Home | Projects | Publications | Libraries | People | Contacts

Welcome to the Wireless Security Laboratory (WSL) of the College of Computer Science at Northeastern University. We are a cryptography group in the college and our research projects are focusing on various aspects of wireless network and computer security. In the past we have developed efficient software based stream ciphers (SSC2), and implemented various cryptographic libraries for Palm OS. We have also done research on the authenticated key exchange protocols, especially concerning low power constraints of some wireless devices. Further research effort has been put to investigating efficient algorithm for key distribution for dynamic group, and wireless network simulation.

Lab News

Mini-symposium on Information Security 2004
 

November 9, 2004, McLeod Suite 318-322 Curry Center, Northeastern University
Program and Slides are available online.

Information Security Conference 2002 (ISC '02)
September 30 - October 2, 2002, Sao Paulo, Brazil
Conference Homepage, Call for Paper and mirror site.
 
Centers of Academic Excellence in Information Assurance Education
In May 2002, Northeastern University was designated as Centers of Academic Excellence in Information Assurance (IA) Education. This program is an outreach effort designed and operated by the National Security Agency (NSA) in the spirit of Presidential Decision Directive 63 (PDD 63), the Clinton Administration's Policy on Critical Infrastructure Protection, May 1998. The program goal is to reduce vulnerability in our National Information Infrastructure by promoting higher education in information assurance, and producing a growing number of professionals with IA expertise in various disciplines.
 
A Poster of our Lab Architecture


Projects

Lightweight Cryptography
Subcontract from Northwestern University, supported by DARPA(2000-2003)
Under construction
 
Authentication and Key Revocation Protocols for Wireless Networks
Supported by DARPA(2000-2003)
To maintain high quality of confidentiality and authenticity while still providing versatile key management solution and scalability capability for low-power devices in wireless networks, we investigate the following three areas, with special remark on the low power constraints of these wireless devices:
  1. Software-based Stream Cipher : to achieve fast data encryption rate on low-power devices.
  2. Mutually Authenticated Key Exchange Protocols : to provide efficient methods for parties with unequal computing power to authenticate and establish session keys over unreliable wireless network.
  3. Optimal Group-key Distribution Protocols : to allow effective key revocation of compromised and/or defected group members over an insecure broadcast channel.
Secure Location Related Services
Supported by Draper University Research Program (2002-2003)
Under construction
 


Publications

On Local Algorithms for Topology Control and Routing in Ad hoc Networks

 

L. Jia and C. Scheideler and R. Rajaraman

 

In Proceedings of the 15th Annual ACM Symposium on Parallel Algorithms and Architectures, pages 220-229, June 2003 (PS)

An Efficient Distributed Algorithm for Constructing Small Dominating Sets

 

L. Jia and T. Suel and R. Rajaraman

 

In Distributed Computing 15:193-205, 2002. A preliminary version appears in Proceedings of the Annual ACM Symposium on Principles of Distributed Computing, pages 33-42, August 2001. (PS)

A methodology for estimating inter-domain web traffic demand

 

A. Feldmann, O. Maennel, N. Kammenhuber, B. Maggs and R. de Prisco and R. Sundaram

 

Accepted to Internet Measurement Conference (IMC), 2004. (PS)

Managing a portfolio of overlay paths

 

D. Antonova, A. Krishnamurthy and Z. Ma and Vetta R. Sundaram

 

Accepted to Networking and Operating Systems Support for Digital Audio and Video (NOSSDAV), 2004.(PS)

(Almost) Tight bounds and existence theorems for confluent flows

 

J. Chen, R. Kleinberg, L. Lovasz, R. Rajaraman and A. Vetta R. Sundaram

 

Symposium on Theory of Computing (STOC), 2004. The paper is under review with the Journal of the ACM.(PS)

Meet and merge: approximation algorithms for confluent flows

 

J. Chen and R. Rajaraman and R. Sundaram

 

Symposium on Theory of Computing (STOC), pp. 373-382, 2003. The paper is under review with the Journal of Computer Systems and Sciences(PS)

Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorizations and Low-Bandwidth Communication Devices

 

R. Sundaram R. Gennaro, D. Leigh and W. Yerazunis

 

To appear in AsiaCrypt 2004.(PDF)

Minimum Energy Accumulative Routing in Wireless Networks

 

J. Chen, L. Jia, X. Liu, G. Noubir, R. Sundaram

 

in Proceedings of IEEE Infocom (PDF).

Mobility Models for Ad hoc Network Simulation

 

G. Lin, G. Noubir, R. Rajaraman

 

in Proceedings of IEEE Infocom (PDF).

On Connectivity in Ad Hoc Network under Jamming Using Directional Antennas and Mobility

 

G. Noubir

 

in International Conference on Wired /Wireless Internet Communications, Lecture Notes in Computer Science, Springer-Verlag (PDF).

Secure Multicast Groups on Ad Hoc Networks

 

T. Kaya, G. Lin, G. Noubir, A. Yilmaz

 

in Proceedings of ACM Workshop on Security of Ad hoc and Sensor Networks (PDF).

Secure Sharing of Location Information over Ad Hoc Networks: An Application of Secure Multicast

 

G. Noubir, G. Lin, M. Golitsine, N. Plante

 

Poster, ACM Mobihoc, 2003(PDF)

Low Power DoS Attacks in Data Wireless LANs and Countermeasures

 

G. Noubir, G. Lin

 

Poster, ACM Mobihoc (PDF)

Secure Multicast over Multihop Wireless Ad Hoc Networks

 

G. Lin, G. Noubir

 

in the Proceedings of Mobile Ad Hoc Networks Workshop (MADNET), Sophia-Antipolis , France

Energy Efficient Broadcast with Sectored Antennas in Wireless Ad Hoc Networks

 

G. Lin, G. Noubir,

 

in Proceedings of the IASTED/IEEE Wireless and Optical Communications Conference, July 2002 (PDF).

On Link Layer Denial of Service in DATA Wireless LANs

 

G. Lin, G. Noubir

 

To appear in the Wiley Journal on Wireless Communications and Mobile Computing, Wiley (PDF).

Improving Goodput of the IEEE 802.11 MAC Protocol by Using Congestion Control Methods

 

S. Ci, H. Sharif, and G. Noubir

 

To appear in the International Journal on Wireless and Optical Communications (IJWOC), World Scientific Publishing (PDF). (2003).

Secure Sharing of Location Information over Ad Hoc Networks: An Application of Secure Multicast

 

G. Noubir, G. Lin, M. Golitsine, N. Plante

 

in ACM SIGMOBILE Mobile Computing and Communications Review (MC2R), volume 7, Issue 3 (Abstract).

Low Power DoS Attacks in Data Wireless LANs and Countermeasures

 

G. Noubir, G. Lin

 

in ACM SIGMOBILE Mobile Computing and Communications Review (MC2R), volume 7, Issue 3 (Abstract).

Password Authenticated Key Exchange for Resource-constrained Wireless Communications
  Duncan S. Wong, Agnes H. Chan, and Feng Zhu
  IEEE International Conference on Networking 2005

More Efficient Password Authenticated Key Exchange Based on RSA

 

Duncan S. Wong, Agnes H. Chan and Feng Zhu (PDF)

indocrypt03 LNCS 2904 pp. 375 - 387

Optimal Tree Structure for Key Management of Simultaneous Join/Leave in Secure Multicast
  Feng Zhu, Agnes Chan, Guevara Noubir
  MILCOM 2003 (PDF)
Optimal Tree Structure for Key Management of Simultaneous Join/Leave in Secure Multicast
  Feng Zhu, Agnes Chan, Guevara Noubir (PDF)
  Technical Report
RSA-based Password Authenticated Key Exchange for Imbalanced Wireless Network
Feng Zhu, Agnes H. Chan, Duncan Wong, Robbie Ye   (postscript)
The Information Security Conference 2002 (ISC'02)
 
Key Management for Simultaneous Join/Leave in Secure Multicast
Guevara Noubir, Feng Zhu, Agnes H. Chan   (extended abstract PDF)   (full PDF)
ISIT 2002
 
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices
Duncan S. Wong, Agnes H. Chan   (postscript)
ASIACRYPT 2001
 
The Performance Measurement of Cryptographic Primitives on Palm Devices
Duncan S. Wong, Hector Ho Fuentes, Agnes H. Chan   (postscript)
The Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001)
 
Mutual Authentication and Key Exchange for Low Power Wireless Communications
Duncan S. Wong, Agnes H. Chan   (postscript)
IEEE MILCOM 2001 Conference proceedings
 
Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers
Muxiang Zhang, Agnes H. Chan   (postscript)
CRYPTO 2000
 
The Software-Oriented Stream Cipher SSC2
Muxiang Zhang, Christopher Carroll, Agnes H. Chan   (postscript)
Fast Software Encryption Workshop 2000
 
Analysis of IS-95 CDMA Voice Privacy
Muxiang Zhang, Christopher Carroll, Agnes H. Chan   (postscript)
Selected Areas in Cryptography 2000
 


Libraries and Implementations

MPLib (Multiple-precision Integer Arithmetic Library for Palm OS)
 
Cryptographic Algorithm Libraries for Palm OS

This is a collection of cryptographic algorithms implemented as system libraries for Palm OS. You can also click the following links to go directly to those libraries.
SSC2
ARC4
SEAL 3.0
Rijndael
DES, DESX and 3DES
MD2, MD4 and MD5
SHA-1

 
ECCLib (Elliptic Curve Library for Palm OS)
 
Scribble for Palm OS



People

Faculty
Agnes Hui Chan <ahchan@ccs.neu.edu>
Guevara Noubir <noubir@ccs.neu.edu>
Rajmohan Rajaraman <rraj@ccs.neu.edu>
Ravi Sundaram <koods@ccs.neu.edu>

Graduate Students
Daria Antonova <daria@ccs.neu.edu>
Jiangzhuo Chen <chenj@ccs.neu.edu>
Richard Conlan <kaige@ccs.neu.edu>
Hector Fuentes <hhofuent@ccs.neu.edu>
Lujun Jia <lujunjia@ccs.neu.edu>
Jonathan Kleiner <jkleiner@ccs.neu.edu>
Guolong Lin <lingl@ccs.neu.edu>
Xin Liu <liux@ccs.neu.edu>
Wei Qian <qwlli@ccs.neu.edu>
Yin Wang <ryanwang@ccs.neu.edu>
Jonathan Wong <ckwong@ccs.neu.edu>
Robbie Ye <robbieye@ccs.neu.edu>
Atilay Yilmaz <ati@ccs.neu.edu>
Feng Zhu <zhufeng@ccs.neu.edu>


Contacts & Directions

Mail :
Agnes Hui Chan
161 Cullinane Hall
College of Computer Science,
Northeastern University
360 Huntington Avenue
Boston, MA 02115
Phone : 617 373 2464
Fax : 617 373 5121
Email : ahchan@ccs.neu.edu
Directions :
Wireless Security Laboratory locates at Rm 264 in the Egan Research Center, 360 Huntington Ave., Northeastern University, Boston. Please check out the Northeastern University Campus Map for directions and campus map.


Home | Projects | Publications | Libraries | People | Contacts
Copyright 2002-2004 Wireless Security Laboratory, College of Computer Science, Northeastern University. All rights reserved.
Revised 2004-11-11