ResearchPublicationsNetwork and Communications Security

Network and Communications Security

  1. Mosarrat Jahan, Partha Sarathi Roy, Kouichi Sakurai, Aruna Seneviratne, Sanjay Jha, “Secure and Light Weight Fine-grained Access Mechanism for Outsourced Data”,  The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17), Sydney, Australia, 2017.
  2. Jun Young Kim, Wen Hu, Dilip Sarkara and Sanjay Jha, "ESIoT: Enabling Secure Management of the Internet of Things", 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017), Boston, USA, 2017. 
  3. Abaid, Z., Kaafar, M.A., & Jha, S. , "Early Detection of In-the-Wild Botnet Attacks by Exploiting Network Communication Uniformity: An Empirical Study", IFIP Networking 2017, 2017.
  4. Girish Revadigar, Chitra Javali, Weitao Xu, Athanasios V. Vasilakos, Wen Hu, & Sanjay Jha, "Accelerometer and Fuzzy Vault based Secure Group Key Generation and Sharing Protocol for Smart Wearables", in IEEE Transactions on Information Forensics and Security (TIFS), 2017.
  5. Shaghaghi, A., Kaafar, M.A., & Jha S., "WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Network (SDN)", Proceedings of the 12th ACM on Asia Conference on Computer and Communications Security (AsiaCCS), 2017.
  6. Shaghaghi, A., Kaafar, M.A., Scott-Hayward, S., Kanhere S., & Jha S., "Towards Policy Enforcement Point as a Service (PEPS)" IEEE Conference on Network Function Virtualization and Software Defined Network (NFV-SDN), Paolo Alto, CA, USA, 2016.

  7. M. Siddiqi, V. Sivaraman and S. Jha, "Timestamp Integrity in Wearable Healthcare Devices", IEEE ANTS, Bangalore, India, Nov 2016. 

  8. Abaid, Z., Sarkar, D., Kaafar, M.A., & Jha, S. “The Early Bird Gets the Botnet: A Markov Chain Based Early Warning System for Botnet Attacks”, The 41st IEEE Conference on Local Computer Networks (LCN), Dubai, UAE, November 2016.

  9. Chitra Javali, Girish Revadigar, Kasper B. Rasmussen, Wen Hu, and Sanjay Jha, "I Am Alice, I Was in Wonderland: Secure Location Proof Generation and Verification Protocol". In the 41st IEEE Conference on Local Computer Networks (LCN), November 2016, Dubai, UAE.

  10. Girish Revadigar, Chitra Javali, Weitao Xu, Wen Hu, and Sanjay Jha, "Secure Key Generation and Distribution Protocol for Wearable Devices", in IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), 2016.

  11. Chitra Javali, Girish Revadigar, Daniel Pletea and Sanjay Jha, "Demo Abstract: Location Fingerprint Evidence and Authorisation Using WiFi Channel Characteristics", in IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), 2016.

  12. Chitra Javali, Girish Revadigar, Wen Hu, and Sanjay Jha,"Poster: Were You in the Cafe Yesterday? Location Proof Generation & Verification for Mobile Users". in the 13th ACM Conference on Embedded Networked Sensor Systems (SenSys), Seoul, South Korea, November 2015.

  13. Hossein Shafagh, Anwar Hithnawi, Andreas Droescher, Simon Duquennoy and Wen Hu, Talos: Encrypted Query Processing for the Internet of Things, The 13th ACM Conference on Embedded Networked Sensor Systems (SenSys 2015), November 2015, Seoul, South Korea.

  14. M. Rezvani, A. Ignjatovic, E. Bertino and S. Jha, A Collaborative Reputation System Based on Credibility Propagation in WSNs. The 21st IEEE International Conference on Parallel and Distributed Systems (ICPADS 2015).

  15. M. Jahan, M. Rezvani, A. Seneviratne, and S. Jha, “Method for providing secure and private fine-grained access to outsourced data,” in Proc. IEEE 40th Conf. Local Computer Networks, 2015, pp. 406–409.

  16. Chitra Javali, Girish Revadigar, Ming Ding, and Sanjay Jha, "Secret Key Generation by Virtual Link Estimation", In proceedings of 10th EAI International Conference on Body Area Networks (BodyNets), September 28–30, 2015 Sydney, Australia.

  17. Girish Revadigar, Chitra Javali, Hassan Jameel Asghar, Kasper B. Rasmussen, and Sanjay Jha, "Mobility Independent Secret Key Generation for Wearable Health-care Devices", In proceedings of 10th EAI International Conference on Body Area Networks (BodyNets), September 28–30, 2015 Sydney, Australia.

  18. Girish Revadigar, Chitra Javali, Wen Hu, and Sanjay Jha, "DLINK: Dual Link Based Radio Frequency Fingerprinting for Wearable Devices", in proceedings of the 40th IEEE Conference on Local Computer Networks (LCN), 2015.

  19. M. Rezvani, V. Sekulic, A. Ignjatovic, E. Bertino and S. Jha, "Interdependent Security Risk Analysis of Hosts and Flows", Accepted in IEEE Transactions on Information Forensics and Security (accepted June 2015).

  20. T. Ali, V. Sivaraman, A. Radford, and S. Jha, "Securing Networks Using Software Defined Networking: A Survey”, IEEE Trans. on Reliability Special Section on Trustworthy Computing (accepted Nov 2014).

  21. A. Shaghaghi, J. Hong and S. Jha, "An SDN-based Framework for Detection of Illegal Rebroadcasting of Channels in P2PTV", In proceedings of VideoNext 2014 co-located with CoNEXT 2014, December 2-5, 2014, Sydney, Australia.

  22. Zainab Abaid, Mohsen Rezvani, and Sanjay Jha. MalwareMonitor: An SDN-based Framework for Securing Large Networks. In ACM CoNEXT Student Workshop, 2014.

  23. H. Tan, W. Hu and S. Jha, A Remote Attestation Protocol with Trusted Platform Modules (TPMs), Security and Communication Networks, (accepted Sept 14).

  24. T. Ali, V. Sivaraman, D. Ostry, G. Tsudik and S. Jha, Securing First-Hop Data Provenance for Bodyworn Devices using Wireless Link Fingerprints, IEEE Transactions on Information Forensics & Security (accepted Aug 2014).

  25. C. Javali, G. Revadigar, L. Libman and S. Jha, "SeAK: Secure Authentication and Key Generation Protocol based on Dual Antennas for Wireless Body Area Networks", in proceedings of the 10th Workshop on RFID Security  (RFIDsec 2014) co-located with ACM WiSec 2014, July 21-23, 2014, Oxford, UK.

  26. M. Rezvani, A. Ignjatovic, E. Bertino and S. Jha, “Provenance-Aware Security Risk Analysis for Hosts and Network Flows” in proceedings of the IEEE/IFIP Network Operations and Management Symposium, NOMS 2014, 5-9 May 2014 in Krakow, Poland.

  27. M. Rezvani, A. Ignjatovic, E. Bertino and S. Jha, “Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks", IEEE Transactions on Dependable and Secure Computing, 12(1): 98-110, January 2015..

  28. Wael Y. Alghamdi, Hui Wu, Fei Jingjing, Salil Kanhere, "Randomized Multipath Routing for Secure Data Collection",in proceeding of the IEEE Ninth International Conference on Intelligent Sensors, Sensor Network and Information Processing, ISSNIP 2014, 21-25 April 2014 in Singapore.

  29. T. Ali, V. Sivaraman, D. Ostry and S. Jha, “Securing Data Provenance in Body Area Networks using Lightweight Wireless Link Fingerprints”, International Workshop on Trustworthy Embedded Devices (TrustED 2013) held in conjunction with ACM CCS’13, November 4, Berlin.

  30. T. Ali, V. Sivaraman, A. Radford and S. Jha, “Securing Networks Using Software Defined Networking: A Survey” School of Computer Science and Engineering, UNSW, Tech. Rep. UNSW-CSE-TR-201330, October 2013.

  31. M. Rezvani, A. Ignjatovic, E. Bertino and S. Jha, “A Robust Iterative Filtering Technique for Wireless Sensor Networks in the Presence of Malicious Attacks (Poster Paper)” in proceedings of 13th ACM Conference on Embedded Networked Sensor Systems (SenSys 2013), November 11-13 2013. (accepted 22nd August 2013).

  32. T. Ali, V. Sivaraman, D. Ostry and S. Jha, “Securing Data Provenance in Body Area Networks using Lightweight Wireless Link Fingerprints(Demo)” in proceedings of 13th ACM Conference on Embedded Networked Sensor Systems (SenSys 2013), November 11-13 2013. (accepted 22nd August 2013).

  33. M. Rezvani, A. Ignjatovic, S. Jha, "Iterative Security Risk Analysis for Network Flows Based on Provenance and Interdependency," IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS 13), pp. 286-288, Cambridge, MA, USA, 20-23 May, 2013.

  34. H. Tan, D. Ostry, J. Zic and S. Jha, A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks, Computers & Security, Volume 32, February 2013, Pages 36–55.

  35. S. T. Ali, V. Sivaraman and D. Ostry, "Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices", IEEE Transactions on Mobile Computing, to appear.

  36. L. Yao, S. T. Ali, V. Sivaraman and D. Ostry, "Decorrelating Secret Bit Extraction via Channel Hopping in Body Area Networks", IEEE PIMRC, Sydney, Australia, Sep 2012.

  37. S. T. Ali, V. Sivaraman and D. Ostry, "Authentication of Lossy Data in Body-Sensor Networks for Healthcare Monitoring", IEEE SECON, Seoul, Korea, Jun 2012.

  38. S. T. Ali, V. Sivaraman and D. Ostry, "Zero Reconciliation Secret Key Generation for Body-Worn Health Monitoring Devices", ACM Security and Privacy in Wireless and Mobile Networks (WiSEC'12), Tucson, Arizona, USA, Apr 2012.

  39. H. Tan, D. Ostry, J. Zic and S. Jha, "Secure Multi-hop Network Programming With Multiple One-way Key Chains", IEEE Transactions on Mobile Computing (TMC), Vol 10(1), pp 16-31, Jan 2011.

  40. L. Yao, S. T. Ali, V. Sivaraman and D. Ostry, "Improving Secret Key Generation Performance for On-Body Devices", BodyNets, Beijing, China, Nov 2011.

  41. Tan, Hailun, Wen Hu, and Sanjay Jha. "A TPM-enabled remote attestation protocol (TRAP) in wireless sensor networks." In Proceedings of the 6th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks, pp. 9-16. ACM, 2011.

  42. S. T. Ali, V. Sivaraman and D. Ostry, "Secret Key Generation Rate vs. Reconciliation Cost using Wireless Channel Characteristics in Body Area Network", IEEE TrustCom, Hong Kong, Dec 2010.

  43. S. T. Ali, V. Sivaraman, D. Ostry and A. Dhamdhere, "Secure Key Loss Recovery for Network Broadcast in Single-Hop Wireless Sensor Networks", Ad Hoc Networks (Elsevier), 8(6):668-679, Aug 2010.

  44. Hu, Wen, Hailun Tan, Peter Corke, Wen Chan Shih, and Sanjay Jha. "Toward trusted wireless sensor networks." ACM Transactions on Sensor Networks (TOSN) 7, no. 1 (2010): 5.

  45. H. Tan, D. Ostry, Z. Zic, and S. Jha, "A Confidential and DoS-Resistant Multi-hop Code Dissemination Protocol for Wireless Sensor Networks," in ACM Conference on Wireless Network Security (WiSec09), March 16-18, Zurich, Switzerland, 2009, pp 245-252 ( 26% acceptance, 28 of 107 submission single track ACM conf, ERA Unranked)

  46. H. Tan, S. Jha, D. Ostry, Z. Zic, and V. Sivaraman, "Secure multi-hop network programming with multiple one-way hash chains," in ACM Conference on Wireless Network Security (WiSec) , Alexandria, Virginia, USA. , 2008, pp 183-193 (17% acceptance, 16 of 96 submission single track ACM conf, ERA Unranked)

  47. S. T. Ali, V. Sivaraman, A. Dhamdhere, D. Ostry, "A Key Loss Recovery Scheme for Secure Broadcasts in Wireless Sensor Networks", IEEE Personal, Indoor, and Mobile Radio Communications (PIMRC), Cannes, France, Sep 2008.

  48. A. Naveed, S. S. Kanhere and S. Jha, Attacks and Security Mechanism, in Security In Wireless Mesh Networks, Auerbach Publications (CRC Press), Edited by Yan Zhang, July 2007 (ISBN: 0849382505).

  49. P. Pathirana, N. Bulusu, A. Savkin, S. Jha, and T. Dang, "Node Localization Using Mobile Robots in Delay-tolerant Sensor Networks," in Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks. vol. 30, W. Poovendran, Roy Ed.: Springer, 2007.

  50. J. Saheen, D. Ostry, V. Sivaraman, and S. Jha, "Confidential and Secure Broadcast in Wireless Sensor Networks," in The 18th IEEE Annual International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC 2007) Greece, Athens, 3-7 September 2007, pp 1 -5 (ERA Rank –B).

  51. Tan, Hailun. "On mitigating malicious behavior against routing in wireless network." In Wireless Communications and Networking Conference, 2007. WCNC 2007. IEEE, pp. 2940-2944. IEEE, 2007.

Abaid, Z., Kaafar, M.A., & Jha, S. , Early Detection of In-the-Wild Botnet Attacks by Exploiting Network Communication Uniformity: An Empirical Study, IFIP Networking 2017, 12 -15 June  2017

CYBER SECURITY AND PRIVACY LABORATORY
SCHOOL OF COMPUTER SCIENCE AND ENGINEERING
UNSW SYDNEY NSW 2052 AUSTRALIA TELEPHONE +61 2 9385 4329