Networks Research Group
Networks Research Group
Tour
People
Project
Publications
News
Events
Contact
Telecommunication Security
Network Innovation using OpenFlow: A Survey
OpenFlow is currently the most commonly deployed Software Defined Networking (SDN) technology. SDN consists of decoupling the control …
Adrian Lara
,
Anisha Kolasani
,
Byrav Ramamurthy
Cite
DOI
URL
A security framework for wireless sensor networks utilizing a unique session key
Key management is a core mechanism to ensure the security of applications and network services in wireless sensor networks. It includes …
Yong Wang
,
Byrav Ramamurthy
,
Yuyan Xue
,
Xukai Zou
Cite
DOI
URL
Group Rekeying Schemes for Secure Group Communication in Wireless Sensor Networks
Wireless sensor networks are promising solutions for many applications. However, wireless sensor nodes suffer from many constraints …
Y. Wang
,
B. Ramamurthy
Cite
DOI
URL
KeyRev: An Efficient Key Revocation Scheme for Wireless Sensor Networks
Key management is a core mechanism to ensure the security of applications and network services in wireless sensor networks. It includes …
Y. Wang
,
B. Ramamurthy
,
X. Zou
Cite
DOI
URL
A balanced key tree approach for dynamic secure group communication
Logical key hierarchy (LKH) is a promising solution to handle group key distribution in secure group communication. Several recent …
G. Hao
,
N.V. Vinodchandran
,
Byrav Ramamurthy
,
X. Zou
Cite
DOI
URL
DGKD: distributed group key distribution with authentication capability
Group key management (GKM) is the most important issue in secure group communication (SGC). The existing GKM protocols fall into three …
P. Adusumilli
,
Xukai Zou
,
B. Ramamurthy
Cite
DOI
URL
CRTDH: an efficient key agreement scheme for secure group communications in wireless ad hoc networks
As a result of the growing popularity of wireless networks, in particular ad hoc networks, security over such networks has become very …
R.K. Balachandran
,
B. Ramamurthy
,
Xukai Zou
,
N.V. Vinodchandran
Cite
DOI
URL
A GCD attack resistant CRTHACS for secure group communications
We propose an improved CRTHACS scheme for secure group communications. The scheme resists several GCD attacks which exist in the …
X. Zou
,
B. Ramamurthy
,
S.S. Magliveras
Cite
DOI
URL
Agent based intrusion detection and response system for wireless LANs
Wireless LAN technology, despite the numerous advantages it has over competing technologies, has not seen widespread deployment. A …
M.K. Chirumamilla
,
B. Ramamurthy
Cite
DOI
URL
Hierarchy-based access control in distributed environments
Access control is a fundamental concern in any system that manages resources, e.g., operating systems, file systems, databases and …
J.-C. Birget
,
X. Zou
,
G. Noubir
,
B. Ramamurthy
Cite
DOI
URL
Cite
×