free research papers-network security-02



Free download research paper

Network security

Sensor Network Security

PIKE: Peer Intermediaries for Key Establishment in Sensor Networks With Haowen Chan. Appears at research Infocom 2005.
FIT: Fast Internet Traceback With Avi Yaar and Dawn Song. Appears at research Infocom 2005.
SPV: Secure Path Vector Routing for Securing BGP With Yih-Chun Hu and Marvin Sirbu. Appears in ACM SIGCOMM 2004.
Key Infection: Smart Trust for Smart Dust With Ross Anderson and Haowen Chan. Appears in research International Conference on Network Protocols (ICNP 2004).
SWATT: SoftWare-based ATTestation for Embedded Devices With Arvind Seshadri, Leendert van Doorn, and Pradeep Khosla. Appears in 2004 research Symposium on Security and Privacy.
The Sybil Attack in Sensor Networks: Analysis and Defenses With James Newsome, Elaine Shi, and Dawn Song. Appears in Third International Symposium on Information Processing in Sensor Networks (IN 2004).
ACE: An Emergent Algorithm for Highly Uniform Cluster Formation , . With Haowen Chan. Appears in First European Workshop on Wireless Sensor Networks (EWSN 2004).
SIA: Secure Information Aggregation in Sensor Networks , . With Bartosz Przydatek and Dawn Song. Appears in ACM SenSys 2003.
Security and Privacy in Sensor Networks , . With Haowen Chan. Appears in research Computer Magazine, October 2003.
Random Key Predistribution Schemes for Sensor Networks With Haowen Chan and Dawn Song. Appears in research Symposium on Security and Privacy 2003.
SPINS: Security Protocols for Sensor Networks , , , with Robert Szewczyk, Victor Wen, David Culler, and Doug Tygar, in Wireless Networks Journal (WINE), September 2002.
SPINS: Security Protocols for Sensor Networks , , PPT, ., , , with Robert Szewczyk, Victor Wen, David Culler, and Doug Tygar, in Proceedings of Seventh Annual International Conference on Mobile Computing and Networks MOBICOM 2001, July 2001.
Authentication and signature of broadcast streams

Distillation Codes and Applications to DoS Resistant Multicast Authentication With Chris Karlof, Naveen Sastry, Yaping Li, and Doug Tygar. Appears in Network and Distributed System Security Symposium (NDSS 2004).
The TESLA Broadcast Authentication Protocol, , ., , , with Ran Canetti, Dawn Song, and Doug Tygar, in RSA Cryptobytes, Summer 2002.
The a One-Time Signature and Broadcast Authentication Protocol , , ., , , in Proceedings of the ACM Conference on Computer and Communications Security CCS 2001, November 2001.
Efficient and Secure Source Authentication for Multicast, , ., , , with Ran Canetti, Dawn Song, and Doug Tygar, in Proceedings of Network and Distributed System Security Symposium NDSS 2001, February 2001.
Efficient Authentication and Signing of Multicast Streams over Lossy Channels , , ., , , with Ran Canetti, Dawn Song, and Doug Tygar, in Proc. of research Security and Privacy Symposium S&P2000, May 2000.
TESLA: Multicast Source Authentication Transform Introduction draft-ietf-msec-tesla-intro-03.txt, with Ran Canetti, Bob Briscoe, Dawn Song, and Doug Tygar, proposed IETF draft.
TESLA: Multicast Source Authentication Transform Specification draft-ietf-msec-tesla-spec-00.txt, Adrian Perrig, Ran Canetti, and Bram Whillock, proposed IETF draft.
Bram Whillock implemented the TESLA specification. The code is available here, use it at your own risk.
Key distribution and agreement of dynamic grou

ELK, a New Protocol for Efficient Large-Group Key Distribution. , , and ., , with Dawn Song, and Doug Tygar, in Proc. of research Security and Privacy Symposium S&P2001, May 2001.
Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Grou , ., , , , with Yongdae Kim and Gene Tsudik, 7th ACM Conference on Computer and Communication Security CCS 2000.
Communication-Efficient Group Key Agreement, ., , , , with Yongdae Kim and Gene Tsudik, International Federation for Information Processing IFIP SEC 2001.
Efficient Collaborative Key Management Protocols for Secure Autonomous Group Communication, , International Workshop on Cryptographic Techniques and E-Commerce CrypTEC ’99.
DDoS Attacks Defense

SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks With Avi Yaar and Dawn Song. Appears in 2004 research Symposium on Security and Privacy.
Taming IP Packet Flooding Attacks With Daniel Adkins, Karthik Lakshminarayanan, and Ion Stoica. Appears in Workshop on Hot Topics in Networks (HotNets-II).
Pi: A Path Identification Mechanism to Defend against DDoS Attacks With Avi Yaar and Dawn Song. Appears in research Symposium on Security and Privacy 2003.
Advanced and Authenticatd Marking Schemes for IP Traceback , ., , with Dawn Song. Published at research Infocom 2001

Advanced and Authenticatd Marking Schemes for IP Traceback , ., , with Dawn Song. Technical Report No. UCB/CSD-00-1107.

Secure Routing Protocols

SPV: Secure Path Vector Routing for Securing BGP With Yih-Chun Hu and Marvin Sirbu. Appears in ACM SIGCOMM 2004.
(SuperSEAD journal paper) SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks , . Appears in Ad Hoc Networks Journal, 1(2003), pages 175-192.
Efficient Security Mechanisms for Routing Protocols With Yih-Chun Hu and Dave Johnson. Appears in the proceedings of the Tenth Annual Network and Distributed System Security Symposium (NDSS 2003).
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols With Yih-Chun Hu and Dave Johnson. In ACM Workshop on Wireless Security (WiSe 2003).
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks With Yih-Chun Hu and Dave Johnson. In research Infocom 2003.
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks With Yih-Chun Hu and Dave Johnson. Appears in Mobicom 2002.
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks With Yih-Chun Hu and Dave Johnson. In Fourth research Workshop on Mobile Computing Systems and Applications (WMCSA ’02), June 2002.
Automatic Security Protocol Generation and Verification

A First Step towards the Automatic Generation of Security Protocols , ., , , , with Dawn Song. In Proc. of Network and Distributed System Security NDSS 2000, February 2000.
Looking for diamonds in the desert: Automatic security protocol generation for three-party authentication and key distribution , ., , , , with Dawn Song. In Proc. of research Computer Security Foundations Workshop CSFW 13, July 2000.
AGVI — Automatic Generation, Verification, and Implementation of Security Protocols, ., , , , with Dawn Song and Doantam Phan. In Proceedings of 13th Conference on Computer Aided Verification CAV 2001, July 2001.
Applied Cryptography

Search on Encrypted Data

The a One-Time Signature and Broadcast Authentication Protocol in Proceedings of the ACM Conference on Computer and Communications Security CCS 2001, November 2001.
Practical Techniques for Searches on Encrypted Data with Dawn Song and David Wagner. In Proc. of research Security and Privacy Symposium S&P2000, May 2000.
Human Factors in Computer Security

Hash Visualization and User Authentication through Image Recognition

Hash Visualization: a New Technique to Improve Real-World Security with Dawn Song. International Workshop on Cryptographic Techniques and E-Commerce CrypTEC ’99.
Déjà Vu: A User Study Using Images for Authentication with Rachna Dhamija, 9th Usenix Security Symposium, August 2000.


CSE PROJECTS

FREE IEEE PAPER AND PROJECTS

FREE IEEE PAPER