ACI Project "SPLASH!": Publications

  1. Efficient Node Admission for Short-lived Mobile Ad Hoc Networks ,  IEEE International Conference on Network Protocols (ICNP'05), November 2005. N. Saxena, G. Tsudik and J. Yi                                                                                                                                                         

  2. Pocket Bluff: A cooperation enforcing scheduled pocket switching protocol, Pars Mutaf and R. Molva. INRIA RR, August 2005.                                                                                                                                                                                
  3. Securing Route Discovery in DSR,  IEEE Mobiquitous'05, July 2005. J. Kim and G. Tsudik.                                                                                
  4. Efficient Aggregation of Encrypted Data in Wireless Sensor Networks                                                                                  ACM/IEEE Mobiquitous'05. July 2005. San Diego, USA.
    C. Castelluccia, E. Mykletun, G. Tsudik.

  5. Shake Them Up! A movement-based pairing protocol for CPU-constrained devices.
    ACM/Usenix Mobisys'05. June 2005. Seattle, USA.
    Claude Castelluccia and Pars Mutaf.

  6. Compact Neighbor Discovery (a bandwidth defense through bandwidth optimization).
    IEEE Infocom'05. March 2005. Miami, Florida.
    Pars Mutaf and Claude Castelluccia.
    NOTE: "Compact Route Discovery for MANETs", which employs the same algorithm, is under submission.

  7. Self-configurable Key Pre-distribution in Mobile Ad Hoc Networks.
    IFIP Networking 2005. May 2005. Waterloo, Canada.
    C. Castelluccia, N. Sahexa, J. Yi.

  8. Non-cooperative forwarding in ad hoc networks.
    IFIP Networking 2005. May 2005. Waterloo, Canada.
    Eitan Altman, Arzad Kherani, Pietro Michiardi and Refik Molva.

  9. Some game theoretic problems in wireless ad hoc networks.
    EuroNgi Dagstuhl Workshop. 2005.
    E. Altman, A. Kherani, V.S. Borkar, P. Michiardi and R. Molva.

  10. Cooperation enforcement and network security mechanisms for mobile ad hoc networks.
    PhD Thesis. December 2004. Ecole Nationale Superieure de Telecommunications.
    Pietro Michiardi.

  11. Non-cooperative forwarding in ad hoc networks.
    PIMRC 2004. September 2004. Barcelona, Spain.
    Eitan Altman, Arzad Kherani, Pietro Michiardi and Refik Molva.

  12. Analysis of coalition formation and cooperation strategies in mobile ad hoc networks
    Ad Hoc Networks journal (Elsevier), 2004. Pietro Michiardi and Refik Molva.

  13. Cryptographically Generated Addresses for Constrained Devices.
    Wireless Personal Communications journal, special issue on "Security for Next Generation Mobile Communications", 2004.
    C. Castelluccia.

  14. Recent security solutions for mobile ad hoc networks.
    Chapter in Book on Ad Hoc Networking, IEEE Press - Wiley Ed. 2003.
    Pietro Michiardi, Refik Molva.

  15. Security in Ad hoc Networks (invited paper).
    Personal Wireless Communications, September 23-25 2003, Venice Italy.
    Refik Molva, Pietro Michiardi.

  16. Security in Wireless Ad hoc Networks, Keynote speech. Communications and Multimedia Security 2003.
    Refik Molva.

  17. A Game Theoretical Approach to Evaluate Cooperation Enforcement Mechanisms in Mobile Ad hoc Networks (extended abstract).
    WiOpt'03: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks.
    Winner of the "Best Student Paper Award".
    Pietro Michiardi, Refik Molva.

  18. Admission Control in Peer-to-Peer: Design and Performance Evaluation.
    ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '03). November 2003.
    N. Saxena, G. Tsudik and J. Yi.

  19. Admission Control in Peer Groups.
    NSF/NASA/DOE Workshop on New Directions on Scalable Cyber-Security. March 2003.
    Y. Kim and G. Tsudik.

  20. Group Key Management in Hierarchical Ad-hoc Wireless Networks
    2002 Workshop on Information Security Applications (WISA'02), August 2002.
    Y. Park, K. Rhee and G. Tsudik.

  21. Admission Control in Collaborative Groups
    IEEE Symposium on Network Computing and Applications (NCA-03), April 2003.
    Y. Kim, D. Mazzocchi and G. Tsudik.

  22. On the Utility of Distributed Cryptography in P2P Settings and MANETs
    IEEE International Conference on Network Protocols (ICNP'03). M. Narasimha, G. Tsudik and J. Yi,
  23. Securing Group Membership in IPv6 with Cryptographically Generated Addresses.
    IEEE Symposium on Computers and Communications (ISCC'2003), July 2003.
    C. Castelluccia and G. Montenegro.

  24. Statistically unique and cryptographically verifiable identifiers and addresses.
    In Proc. ISOC Symposium on Network and Distributed System Security (NDSS 2002), San Diego, February 2002.
    Gabriel Montenegro and Claude Castelluccia.

  25. Dynamic and Secure Group Membership in Adhoc and Peer-to-Peer Networks.
    Report on a Working Session on Security in Wireless Ad Hoc Networks (2002), ACM MC2R, September 2002.
    C. Castelluccia and G. Montenegro.

  26. Protecting AODV against Impersonation Attacks.
    Report on the AODVng workshop ACM MC2R, 2002.
    C. Castelluccia and G. Montenegro.