Search For:

Displaying 1-50 out of 58 total
DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots
Found in: IEEE Transactions on Mobile Computing
By Maxim Raya, Imad Aad, Jean-Pierre Hubaux, Alaeddine El Fawal
Issue Date:December 2006
pp. 1691-1705
IEEE 802.11 works properly only if the stations respect the MAC protocol. We show in this paper that a greedy user can substantially increase his share of bandwidth, at the expense of the other users, by slightly modifying the driver of his network adapter...
 
Quantifying Location Privacy
Found in: Security and Privacy, IEEE Symposium on
By Reza Shokri, George Theodorakopoulos, Jean-Yves Le Boudec, Jean-Pierre Hubaux
Issue Date:May 2011
pp. 247-262
It is a well-known fact that the progress of personal communication devices leads to serious concerns about privacy in general, and location privacy in particular. As a response to these issues, a number of Location-Privacy Protection Mechanisms (LPPMs) ha...
 
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
Found in: IEEE Transactions on Mobile Computing
By Srdjan Capkun, Levente Buttyán, Jean-Pierre Hubaux
Issue Date:January 2003
pp. 52-64
<p><b>Abstract</b>—In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they exhibit frequent partitioning due to link and node failures ...
 
Efficient and Robust Secure Aggregation for Sensor Networks
Found in: IEEE Workshop on Secure Network Protocols
By Parisa Haghani, Panos Papadimitratos, Marcin Poturalski, Karl Aberer, Jean-Pierre Hubaux
Issue Date:October 2007
pp. 1-6
Wireless Sensor Networks (WSNs) rely on in-network aggregation for efficiency, however, this comes at a price: A single adversary can severely influence the outcome by contributing an arbitrary partial aggregate value. Secure in-network aggregation can det...
 
Wormhole-Based Antijamming Techniques in Sensor Networks
Found in: IEEE Transactions on Mobile Computing
By Mario Cagalj, Srdjan Capkun, Jean-Pierre Hubaux
Issue Date:January 2007
pp. 100-114
Due to their very nature, wireless sensor networks are probably the category of wireless networks most vulnerable to
 
Multi-radio channel allocation in competitive wireless networks
Found in: Distributed Computing Systems Workshops, International Conference on
By Mark Felegyhazi, Mario Cagalj, Jean-Pierre Hubaux
Issue Date:July 2006
pp. 36
Channel allocation has been extensively studied in the framework of cellular networks, but the emergence of new system concepts, such as cognitive radio systems, bring this topic into the focus of research again. In this paper, we provide a formal analysis...
 
Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels
Found in: Security and Privacy, IEEE Symposium on
By Mario Cagalj, Jean-Pierre Hubaux, Srdjan Capkun, Ramkumar Rengaswamy, Ilias Tsigkogiannis, Mani Srivastava
Issue Date:May 2006
pp. 280-294
<p>Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit errors are possible (e.g., it is possible to change a bit
 
Cooperative Packet Forwarding in Multi-Domain Sensor Networks
Found in: Pervasive Computing and Communications Workshops, IEEE International Conference on
By Márk Félegyházi, Jean-Pierre Hubaux, Levente Buttyán
Issue Date:March 2005
pp. 345-349
Sensor networks are large scale networks of low-power devices that collaborate in order to perform a given task. The sensors are limited in battery energy, capacity and computational power. In recent years, researchers have proposed several protocols for s...
 
The Security and Privacy of Smart Vehicles
Found in: IEEE Security and Privacy
By Jean-Pierre Hubaux, Srdjan Capkun, Jun Luo
Issue Date:May 2004
pp. 49-55
Road safety, traffic management, and driver convenience continue to improve, in large part thanks to appropriate usage of information technology. But this evolution has deep implications for security and privacy, which the research community has overlooked...
 
A Formal Analysis of Syverson?s Rational Exchange Protocol
Found in: Computer Security Foundations Workshop, IEEE
By Levente Buttyán, Jean-Pierre Hubaux, Srdjan Capkun
Issue Date:June 2002
pp. 193
In this paper, we provide a formal analysis of a rational exchange protocol proposed by Syverson. A rational exchange protocol guarantees that misbehavior cannot generate benefits, and is therefore discouraged. The analysis is performed using our formal mo...
 
Accountable Anonymous Access to Services in Mobile Communication Systems
Found in: Reliable Distributed Systems, IEEE Symposium on
By Levente Buttyán, Jean-Pierre Hubaux
Issue Date:October 1999
pp. 384
We introduce a model that allows anonymous yet accountable access to services in mobile communication systems. This model is based on the introduction of a new business role, called the customer care agency, and a ticket based mechanism for service access....
 
A Location-Privacy Threat Stemming from the Use of Shared Public IP Addresses
Found in: IEEE Transactions on Mobile Computing
By Nevena Vratonjic,Kevin Huguenin,Vincent Bindschaedler,Jean-Pierre Hubaux
Issue Date:November 2014
pp. 2445-2457
This paper presents a concrete and widespread example of situation where a user’s location privacy is unintentionally compromised by others, specifically the location-privacy threat that exists at access points (public hotspots, FON, home routers, etc.) th...
 
Hiding in the Mobile Crowd: LocationPrivacy through Collaboration
Found in: IEEE Transactions on Dependable and Secure Computing
By Reza Shokri,George Theodorakopoulos,Panos Papadimitratos,Ehsan Kazemi,Jean-Pierre Hubaux
Issue Date:May 2014
pp. 266-279
Location-aware smartphones support various location-based services (LBSs): users query the LBS server and learn on the fly about their surroundings. However, such queries give away private information, enabling the LBS to track users. We address this probl...
 
Formal Analysis of Secure Neighbor Discovery in Wireless Networks
Found in: IEEE Transactions on Dependable and Secure Computing
By Marcin Poturalski,Panos Papadimitratos,Jean-Pierre Hubaux
Issue Date:November 2013
pp. 355-367
We develop a formal framework for the analysis of security protocols in wireless networks. The framework captures characteristics necessary to reason about neighbor discovery protocols, such as the neighbor relation, device location, and message propagatio...
 
Non-Cooperative Location Privacy
Found in: IEEE Transactions on Dependable and Secure Computing
By J. Freudiger,M. H. Manshaei,Jean-Pierre Hubaux,D. C. Parkes
Issue Date:March 2013
pp. 84-98
In mobile networks, authentication is a required primitive for most security protocols. Unfortunately, an adversary can monitor pseudonyms used for authentication to track the location of mobile nodes. A frequently proposed solution to protect location pri...
 
On the Performance of Secure Vehicular Communication Systems
Found in: IEEE Transactions on Dependable and Secure Computing
By Giorgio Calandriello,Panos Papadimitratos,Jean-Pierre Hubaux,Antonio Lioy
Issue Date:November 2011
pp. 898-912
Vehicular communication (VC) systems are being developed primarily to enhance transportation safety and efficiency. Vehicle-to-vehicle communication, in particular, frequent cooperative awareness messages or safety beacons, has been considered over the pas...
 
Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes
Found in: IEEE Transactions on Mobile Computing
By Murtuza Jadliwala, Sheng Zhong, Shambhu Upadhyaya, Chunming Qiao, Jean-Pierre Hubaux
Issue Date:June 2010
pp. 810-823
Secure distance-based localization in the presence of cheating beacon (or anchor) nodes is an important problem in mobile wireless ad hoc and sensor networks. Despite significant research efforts in this direction, some fundamental questions still remain u...
 
Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels
Found in: IEEE Transactions on Dependable and Secure Computing
By Srdjan Čapkun, Mario Čagalj, Ramkumar Rengaswamy, Ilias Tsigkogiannis, Jean-Pierre Hubaux, Mani Srivastava
Issue Date:October 2008
pp. 208-223
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit errors are possible (e.g., it is possible to change a bit
 
Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks
Found in: IEEE Transactions on Mobile Computing
By Márk Félegyházi, Jean-Pierre Hubaux, Levente Buttyán
Issue Date:May 2006
pp. 463-476
In self-organizing ad hoc networks, all the networking functions rely on the contribution of the participants. As a basic example, nodes have to forward packets for each other in order to enable multihop communication. In recent years, incentive mechanisms...
 
Node Cooperation in Hybrid Ad Hoc Networks
Found in: IEEE Transactions on Mobile Computing
By Naouel Ben Salem, Levente Buttyán, Jean-Pierre Hubaux, Markus Jakobsson
Issue Date:April 2006
pp. 365-376
A hybrid ad hoc network is a structure-based network that is extended using multihop communications. Indeed, in this kind of network, the existence of a communication link between the mobile station and the base station is not required: A mobile station th...
 
Mobility Helps Peer-to-Peer Security
Found in: IEEE Transactions on Mobile Computing
By Srdjan Capkun, Jean-Pierre Hubaux, Levente Buttyán
Issue Date:January 2006
pp. 43-51
We propose a straightforward technique to provide peer-to-peer security in mobile networks. We show that far from being a hurdle, mobility can be exploited to set up security associations among users. We leverage on the temporary vicinity of users, during ...
 
DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for Ad Hoc Networks
Found in: IEEE Transactions on Dependable and Secure Computing
By Jun Luo, Jean-Pierre Hubaux, Patrick T. Eugster
Issue Date:October 2005
pp. 311-323
Securing ad hoc networks is notoriously challenging, notably due to the lack of an online infrastructure. In particular, key management is a problem that has been addressed by many researchers but with limited results. In this paper, we consider the case w...
 
Pilot: Probabilistic Lightweight Group Communication System for Ad Hoc Networks
Found in: IEEE Transactions on Mobile Computing
By Jun Luo, Patrick Th. Eugster, Jean-Pierre Hubaux
Issue Date:April 2004
pp. 164-179
<p><b>Abstract</b>—Providing reliable group communication is an ever recurring topic in distributed settings. In mobile ad hoc networks, this problem is even more significant since all nodes act as peers, while it becomes more challenging...
 
Collaborative Location Privacy
Found in: Mobile Ad-Hoc and Sensor Systems, IEEE International Conference on
By Reza Shokri,Panos Papadimitratos,George Theodorakopoulos,Jean-Pierre Hubaux
Issue Date:October 2011
pp. 500-509
Location-aware smart phones support various location-based services (LBSs): users query the LBS server and learn on the fly about their surroundings. However, such queries give away private information, enabling the LBS to identify and track users. We addr...
 
The Chills and Thrills of Whole Genome Sequencing
Found in: Computer
By Erman Ayday,Emiliano De Cristofaro,Jean-Pierre Hubaux,Gene Tsudik
Issue Date:September 2013
pp. 1
In recent years, whole genome sequencing (WGS) evolved from a futuristic-sounding research project to an increasingly affordable technology for determining complete genome sequences of complex organisms, including humans. This prompts a wide range of revol...
 
Protecting and evaluating genomic privacy in medical tests and personalized medicine
Found in: Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society (WPES '13)
By Erman Ayday, Jacques Rougemont, Jean Louis Raisaro, Jean-Pierre Hubaux
Issue Date:November 2013
pp. 95-106
In this paper, we propose privacy-enhancing technologies for medical tests and personalized medicine methods that use patients' genomic data. Focusing on genetic disease-susceptibility tests, we develop a new architecture (between the patient and the medic...
     
Protecting location privacy: optimal strategy against localization attacks
Found in: Proceedings of the 2012 ACM conference on Computer and communications security (CCS '12)
By Carmela Troncoso, George Theodorakopoulos, Jean-Pierre Hubaux, Jean-Yves Le Boudec, Reza Shokri
Issue Date:October 2012
pp. 617-627
The mainstream approach to protecting the location-privacy of mobile users in location-based services (LBSs) is to alter the users' actual locations in order to reduce the location information exposed to the service provider. The location obfuscation algor...
     
Effectiveness of distance-decreasing attacks against impulse radio ranging
Found in: Proceedings of the third ACM conference on Wireless network security (WiSec '10)
By Jean-Pierre Hubaux, Jean-Yves Le Boudec, Manuel Flury, Marcin Poturalski, Panos Papadimitratos
Issue Date:March 2010
pp. 117-128
We expose the vulnerability of an emerging wireless ranging technology, impulse radio ultra-wide band (IR-UWB), to distance-decreasing attacks on the physical communication layer (PHY). These attacks violate the security of secure ranging protocols that al...
     
Adaptive message authentication for vehicular networks
Found in: Proceedings of the sixth ACM international workshop on VehiculAr InterNETworking (VANET '09)
By George Theodorakopoulos, Jean-Pierre Hubaux, Jean-Yves Leboudec, Nikodin Ristanovic, Panos Papadimitratos
Issue Date:September 2009
pp. 121-122
Public key cryptography can introduce significant processing delays in vehicular communication platforms. This can lead to serious performance issues, especially in the case of multi-hop Inter-Vehicle Communication. In this paper we propose Adaptive Messag...
     
Inferring social ties in academic networks using short-range wireless communications
Found in: Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society (WPES '13)
By Florent Lopez, Igor Bilogrevic, Jean-Pierre Hubaux, Valtteri Niemi, Kévin Huguenin, Murtuza Jadliwala, Philip Ginzboorg
Issue Date:November 2013
pp. 179-188
WiFi base stations are increasingly deployed in both public spaces and private companies, and the increase in their density poses a significant threat to the privacy of connected users. Prior studies have provided evidence that it is possible to infer the ...
     
Addressing the concerns of the lacks family: quantification of kin genomic privacy
Found in: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (CCS '13)
By Amalio Telenti, Erman Ayday, Jean-Pierre Hubaux, Mathias Humbert
Issue Date:November 2013
pp. 1141-1152
The rapid progress in human-genome sequencing is leading to a high availability of genomic data. This data is notoriously very sensitive and stable in time. It is also highly correlated among relatives. A growing number of genomes are becoming accessible o...
     
Inferring social ties in pervasive networks: an on-campus comparative study
Found in: Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication (UbiComp '13 Adjunct)
By Florent Lopez, Igor Bilogrevic, Jean-Pierre Hubaux, Kévin Huguenin, Murtuza Jadliwala, Philip Ginzboorg, Valtteri Niemi
Issue Date:September 2013
pp. 123-126
WiFi base stations are increasingly deployed in both public spaces and private companies, and the increase in their density poses a significant threat to the privacy of users. Prior studies have shown that it is possible to infer the social ties between us...
     
Adaptive information-sharing for privacy-aware mobile social networks
Found in: Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing (UbiComp '13)
By Berker Agir, Igor Bilogrevic, Jean-Pierre Hubaux, Kévin Huguenin, Murtuza Jadliwala
Issue Date:September 2013
pp. 657-666
Personal and contextual information are increasingly shared via mobile social networks. Users' locations, activities and their co-presence can be shared easily with online "friends", as their smartphones already access such information from embedded sensor...
     
Game theory meets network security and privacy
Found in: ACM Computing Surveys (CSUR)
By Jean-Pierre Hubaux, Mohammad Hossein Manshaei, Quanyan Zhu, Tamer Bacşar, Tansu Alpcan
Issue Date:June 2013
pp. 1-39
This survey provides a structured and comprehensive overview of research on security and privacy in computer and communication networks that use game-theoretic approaches. We present a selected set of works to highlight the application of game theory in ad...
     
Unraveling an old cloak: k-anonymity for location privacy
Found in: Proceedings of the 9th annual ACM workshop on Privacy in the electronic society (WPES '10)
By Carmela Troncoso, Claudia Diaz, Jean-Pierre Hubaux, Julien Freudiger, Reza Shokri
Issue Date:October 2010
pp. 115-118
There is a rich collection of literature that aims at protecting the privacy of users querying location-based services. One of the most popular location privacy techniques consists in cloaking users' locations such that k users appear as potential senders ...
     
SensorTune: a mobile auditory interface for DIY wireless sensor networks
Found in: Proceedings of the 28th international conference on Human factors in computing systems (CHI '10)
By Enrico Costanza, Guillaume Zufferey, Jacques Panchard, Jean-Pierre Hubaux, Jeffrey Huang, Julien Freudiger, Julien Nembrini
Issue Date:April 2010
pp. 2317-2326
Wireless Sensor Networks (WSNs) allow the monitoring of activity or environmental conditions over a large area, from homes to industrial plants, from agriculture fields to forests and glaciers. They can support a variety of applications, from assisted livi...
     
On the tradeoff between trust and privacy in wireless ad hoc networks
Found in: Proceedings of the third ACM conference on Wireless network security (WiSec '10)
By Jean-Pierre Hubaux, Maxim Raya, Reza Shokri
Issue Date:March 2010
pp. 75-80
As privacy moves to the center of attention in networked systems, and the need for trust remains a necessity, an important question arises: How do we reconcile the two seemingly contradicting requirements? In this paper, we show that the notion of data-cen...
     
A distortion-based metric for location privacy
Found in: Proceedings of the 8th ACM workshop on Privacy in the electronic society (WPES '09)
By Jean-Pierre Hubaux, Julien Freudiger, Murtuza Jadliwala, Reza Shokri
Issue Date:November 2009
pp. 21-30
We propose a novel framework for measuring and evaluating location privacy preserving mechanisms in mobile wireless networks. Within this framework, we first present a formal model of the system, which provides an efficient representation of the network us...
     
On non-cooperative location privacy: a game-theoretic analysis
Found in: Proceedings of the 16th ACM conference on Computer and communications security (CCS '09)
By David C. Parkes, Jean-Pierre Hubaux, Julien Freudiger, Mohammad Hossein Manshaei
Issue Date:November 2009
pp. 324-337
In mobile networks, authentication is a required primitive for the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudonyms used for authentication. A frequently proposed solution to protect loca...
     
Preserving privacy in collaborative filtering through distributed aggregation of offline profiles
Found in: Proceedings of the third ACM conference on Recommender systems (RecSys '09)
By George Theodorakopoulos, Jean-Pierre Hubaux, Pedram Pedarsani, Reza Shokri
Issue Date:October 2009
pp. 157-164
In recommender systems, usually, a central server needs to have access to users' profiles in order to generate useful recommendations. Having this access, however, undermines the users' privacy. The more information is revealed to the server on the user-it...
     
A practical secure neighbor verification protocol for wireless sensor networks
Found in: Proceedings of the second ACM conference on Wireless network security (WiSec '09)
By Gael Ravot, Jean-Pierre Hubaux, Marcin Poturalski, Panos Papadimitratos, Reza Shokri
Issue Date:March 2009
pp. 1-24
Wireless networking relies on a fundamental building block, neighbor discovery (ND). The nature of wireless communications, however, makes attacks against ND easy: An adversary can simply replay or relay (wormhole) packets across the network and mislead di...
     
Towards provable secure neighbor discovery in wireless networks
Found in: Proceedings of the 6th ACM workshop on Formal methods in security engineering (FMSE '08)
By Jean-Pierre Hubaux, Marcin Poturalski, Panos Papadimitratos
Issue Date:October 2008
pp. 31-42
In wireless systems, neighbor discovery (ND) is a fundamental building block: determining which devices are within direct radio communication is an enabler for networking protocols and a wide range of applications. To thwart abuse of ND and the resultant c...
     
Revocation games in ephemeral networks
Found in: Proceedings of the 15th ACM conference on Computer and communications security (CCS '08)
By Jean-Pierre Hubaux, Mark Felegyhazi, Maxim Raya, Mohammad Hossein Manshaei
Issue Date:October 2008
pp. 79-79
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact times between nodes are short and neighbors change frequently - reputations ...
     
Certificate revocation list distribution in vehicular communication systems
Found in: Proceedings of the fifth ACM international workshop on VehiculAr Inter-NETworking (VANET '08)
By Ghita Mezzour, Jean-Pierre Hubaux, Panagiotis (Panos) Papadimitratos
Issue Date:September 2008
pp. 1-2
The need to evict compromised, faulty, or illegitimate nodes is well understood in prominent projects designing security architectures for Vehicular Communication (VC) systems. The basic approach envisioned to achieve this is via distribution of Certificat...
     
Optimal pricing strategy for wireless social community networks
Found in: Proceedings of the 3rd international workshop on Economics of networked systems (NetEcon '08)
By Amin Mazloumian, Jean-Pierre Hubaux, Mark Felegyhazi, Mohammad Hossein Manshaei
Issue Date:August 2008
pp. 107-112
Wireless social community operators rely on subscribers who constitute a community of users. The pricing strategy of the provided wireless access is an open problem for this new generation of wireless access providers. In this paper, using both analytical ...
     
Secure neighbor discovery in wireless networks: formal investigation of possibility
Found in: Proceedings of the 2008 ACM symposium on Information, computer and communications security (ASIACCS '08)
By Jean-Pierre Hubaux, Marcin Poturalski, Panos Papadimitratos
Issue Date:March 2008
pp. 85-92
Wireless communication enables a broad spectrum of applications, ranging from commodity to tactical systems. Neighbor discovery (ND), that is, determining which devices are within direct radio communication, is a building block of network protocols and app...
     
Efficient and robust pseudonymous authentication in VANET
Found in: Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks (VANET '07)
By Antonio Lioy, Giorgio Calandriello, Jean-Pierre Hubaux, Panos Papadimitratos
Issue Date:September 2007
pp. 19-28
Effective and robust operations, as well as security and privacy are critical for the deployment of vehicular ad hoc networks (VANETs). Efficient and easy-to-manage security and privacy-enhancing mechanisms are essential for the wide-spread adoption of the...
     
Efficient secure aggregation in VANETs
Found in: Proceedings of the 3rd international workshop on Vehicular ad hoc networks (VANET '06)
By Adel Aziz, Jean-Pierre Hubaux, Maxim Raya
Issue Date:September 2006
pp. 67-75
In VANETs, better communication efficiency can be achieved by sacrificing security and vice versa. But VANETs cannot get started without either of them. In this paper, we propose a set of mechanisms that can actually reconcile these two contradictory requi...
     
The security of vehicular ad hoc networks
Found in: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks (SASN '05)
By Jean-Pierre Hubaux, Maxim Raya
Issue Date:November 2005
pp. 11-21
Vehicular networks are likely to become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat analysis and devise an appropriate security architecture. We also describe some...
     
The security of vehicular networks
Found in: Proceedings of the 4th ACM workshop on Wireless security (WiSe '05)
By Jean-Pierre Hubaux
Issue Date:September 2005
pp. 31-32
Vehicular networks are likely to become the most relevant form of mobile ad hoc networks (see e.g. http://ivc.epfl.ch). In this talk, we address the security of these networks, a topic that has been (surprisingly) overlooked by the research community. We p...
     
 1  2 Next >>