digital contact tracing: poster abstract. Proceedings of the 18th Conference on Embedded Networked Sensor Systems (SenSys 2020), ACM, Online, November 2020, pp. 770–771.
  12. Hui Lin, Jianing Zhuang, Yih-Chun Hu, and Huayu Zhou. DefRec: Establishing Physical Function Virtualization to Disrupt Reconnaissance of Power Grids' Cyber-Physical Infrastructures. Proceedings of the 27th Annual Network and Distributed System Security Symposium (NDSS 2020), ISOC, San Diego, CA, February 2020, pp. 1–18.
  13. Bo Wu, Ke Xu, Qi Li, Zhuotao Liu, Yih-Chun Hu, Zhichao Zhang, Xinle Du, Bingyang Liu and Shoushou Ren. SmartCrowd: Decentralized and Automated Incentives for Distributed IoT System Detection. Proceedings of the 39th International Conference on Distributed Computing Systems (ICDCS 2019), IEEE, Dallas, Texas, July 2019, pp. 1106–1116.
  14. Hao Wu, Hsu-Chun Hsiao, Daniele E. Asoni, Simon Scherrer, Adrian Perrig and Yih-Chun Hu. CLEF: Limiting the Damage Caused by Large Flows in the Internet Core. Proceedings of the 17th International Conference on Cryptology And Network Security (CANS 2018), Springer-Verlag Lecture Notes in Computer Science (LNCS), Springer-Verlag, Naples, Italy, September 2018, pp. 89–108.
  15. Subhash Lakshminarayana, Jabir Shabbir Karachiwala, Sang-Yoon Chang, Girish Revadigar, Sristi Lakshmi Sravana Kumar, David K.Y. Yau, and Yih-Chun Hu. Signal Jamming Attacks Against Communication-Based Train Control: Attack Impact and Countermeasure. Proceedings of the Eleventh ACM Conference on Wireless Network Security (WiSec 2018), ACM, Stockholm, Sweden, June 2018, pp. 160–171.
  16. Bo Wu, Ke Xu, Qi Li, Zhuotao Liu, Yih-Chun Hu, Martin J. Reed, Meng Shen, and Fan Yang. Enabling Efficient Source and Path Verification via Probabilistic Packet Marking. Proceedings of the 26th International Symposium on Quality of Service (IWQoS 2018), ACM/IEEE, Banff, Alberta, Canada, June 2018, pp. 1–10.
  17. Zhuotao Liu, Kai Chen, Haitao Wu, Shuihai Hu, Yih-Chun Hu, Yi Wang, and Gong Zhang. Enabling Work-conserving Bandwidth Guarantees for Multi-tenant Datacenters via Dynamic Tenant-Queue Binding. Proceedings of the 37th IEEE International Conference on Computer Communications (INFOCOM 2018), IEEE, Honolulu, Hawaii, April 2018, pp. 1–9.
  18. Jagadeesh Harshan and Yih-Chun Hu. Cognitive Radio from Hell: Flipping Attack on Direct-Sequence Spread Spectrum. Proceedings of the 2018 IEEE Wireless Communications and Networking Conference (WCNC 2018), IEEE, Barcelona, Spain, April 2018, pp. 1–6.
  19. Seungmin Kang, Sravana Sristi, Jabir Karachiwala, and Yih-Chun Hu. Detection of Anomaly in Train Speed for Intelligent Railway Systems. Proceedings of the 2018 International Conference on Control, Automation and Diagnosis (ICCAD 18), IEEE, Marrakech, Morocco, March 2018, pp. 1–6.
  20. Zhuotao Liu, Yushan Liu, Philipp Winter, Prateek Mittal, and Yih-Chun Hu. TorPolice: Towards Enforcing Service-Defined Access Policies for Anonymous Communication in the Tor Network. Proceedings of the 25th IEEE International Conference on Network Protocols (ICNP 2017), IEEE, Toronto, Canada, October 2017, pp. 1–10.
  21. Chang-Wu Chen, Sang-Yoon Chang, Yih-Chun Hu, and Yen-Wen Chen. Protecting Vehicular Networks Privacy in the Presence of a Single Adversarial Authority. Proceedings of the 2017 IEEE Conference on Communications and Network Security (CNS 2017), IEEE, Las Vegas, Nevada, October 2017, pp. 1–9.
  22. Jagadeesh Harshan, Sang-Yoon Chang, Seungmin Kang, and Yih-Chun Hu. Securing Balise-based Train Control Systems using Cryptographic Random Fountains. Proceedings of the IEEE International Workshop on Cyber-Physical Systems Security (CPS-Sec 2017), IEEE, Las Vegas, Nevada, October 2017, pp. 405–410.
  23. Sang-Yoon Chang, Sristi Lakshmi Sravana Kumar, Bao Anh N. Tran, Sreejaya Viswanathan, Younghee Park, and Yih-Chun Hu. Power-Positive Networking Using Wireless Charging: Protecting Energy Against Battery Exhaustion Attacks. Proceedings of the Tenth ACM Conference on Wireless Network Security (WiSec 2017), ACM, Boston, MA, July 2017, pp. 52–57.
  24. Sang-Yoon Chang, Sristi Lakshmi Sravana Kumar, and Yih-Chun Hu. Demo: Performance Of Cognitive Wireless Charger For Near-Field Wireless Charging. Proceedings of the 37th International Conference on Distributed Computing Systems (ICDCS 2017), IEEE, Atlanta, GA, June 2017, pp. 2302–2307.
  25. Sang-Yoon Chang, Sristi Lakshmi Sravana Kumar, and Yih-Chun Hu. Cognitive Wireless Charger: Real-Time Frequency Control with Implicit Feedback for Near-Field Wireless Charging. Proceedings of the 37th International Conference on Distributed Computing Systems (ICDCS 2017), IEEE, Atlanta, GA, June 2017, pp. 2302–2307.
  26. Taeho Lee, Christos Pappas, Adrian Perrig, Virgil Gligor, and Yih-Chun Hu. The Case for In-Network Replay Suppression. Proceedings of the 12th annual ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS 2017), ACM, Abu Dhabi, UAE, April 2017, pp. 862–873.
  27. Jagadeesh Harshan, Sang-Yoon Chang, and Yih-Chun Hu. Insider-Attacks on Physical-Layer Group Secret-Key Generation in Wireless Networks. Proceedings of the 2017 IEEE Wireless Communications and Networking Conference (WCNC 2017), IEEE, San Francisco, CA, March 2017, pp. 1–6.
  28. Sang-Yoon Chang, Shaoying Cai, Hwajung Seo and Yih-Chun Hu. Key Updates at Train Stations: Two-Layer Dynamic Key Update Scheme for Secure Train Communications. Proceedings of the 12th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2016), Guangzhou, China, October 2016, pp. 125–143.
  29. Hao Wu and Yih-Chun Hu. Location Privacy with Randomness Consistency. Proceedings on Privacy Enhancing Technologies (PETS 2016), de Gruyter Open, Darmstadt, Germany, July 2016, pp. 62–82.
  30. Sang-Yoon Chang, Bao Anh N. Tran, Yih-Chun Hu, and Douglas L. Jones. Jamming with Power Boost: Leaky Waveguide Vulnerability in Train Systems. Proceedings of IEEE International Conference on Parallel and Distributed Systems (ICPADS 2015), IEEE, Melbourne, Australia, December 2015, pp. 37–43. Invited paper.
  31. Sang-Yoon Chang, Jemin Lee, and Yih-Chun Hu. Noah: Keyed Noise Flooding for Wireless Confidentiality. Proceedings of ACM International Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet 2015), ACM, Cancun, Mexico, November 2015, pp. 141–148.
  32. Sang-Yoon Chang, Yih-Chun Hu, and Zhuotao Liu. Securing Wireless Medium Access Control Against Insider Denial-of-Service Attackers. Proceedings of IEEE Conference on Communications and Network Security (CNS 2015), IEEE, Florence, Italy, September 2015, pp. 370–378.
  33. Hao Wu, Hsu-Chun Hsiao, Yih-Chun Hu. Efficient Large Flow Detection over Arbitrary Windows: An Algorithm Exact Outside an Ambiguity Region. Proceedings of the 2014 ACM Internet Measurement Conference (IMC 2014), ACM, Vancouver, BC, November 2014, pp. 209–222.
  34. Fuyuan Zhang, Limin Jia, Cristina Basescu, Tiffany Hyun-Jin Kim, Yih-Chun Hu, and Adrian Perrig. Mechanized Network Origin and Path Authenticity Proofs. Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS 2014), ACM, Scottsdale, AZ, November 2014, pp. 346–357.
  35. Tiffany Hyun-Jin Kim, Cristina Basescu, Limin Jia, Soo Bum Lee, Yih-Chun Hu, Adrian Perrig. Lightweight Source Authentication and Path Validation. Proceedings of the 2014 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM 2014), ACM, Chicago, IL, August 2014, pp. 271–284. Republished in ACM SIGCOMM Computer Communication Review 44(4):271–282, ACM, New York, NY, October 2014.
  36. Qi Li, Yih-Chun Hu, Xinwen Zhang. Even Rockets Cannot Make Pigs Fly Sustainably: Can BGP Be Secure with BGPsec? Proceedings of the NDSS Workshop on Security of Emerging Networking Technologies (SENT 2014), San Diego, CA, February 2014, pp. 1–6.
  37. Jerry T. Chiang, Yih-Chun Hu, and Pulkit Yadav. Secure Cooperative Spectrum Sensing Based on Sybil-Resilient Clustering. Proceedings of the IEEE Global Communications Conference (GLOBECOM 2013), IEEE, Atlanta, GA, December 2013, pp. 1075–1081.
  38. Jerry T. Chiang and Yih-Chun Hu. Diffie's Wireless Phone: Heterodyning-Based Physical-Layer Encryption. Proceedings of the IEEE Military Communications Conference (MILCOM 2013), IEEE, San Diego, CA, November 2013, pp. 470–475.
  39. Jerry T. Chiang and Yih-Chun Hu. JIM-Beam: Using Spatial Randomness to Build Jamming-Resilient Wireless Flooding Networks. Proceedings of the IEEE Military Communications Conference (MILCOM 2013), IEEE, San Diego, CA, November 2013, pp. 464–469.
  40. Sang-Yoon Chang, Yih-Chun Hu, Jerry T. Chiang, and Soo-Young Chang. Redundancy offset narrow spectrum: countermeasure for signal-cancellation based jamming. Proceedings of the 11th ACM International Symposium on Mobility Management and Wireless Access (MobiWac 2013), ACM, Barcelona, Spain, pp. 51–58. November 2013.
  41. Jerry T. Chiang and Yih-Chun Hu. Did You Also Hear That? Spectrum Sensing Using Hermitian-Inner-Product. Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM 2013), IEEE, Turin, Italy, April 2013, pp. 2229–2237.
  42. Jerry T. Chiang, Tianzhu Zhang, Binbin Chen, and Yih-Chun Hu. Load Disaggregation Using Harmonic Analysis and Regularized Optimization. Proceedings of the APSIPA Annual Summit and Conference (ASC 2012), IEEE, Los Angeles, CA, December 2012.
  43. Farhana Ashraf, Yih-Chun Hu, and Robin H. Kravets. Bankrupting the Jammer in WSN. Proceedings of the 9th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2012), IEEE, Las Vegas, NV, October 2012.
  44. Sang-Yoon Chang, Yih-Chun Hu, Hans Anderson, Ting Fu, and Evelyn Y. L. Huang. Body Area Network Security: Robust Key Establishment Using Human Body Channel. Proceedings of the 3rd USENIX Workshop on Health Security and Privacy (HealthSec 2012), USENIX, Bellevue, WA, August 2012.
  45. Parisa Haghani and Yih-Chun Hu. Power Control for Fair Dynamic Channel Reservation in VANETs. Proceedings of the 9th IEEE Communications Society Conference (SECON 2012), IEEE, Seoul, South Korea, June 2012, pp. 659–667.
  46. Jerry T. Chiang, Dongho Kim, and Yih-Chun Hu. JIM-Beam: using Spatial Randomness to Build Jamming-Resilient Wireless Flooding Networks. Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2012), ACM, Hilton Head Island, SC, June 2012, pp. 255–256 (poster).
  47. Dongho Kim, Danesh Esteki, Yih-Chun Hu, and P. R. Kumar. A Lightweight Determinstic MAC Protocol Using Low Cross-Correlation Sequences. Proceedings of the IEEE Globecom 2011, Symposium on Selected Areas in Communications (GLOBECOM 2011), IEEE, Houston, TX, December 2011, pp. 1–6.
  48. Jason J. Haas, Yih-Chun Hu, and Nicola Laurenti. Low-Cost Mitigation of Privacy Loss due to Radiometric Identification. Proceedings of the Eighth ACM International Workshop on Vehicular Ad Hoc Networks (VANET 2011), ACM, Las Vegas, NV, September 2011, pp. 31–40.
  49. Farhana Ashraf, Yih-Chun Hu, and Robin H. Kravets. Bankrupting the Jammer. Proceedings of the 8th IEEE Communications Society Conference (SECON 2011), IEEE, Salt Lake City, UT, June 2011, pp. 149–151 (short paper).
  50. Farhana Ashraf, Yih-Chun Hu, and Robin H. Kravets. Demo: Bankrupting the Jammer. Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services (MobiSys 2011), ACM, Washington, DC, June 2011, pp. 379–380.
  51. Jihyuk Choi, Sang-Yoon Chang, Diko Ko, and Yih-Chun Hu. Secure MAC-Layer Protocol for Captive Portals in Wireless Hotspots. Proceedings of the IEEE International Conference on Communications (ICC 2011), IEEE, Kyoto, Japan, June 2011, pp. 1–5.
  52. Bisheng Liu, Jerry T. Chiang, Jason J. Haas, and Yih-Chun Hu. Short Paper: A Practical View of “Mixing” Identities in Vehicular Networks. Proceedings of the Fourth ACM Conference on Wireless Network Security (WiSec 2011), ACM, Hamburg, Germany, June 2011, pp. 157–162.
  53. Francesco Renna, Nicola Laurenti, and Yih-Chun Hu. The Jamming Game in an OFDM Setting. Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools (VALUETOOLS '11), ICST, Cachan, France, May 2011, pp. 496–505.
  54. Roberto Solis Robles, Jason J. Haas, Jerry T. Chiang, Yih-Chun Hu, and P. R. Kumar. Secure Network-Wide Clock Synchronization in Wireless Sensor Networks. Proceedings of the 49th IEEE Conference on Decision and Control (CDC 2010), IEEE, Atlanta, GA, December 2010, pp. 5616–5621.
  55. Dongho Kim, Jerry T. Chiang, Yih-Chun Hu, Adrian Perrig, and P. R. Kumar. CRAFT: a New Secure Congestion Control Architecture. Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS 2010), ACM, Chicago, IL, October 2010, pp. 705–707 (poster).
  56. Jason J. Haas and Yih-Chun Hu. Communication Requirements for Crash Avoidance. Proceedings of the Seventh ACM International Workshop on Vehicular Ad Hoc Networks (VANET 2010), ACM, Chicago, IL, September 2010, pp. 1–10.
  57. Jihyuk Choi, Dongho Kim, Jerry T. Chiang, and Yih-Chun Hu. Partial Deafness: a Novel Denial-of-Service Attack in 802.11 Networks. Proceedings of the Sixth International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2010), Singapore, September 2010, pp. 107–124.
  58. Roberto Solis Robles, Jason J. Haas, Jerry T. Chiang, Yih-Chun Hu, and P. R. Kumar. Secure Topology Discovery through Network-Wide Clock Synchronization. Proceedings of the 8th International Conference on Signal Processing and Communications (SPCOM 2010), Bangalore, India, July 2010, pp. 1–5, invited paper.
  59. Bisheng Liu, Jerry T. Chiang, and Yih-Chun Hu. Limits on Revocation in VANETs. Proceedings of the 8th International Conference on Applied Cryptography and Network Security (ACNS 2010), Beijing, China, June 2010, pp. 38–52.
  60. Jason J. Haas, Yih-Chun Hu, and Kenneth P. Laberteaux. Real-World VANET Security Protocol Performance. Proceedings of the IEEE Globecom 2009, Symposium on Selected Areas in Communications (GLOBECOM 2009), IEEE, Honolulu, HI, November 2009.
  61. Jason J. Haas and Yih-Chun Hu. Secure Unified Cellular Ad Hoc Network Routing. Proceedings of the IEEE Globecom 2009, Ad Hoc Sensor and Mesh Networking Symposium (GLOBECOM 2009), IEEE, Honolulu, HI, November 2009.
  62. Kyung-Joon Park, Jihyuk Choi, Kyungtae Kang, and Yih-Chun Hu Malicious or Selfish? Analysis of Carrier Sense Misbehavior in IEEE 802.11 WLAN. The Sixth International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (ICST QShine 2009) Las Palmas de Gran Canaria, Spain, November 2009, pp. 351–362.
  63. Jason J. Haas, Yih-Chun Hu, and Kenneth P. Laberteaux. Design and Analysis of a Lightweight Certificate Revocation Mechanism for VANET. Proceedings of the Sixth ACM International Workshop on Vehicular Ad Hoc Networks (VANET 2009). ACM, Beijing, China, September 2009, pp. 89–98.
  64. Jerry T. Chiang, Jason J. Haas, Yih-Chun Hu, P. R. Kumar, and Jihyuk Choi. Fundamental Limits on Secure Clock Synchronization and Detection of Man-in-the-Middle Attacks. Proceedings of the Twenty-Eighth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2009), IEEE, Rio de Janeiro, Brazil, April 2009, pp. 1962–1970.
  65. Jerry T. Chiang and Yih-Chun Hu. Extended Abstract: Cross-Layer Jamming Detection in Wireless Broadcast Networks. Proceedings of the Thirteenth Annual International Conference on Mobile Computing and Networking (MobiCom 2007), ACM, Montréal, Quebec, Canada, September 2007, pp. 346–349.
  66. Bryan Parno, Dan Wendlandt, Elaine Shi, Adrian Perrig, Bruce Maggs, and Yih-Chun Hu. Portcullis: Protecting Connection Setup from Denial-of-Capability Attacks. ACM SIGCOMM Computer Communications Review: Proceedings of the 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM 2007) 37(4):289–300, ACM, Tokyo, Japan, August 2007. Republished in ACM SIGCOMM Computer Communication Review 37(4):289–300, ACM, New York, NY, October 2007.
  67. Tao Jiang, Helen J. Wang, and Yih-Chun Hu. Preserving Location Privacy in Wireless LANs. Proceedings of the 5th International Conference on Mobile Systems, Applications, and Services (MobiSys 2007) ACM, San Juan, Puerto Rico, June 2007, pp. 246–257.
  68. Yih-Chun Hu, David McGrew, Adrian Perrig, Brian Weis, and Dan Wendlandt. (R)Evolutionary Bootstrapping of a Global PKI for Securing BGP. Proceedings of the Fifth Workshop on Hot Topics in Networks (HotNets 2006), ACM, Los Angeles, CA, November 2006.
  69. Yih-Chun Hu and Kenneth P. Laberteaux. Strong VANET Security on a Budget. Proceedings of the 4th Annual Conference on Embedded Security in Cars (escar 2006), is-its, Berlin, Germany, November 2006.
  70. Yih-Chun Hu, Markus Jakobsson and Adrian Perrig. Efficient Constructions for One-Way Hash Chains. Proceedings of the 2005 Conference on Applied Cryptography and Network Security (ACNS 2005), Springer-Verlag Lecture Notes in Computer Science (LNCS) 3531, Springer-Verlag, New York, New York, June 2005, pp. 423–441.
    Revised from Technical Report CMU-CS-03-220, Computer Science Department, Carnegie Mellon University, November 2003.
  71. Yih-Chun Hu and Helen J. Wang. A Framework for Location Privacy in Wireless Networks. Proceedings of the 2005 SIGCOMM Asia Workshop, ACM, Beijing, China, April 2005.
  72. Yih-Chun Hu and David B. Johnson. Securing Quality-of-Service Routing in On-Demand Protocols for Ad Hoc Networks. Proceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2004), ACM, Washington, DC, October 2004, pp. 106–117.
  73. Yih-Chun Hu, Adrian Perrig, and Marvin Sirbu. SPV: A Secure Path Vector Scheme for Securing BGP. Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM 2004), ACM, Portland, OR, September 2004, pp. 179–192. Republished in ACM SIGCOMM Computer Communication Review 34(4):179–192, ACM, New York, NY, October 2004.
  74. Yih-Chun Hu and David B. Johnson. Exploiting Congestion Information in Higher Layer Protocols in Multihop Wireless Ad Hoc Networks. Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), IEEE, Tokyo, Japan, March 2004, pp. 301–310.
    Revised from Technical Report TR02-405, Department of Computer Science, Rice University, May 2002.
  75. Helen J. Wang, Yih-Chun Hu, Chun Yuan, Zheng Zhang, and Yi-Min Wang. Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting. Proceedings of the 3rd International Workshop on Peer-to-Peer Systems (IPTPS 2004), Springer-Verlag Lecture Notes in Computer Science (LNCS) 3279, Springer-Verlag, San Diego, CA, February 2004, pp. 184–194.
  76. Jorjeta G. Jetcheva, Yih-Chun Hu, Santashil PalChaudhuri, Amit Kumar Saha, and David B. Johnson. Design and Evaluation of a Metropolitan Area Multitier Wireless Ad Hoc Network Architecture. Proceedings of the 5th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2003), IEEE, Monterey, CA, October 2003, pp. 32–43,
  77. Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols. Proceedings of the ACM Workshop on Wireless Security (WiSe 2003), ACM, San Diego, CA, September 2003, pp. 30–40.
    Revised from Technical Report TR02-403, Department of Computer Science, Rice University, May 2002.
  78. Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Efficient Security Mechanisms for Routing Protocols. Proceedings of the Tenth Annual Network and Distributed System Security Symposium (NDSS 2003), ISOC, San Diego, CA, February 2003, pp. 57–73. {\footnotesize \url{https://www.ndss-symposium.org/ndss2003/efficient-security-mechanisms-for-routing-protocols/}}
  79. Yih-Chun Hu and David B. Johnson. Ensuring Cache Freshness in On-Demand Ad Hoc Network Routing Protocols. Proceedings of the Second Workshop on Principles of Mobile Computing (POMC 2002), ACM, Toulouse, France, October 2002, pp. 25–30.
  80. Yih-Chun Hu and David B. Johnson. Design and Demonstration of Live Audio and Video over Multihop Wireless Ad Hoc Networks. Proceedings of the IEEE Military Communications Conference (MILCOM 2002), IEEE, Anaheim, CA, October 2002, pp. 1211–1216.
  81. Yih-Chun Hu and David B. Johnson. Implicit Source Routes for On-Demand Ad Hoc Network Routing. Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2001), ACM, Long Beach, CA, October 2001, pp. 1–10.
  82. Yih-Chun Hu and David B. Johnson. Caching Strategies in On-Demand Routing Protocols for Wireless Ad Hoc Networks. Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCom 2000), ACM, Boston, MA, August 2000, pp. 231–242.
  83. Josh Broch, David A. Maltz, David B. Johnson, Yih-Chun Hu, and Jorjeta Jetcheva. A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Proceedings of the Fourth Annual International Conference on Mobile Computing and Networking (MobiCom 1998), ACM, Dallas, TX, October 1998, pp. 85–97.

Technical Reports

  1. Yih-Chun Hu. Enabling Secure High-Performance Wireless Ad Hoc Networking. Ph.D. Dissertation. Technical Report CMU-CS-03-144, Computer Science Department, Carnegie Mellon University, May 2003.
  2. Yih-Chun Hu, Jorjeta G. Jetcheva, and Oleg M. Sheyner. Receiver-Controlled Cooperative Resource Sharing. Technical Report CMU-CS-02-202, Computer Science Department, Carnegie Mellon University, December 2002.

Standards Organization Publications

  1. David B. Johnson, David A. Maltz, and Yih-Chun Hu. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR). Internet Engineering Task Force (IETF) Request for Comments (RFC) 4728, Feburary 2007. Previous versions published as an Internet-Draft July 19, 2004, April 16, 2003, March 6, 2003, February 21, 2002, November 21, 2001, March 2, 2001, and November 17, 2000.
  2. Jorjeta G. Jetcheva, Yih-Chun Hu, David A. Maltz, and David B. Johnson. A Simple Protocol for Multicast and Broadcast in Mobile Ad Hoc Networks. Internet-Draft, Internet Engineering Task Force (IETF), draft-ietf-manet-simple-mbcast-01, July 20, 2001. Previous version published November 17, 2000.
  3. Yih-Chun Hu, David B. Johnson, and David A. Maltz. Flow State in the Dynamic Source Routing Protocol for Mobile Ad Hoc Networks. Internet-Draft, Internet Engineering Task Force (IETF), draft-ietf-manet-dsrflow-00, February 23, 2001.

Patents

  1. Kenneth P. Laberteaux, Yih-Chun Hu, and Jason Haas. Method for distributing a list of certificate revocations in a vanet. US Patent #9,461,827, issued October 4, 2016.
  2. Kenneth P. Laberteaux, Yih-Chun Hu, and Jason Haas. Method for allocating multiple authentication certificates to vehicles in a vehicle-to-vehicle communication network. US Patent #8,230,215, issued July 24, 2012.
  3. Kenneth P. Laberteaux and Yih-Chun Hu. Method for exchanging messages and verifying the authenticity of the messages in an ad hoc network. US Patent #7,934,095, issued April 26, 2011.