Work place: Department of Electrical and Electronic Engineering The University of Melbourne Melbourne, Australia
E-mail: ywlaw@unimelb.edu.au
Website:
Research Interests: Information Security, Network Architecture, Network Security
Biography
Yee Wei Law received the B.S. degree in computer engineering from the University of Southampton, UK, ME degree in electrical engineering from the Nanyang Technological University, Singapore and Ph. D from the University of Twente, Netherland. Presently, He is a Research Fellow of the Department of Electrical Engineering for the University of Melbourne. His research interests include wireless sensor network security, wireless communication and sensor network application.
By Yu Zhang Xing She Zhou Yee Wei Law Marimuthu Palaniswami
DOI: https://doi.org/10.5815/ijwmt.2012.01.01, Pub. Date: 15 Feb. 2012
While existing solutions can provide authentication services, they are insufficient for a new generation of network coding-based reprogramming protocols in wireless sensor networks. We present a security approach that is able to defend pollution attack against reprogramming protocols based on network coding. It employs a homomorphic hashing function and an identity-based aggregate signature to allow sensor nodes to check packets on-the-fly before they accept incoming encoded packets, and introduces an efficient mechanism to reduce the computation overhead at each node and to eliminate bad packets quickly. Castalia simulations show that when the 5% of the nodes in a network of 100 nodes are rogue, using our approach, the efficiency of the secure reprogramming protocol based on network coding improves almost ten-fold for a checking probability of 2%.
[...] Read more.By Yu Zhang Xing She Zhou Yee Wei Law Marimuthu Palaniswami
DOI: https://doi.org/10.5815/ijcnis.2011.02.05, Pub. Date: 8 Mar. 2011
Reprogramming protocols provide a convenient way to update program images via wireless communication.
In hostile environments where there may be malicious attacks against wireless sensor networks, the process of reprogramming faces threats from potentially compromised nodes. While existing solutions can provide authentication services, they are insufficient for a new generation of network coding-based reprogramming protocols in wireless sensor networks. We present a security approach that is able to defend pollution attack against reprogramming protocols based on network coding. It employs a homomorphic hashing function and an identity-based aggregate signature to allow sensor nodes to check packets on-the-fly before they accept incoming encoded packets, and introduces an efficient mechanism to reduce the computation overhead at each node and to eliminate bad packets quickly. Castalia simulations show that when the 5% of the nodes in a network of 100 nodes are rogue, using our approach, the efficiency of the secure reprogramming protocol based on network coding improves almost ten-fold for a checking probability of 2%.
Subscribe to receive issue release notifications and newsletters from MECS Press journals