Home | Projects | Publications | Libraries | People | Contacts
Welcome to the Wireless Security Laboratory (WSL) of the College of Computer Science at Northeastern University. We are a cryptography group in the college and our research projects are focusing on various aspects of wireless network and computer security. In the past we have developed efficient software based stream ciphers (SSC2), and implemented various cryptographic libraries for Palm OS. We have also done research on the authenticated key exchange protocols, especially concerning low power constraints of some wireless devices. Further research effort has been put to investigating efficient algorithm for key distribution for dynamic group, and wireless network simulation.Mini-symposium on Information Security 2004 | |
November 9, 2004, McLeod Suite 318-322 Curry Center, Northeastern University
|
|
Information Security Conference 2002 (ISC '02) | |
September 30 - October 2, 2002, Sao Paulo, Brazil Conference Homepage, Call for Paper and mirror site. |
|
Centers of Academic Excellence in Information Assurance Education | |
In May 2002, Northeastern University was designated as Centers of Academic
Excellence in Information Assurance (IA) Education. This program is
an outreach effort designed and operated by the National Security Agency (NSA) in the spirit
of Presidential Decision Directive 63 (PDD 63), the Clinton Administration's
Policy on Critical Infrastructure Protection, May 1998. The program goal
is to reduce vulnerability in our National Information Infrastructure by
promoting higher education in information assurance, and producing a growing
number of professionals with IA expertise in various disciplines. |
|
A Poster of our Lab Architecture |
Lightweight Cryptography | |
Subcontract from Northwestern University, supported by DARPA(2000-2003) Under construction |
|
Authentication and Key Revocation Protocols for Wireless Networks | |
Supported by DARPA(2000-2003) To maintain high quality of confidentiality and authenticity while still providing versatile key management solution and scalability capability for low-power devices in wireless networks, we investigate the following three areas, with special remark on the low power constraints of these wireless devices:
|
|
Secure Location Related Services | |
Supported by Draper University Research Program (2002-2003) Under construction |
On Local Algorithms for Topology Control and Routing in Ad hoc Networks |
|
L. Jia and C. Scheideler and R. Rajaraman |
|
In Proceedings of the 15th Annual ACM Symposium on Parallel Algorithms and Architectures, pages 220-229, June 2003 (PS) |
|
An Efficient Distributed Algorithm for Constructing Small Dominating Sets |
|
L. Jia and T. Suel and R. Rajaraman |
|
In Distributed Computing 15:193-205, 2002. A preliminary version appears in Proceedings of the Annual ACM Symposium on Principles of Distributed Computing, pages 33-42, August 2001. (PS) |
|
A methodology for estimating inter-domain web traffic demand |
|
A. Feldmann, O. Maennel, N. Kammenhuber, B. Maggs and R. de Prisco and R. Sundaram |
|
Accepted to Internet Measurement Conference (IMC), 2004. (PS) |
|
Managing a portfolio of overlay paths |
|
D. Antonova, A. Krishnamurthy and Z. Ma and Vetta R. Sundaram |
|
Accepted to Networking and Operating Systems Support for Digital Audio and Video (NOSSDAV), 2004.(PS) |
|
(Almost) Tight bounds and existence theorems for confluent flows |
|
J. Chen, R. Kleinberg, L. Lovasz, R. Rajaraman and A. Vetta R. Sundaram |
|
Symposium on Theory of Computing (STOC), 2004. The paper is under review with the Journal of the ACM.(PS) |
|
Meet and merge: approximation algorithms for confluent flows |
|
J. Chen and R. Rajaraman and R. Sundaram |
|
Symposium on Theory of Computing (STOC), pp. 373-382, 2003. The paper is under review with the Journal of Computer Systems and Sciences(PS) |
|
Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorizations and Low-Bandwidth Communication Devices |
|
R. Sundaram R. Gennaro, D. Leigh and W. Yerazunis |
|
To appear in AsiaCrypt 2004.(PDF) |
|
Minimum Energy Accumulative Routing in Wireless Networks |
|
J. Chen, L. Jia, X. Liu, G. Noubir, R. Sundaram |
|
in Proceedings of IEEE Infocom (PDF). |
|
Mobility Models for Ad hoc Network Simulation |
|
G. Lin, G. Noubir, R. Rajaraman |
|
in Proceedings of IEEE Infocom (PDF). |
|
On Connectivity in Ad Hoc Network under Jamming Using Directional Antennas and Mobility |
|
G. Noubir |
|
in International Conference on Wired /Wireless Internet Communications, Lecture Notes in Computer Science, Springer-Verlag (PDF). |
|
Secure Multicast Groups on Ad Hoc Networks |
|
T. Kaya, G. Lin, G. Noubir, A. Yilmaz |
|
in Proceedings of ACM Workshop on Security of Ad hoc and Sensor Networks (PDF). |
|
Secure Sharing of Location Information over Ad Hoc Networks: An Application of Secure Multicast |
|
G. Noubir, G. Lin, M. Golitsine, N. Plante |
|
Poster, ACM Mobihoc, 2003(PDF) |
|
Low Power DoS Attacks in Data Wireless LANs and Countermeasures |
|
G. Noubir, G. Lin |
|
Poster, ACM Mobihoc (PDF) |
|
Secure Multicast over Multihop Wireless Ad Hoc Networks |
|
G. Lin, G. Noubir |
|
in the Proceedings of |
|
Energy Efficient Broadcast with Sectored Antennas in Wireless Ad Hoc Networks |
|
G. Lin, G. Noubir, |
|
in Proceedings of the IASTED/IEEE Wireless and Optical Communications Conference, July 2002 (PDF). |
|
On Link Layer Denial of Service in DATA Wireless LANs |
|
G. Lin, G. Noubir |
|
To appear in the Wiley Journal on Wireless Communications and Mobile Computing, Wiley (PDF). |
|
Improving Goodput of the IEEE 802.11 MAC Protocol by Using Congestion Control Methods |
|
S. Ci, H. Sharif, and G. Noubir |
|
To appear in the International Journal on Wireless and Optical Communications (IJWOC), World Scientific Publishing (PDF). (2003). |
|
Secure Sharing of Location Information over Ad Hoc Networks: An Application of Secure Multicast |
|
G. Noubir, G. Lin, M. Golitsine, N. Plante |
|
in ACM SIGMOBILE Mobile Computing and Communications Review (MC2R), volume 7, Issue 3 (Abstract). |
|
Low Power DoS Attacks in Data Wireless LANs and Countermeasures |
|
G. Noubir, G. Lin |
|
in ACM SIGMOBILE Mobile Computing and Communications Review (MC2R), volume 7, Issue 3 (Abstract). |
|
Password Authenticated Key Exchange for Resource-constrained Wireless Communications | |
Duncan S. Wong, Agnes H. Chan, and Feng Zhu | |
IEEE International Conference on Networking 2005 | |
More Efficient Password Authenticated Key Exchange Based on RSA |
|
Duncan S. Wong, Agnes H. Chan and Feng Zhu (PDF) |
|
indocrypt03 LNCS 2904 pp. 375 - 387 |
|
Optimal Tree Structure for Key Management of Simultaneous Join/Leave in Secure Multicast | |
Feng Zhu, Agnes Chan, Guevara Noubir | |
MILCOM 2003 (PDF) | |
Optimal Tree Structure for Key Management of Simultaneous Join/Leave in Secure Multicast | |
Feng Zhu, Agnes Chan, Guevara Noubir (PDF) | |
Technical Report | |
RSA-based Password Authenticated Key Exchange for Imbalanced Wireless Network | |
Feng Zhu, Agnes H. Chan, Duncan Wong, Robbie Ye (postscript) | |
The Information Security Conference 2002 (ISC'02) |
|
Key Management for Simultaneous Join/Leave in Secure Multicast | |
Guevara Noubir, Feng Zhu, Agnes H. Chan (extended abstract PDF) (full PDF) | |
ISIT 2002 |
|
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices | |
Duncan S. Wong, Agnes H. Chan (postscript) | |
ASIACRYPT 2001 |
|
The Performance Measurement of Cryptographic Primitives on Palm Devices | |
Duncan S. Wong, Hector Ho Fuentes, Agnes H. Chan (postscript) | |
The Proceedings of the 17th Annual Computer Security Applications
Conference (ACSAC 2001) |
|
Mutual Authentication and Key Exchange for Low Power Wireless Communications | |
Duncan S. Wong, Agnes H. Chan (postscript) | |
IEEE MILCOM 2001 Conference proceedings |
|
Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers | |
Muxiang Zhang, Agnes H. Chan (postscript) | |
CRYPTO 2000 |
|
The Software-Oriented Stream Cipher SSC2 | |
Muxiang Zhang, Christopher Carroll, Agnes H. Chan (postscript) | |
Fast Software Encryption Workshop 2000 |
|
Analysis of IS-95 CDMA Voice Privacy | |
Muxiang Zhang, Christopher Carroll, Agnes H. Chan (postscript) | |
Selected Areas in Cryptography 2000 |
MPLib (Multiple-precision Integer Arithmetic Library for Palm OS) | |
Cryptographic Algorithm Libraries for Palm OS | |
This is a collection of cryptographic algorithms implemented as system
libraries for Palm OS. You can also click the following links to go directly
to those libraries. |
|
ECCLib (Elliptic Curve Library for Palm OS) | |
Scribble for Palm OS |
Agnes Hui Chan | <ahchan@ccs.neu.edu> | |
Guevara Noubir | <noubir@ccs.neu.edu> | |
Rajmohan Rajaraman | <rraj@ccs.neu.edu> | |
Ravi Sundaram | <koods@ccs.neu.edu> |
Home | Projects | Publications |
Libraries |
People | Contacts
Copyright 2002-2004 Wireless Security Laboratory,
College of Computer Science, Northeastern University. All rights reserved.
Revised 2004-11-11