Complex Networks and Security Research (CNSR)

URL: http://www.cnsr.ictas.vt.edu

Contact: Wenjing Lou

The Complex Networks and Security Research (CNSR) Laboratory at Virginia Tech was founded in 2011 by Profs. Tom Hou and Wenjing Lou. It was merged from the former Complex Network Systems Lab in the ECE department and the former Cyber Security Lab in the CS department.

The mission of the new CNSR@VT lab is to conduct basic and applied research in a broad range of topics in networking, wireless, and cyber security. We explore novel concepts and ideas related to protocols and systems of the future pervasive cyber infrastructure, and design scalable architecture and trustworthy protocols for the next generation networks.

Research interests at CNSR@VT: 

  • Wireless Security: security and privacy in wireless networks and mobile computing, cognitive radio networks security, cross-layer methods for security enhancement, location privacy
  • Cross-layer Optimization: multi-hop cognitive radio ad hoc networks, multi-hop MIMO ad hoc networks
  • Algorithm Design and Optimization: for multi-hop cooperative communications, for wireless ad hoc and sensor networks, opportunistic routing, network coding
  • Security and Privacy in Cloud Computing: outsourced data privacy, search over encrypted data, computation outsourcing privacy
  • Security and Privacy in Cyber-physical Systems: e-healthcare systems and smart grid
  • Video Communications over Dynamic Ad Hoc Networks

 

2013
2012
Wang, C., Q. Wang, K. Ren, and W. Lou, "Towards secure and dependable storage services in cloud computing", IEEE Transactions on Service Computing (TSC), vol. 5, no. 2, pp. 220-232, 2012. Abstract
Wang, C., N. Cao, K. Ren, and W. Lou, "Enabling secure and efficient ranked keyword search over outsourced cloud data", IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 8, pp. 1467-1479, 8/2012. Abstract
Li, M., S. Yu, W. Lou, and Y. T. Hou, "Toward Privacy-Assured Cloud Data Services with Flexible Search Functionalities", Third International Workshop on Security and Privacy in Cloud Computing (ICDCS-SPCC 2012), Macau, China, 06/2012.
2011
Li, M., Z. Yang, and W. Lou, "CodeOn: Cooperative Popular Content Distribution for Vehicular Networks using Symbol Level Network Coding", IEEE Journal on Selected Areas in Communications (JSAC), special issue on Vehicular Communication Networks, vol. 29, no. 1, pp. 223-235, 01/2011.
Wang, Q., K. Ren, S. Yu, and W. Lou, "Dependable and secure sensor data storage with dynamic integrity assurance", ACM Transactions on Senor Networks (ToSN), vol. 8, no. 1, 08/2011.
Wang, Q., C. Wang, K. R. Jin Li, and W. Lou, "Enabling public verifiability and data dynamics for storage security in cloud computing", IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, 05/2011.
Yu, S., K. Ren, and W. Lou, "FDAC: Toward fine-grained distributed data access control in wireless sensor networks", IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 4, 05/2011.
Cao, N., Z. Yang, K. R. Cong Wang, and W. Lou, "Privacy-preserving query over encrypted graph-structured data in cloud computing", The 31th International Conference on Distributed Computing Systems (ICDCS 2011), Minneapolis, MN, USA, 06/2011.
Li, M., S. Yu, N. Cao, and W. Lou, "Authorized private keyword search over encrypted personal health records in cloud computing", The 30th International Conference on Distributed Computing Systems (ICDCS 2011), Minneapolis, MN, USA, 06/2011.
Li, M., Z. Yang, and W. Lou, "CodeOn: Cooperative Popular Content Distribution for Vehicular Networks using Symbol Level Network Coding", IEEE Journal on Selected Areas in Communications (JSAC), special issue on Vehicular Communication Networks, vol. 29, no. 1, 01/2011.
2010
Wang, C., K. Ren, W. Lou, and J. Li, "Towards publicly auditable secure cloud data storage services", IEEE Networks Magazine special issue on Future Internet: New Applications and Emerging Services, vol. 24, no. 4, 07/2010.
Li, M., W. Lou, and K. Ren, "Data security and privacy in wireless body area networks", IEEE Wireless Communications special issue on Wireless Technologies for E-healthcare, vol. 17, no. 1, 02/2010.
Li, M., S. Yu, K. Ren, and W. Lou, "Securing personal health records in cloud computing: patient-centric and fine-grained data access control in multi-owner settings", 6th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2010), Singapore, 09/2010.
Wang, C., N. Cao, K. R. Jin Li, and W. Lou, "Secure ranked keyword search over encrypted cloud data", The 30th International Conference on Distributed Computing Systems (ICDCS 2010), Genoa, Italy, 06/2010.
Yu, S., K. Ren, and W. Lou, "Attribute based data sharing with attribute revocation", 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2010), Beijing, China, 04/2010.
Li, M., W. Lou, and K. Ren, "Secure device pairing,” in Encyclopedia of Cryptography and Security (2nd ed.)", Encyclopedia of Cryptography and Security (2nd ed.): Springer, 2010.
Yu, S., W. Lou, and K. Ren, "Privacy-preserving user authentication in wireless access networks", Encyclopedia of Cryptography and Security (2nd ed.): Springer, 2010.
Zeng, K., Z. Yang, and W. Lou, "Opportunistic routing in multi-radio multi-channel multi-hop wireless networks", IEEE Transactions on Wireless Communications, vol. 9, no. 11, 11/2010.
2009
Wang, Q., C. Wang, K. R. Jin Li, and W. Lou, "Enabling public verifiability and data dynamics for storage security in cloud computing", 14th European Symposium on Research in Computer Security (ESORICS 2009), Saint Malo, France, 09/2009.
Wang, Q., K. Ren, C. Wang, and W. Lou, "Efficient fine-grained data access control in wireless sensor networks", IEEE Military Communication Conference (MILCOM 2009), Boston, MA, 10/2009.
Yu, S., K. Ren, W. Lou, and J. Li, "Defending against key abuse attacks in KP-ABE enabled broadcast systems", The 5th International ICST Conference on Security and Privacy in Communication Networks (Securecomm 2009), Athens, Greece, 09/2009.
Wang, C., Q. Wang, K. Ren, and W. Lou, "Ensuring data storage security in cloud computing", 17th IEEE International Workshop on Quality of Service (IWQoS 2009), Charleston, South Carolina, 07/2009.
Yu, S., K. Ren, and W. Lou, "Accountable attribute-based broadcast", IEEE Symposium on Security and Privacy (S&P 2009), Oakland, CA, 05/2009.
Lou, W., and K. Ren, "Security, privacy, and accountability in wireless access networks", IEEE Wireless Communications, vol. 16, no. 4, 08/2009.
Yang, Z., M. Li, and W. Lou, "R-Code: Network coding based reliable broadcast in wireless mesh networks with unreliable links", IEEE Global Telecommunications Conference (GLOBECOM 2009), Honolulu, Hawaii, USA, 12/4/2009.
Li, M., W. Lou, and K. Zeng, "OppCast: Opportunistic broadcast of warning messages in VANETs with unreliable links", The 6th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2009), Macau, China, 10/2009.
Yang, Z., M. Li, and W. Lou, "A network coding approach to reliable broadcast in wireless mesh networks", International Conference on Wireless Algorithms, Systems, and Applications (WASA 2009), Boston, MA, 08/2009.
Yang, Z., K. Zeng, and W. Lou, "FSA: A fast coordination scheme for opportunistic routing", International Conference on Communications (ICC 2009), Dresden, Germany, 06/2009.
2008
Yu, S., K. Ren, and W. Lou, "Attribute-based content distribution with hidden policy", The 4th Workshop on Secure Network Protocols (NPSec 2008), Orlando, FL, USA, 10/2008.
Ren, W., K. Ren, W. Lou, and Y. Zhang, "Efficient User Revocation for Privacy-aware PKI", The Fifth International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QShine 2008), Hong Kong, China, 07/2008.
Ren, K., W. Lou, and Y. Zhang, "Multi-user broadcast authentication in wireless sensor networks", Encyclopedia on Ad Hoc and Ubiquitous Computing: World Scientific, 2008.
Ren, K., K. Zeng, and W. Lou, "Secure and fault-tolerant event boundary detection in wireless sensor networks", IEEE Transactions on Wireless Communications, vol. 7, no. 1, 01/2008.
Zeng, K., K. R. Shucheng Yu, W. Lou, and Y. Zhang, "Towards secure link quality measurement in multihop wireless networks", IEEE Global Telecommunications Conference (GLOBECOM 2008), New Orleans, LA, USA, 11/2008.
Yu, S., K. Ren, and W. Lou, "Attribute-based on-demand multicast group Setup with receiver anonymity", The 4th International Conference on Security and Privacy in Communication Networks (SecureComm 2008), Istanbul, Turkey, 09/2008.
Ren, K., and W. Lou, "A sophisticated privacy-enhanced yet accountable security framework for wireless mesh networks", The 28th International Conference on Distributed Computing Systems (ICDCS 2008), Beijing, China, 06/2008.
Ren, W., K. Ren, and W. Lou, "Optimized User Revocation for Group Signature Based Privacy-aware PKI", The First International Workshop on Wireless Security and Privacy (WiSP'08), Beijing, China, 06/2008.
Wan, Z., K. Ren, W. Lou, and B. Preneel, "Anonymous ID-based group key agreement for wireless networks", IEEE Wireless Communications and Networking Conference (WCNC’2008), Las Vegas, 03/2008.
Zeng, K., W. Lou, and H. Zhai, "Capacity of opportunistic routing in multirate and multihop wireless networks", IEEE Transactions on Wireless Communications, vol. 7, no. 12, 12/2008.
Guo, W., X. Huang, W. Lou, and C. Liang, "On relay node placement and assignment for two-tiered wireless networks", ACM Mobile Networks and Applications (MONET), special issue on "Advances in wireless mesh networks", vol. 13, 01/2008.
Li, M., and W. Lou, "Opportunistic Broadcast of Emergency Messages in Vehicular Ad Hoc Networks with Unreliable Links", The Fifth International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QShine 2008), Hong Kong, China, 07/2008.
2007
Ren, K., W. Lou, K. Zeng, and P. J. Moran, "On broadcast authentication in wireless sensor networks", IEEE Transactions on Wireless Communications, vol. 6, no. 11, 11/2007.
Ren, K., and W. Lou, "Privacy-enhanced, attack-resilient access control in pervasive computing environments with optional context authentication capability", ACM Mobile Networks and Applications (MONET) (special issue on Wireless Broadband Access), vol. 12, no. 1, 01/2007.
Yu, S., K. Ren, and W. Lou, "A privacy-preserving lightweight authentication protocol for low-cost RFID tags", IEEE Military Communication Conference (MILCOM 2007), Orlando, FL, 10/2007.
Ren, K., W. Lou, and Y. Zhang, "Multi-user broadcast authentication in wireless sensor networks", Fourth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON 2007) , 01/2007.
Zeng, K., W. Lou, and Y. Zhang, "Multi-rate geographic opportunistic routing in wireless ad hoc networks", IEEE Military Communication Conference (MILCOM 2007), Orlando, FL, 10/2007.
Zeng, K., W. Lou, J. Yang, and R. B. D. III, "On throughput efficiency of geographic opportunistic routing in multihop wireless networks", The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security, and Robustness (QShine 2007), Vancouver, BC, Canada, 08/2007.
Zeng, K., W. Lou, J. Yang, and R. B. D. III, "On geographic collaborative forwarding in wireless ad hoc and sensor networks", International Conference on Wireless Algorithms, Systems, and Applications (WASA 2007), Chicago, IL, 08/2007.
2006
Zhang, Y., W. Liu, W. Lou, and Y. Fang, "Securing mobile ad hoc networks with certificateless public keys", IEEE Transactions on Dependable and Secure Computing, vol. 3, no. 4, 10/2006.
Zhang, Y., W. Liu, W. Lou, and Y. Fang, "MASK: An anonymous routing protocol for mobile ad hoc networks", IEEE Transaction on Wireless Communications, vol. 5, no. 9, 09/2006.
Ren, K., K. Zeng, and W. Lou, "A new approach for random key pre-distribution in large scale wireless sensor networks", Wireless Communications & Mobile Computing (Special issue on Wireless Network Security), vol. 6, no. 3, 01/2006.
Zhang, Y., W. Liu, W. Lou, and Y. Fang, "Location-based compromise-tolerant security mechanisms for wireless sensor networks", IEEE Journal on Selected Areas in Communications (Special Issue on Security in Wireless Ad Hoc Networks), vol. 24, no. 2, 02/2006.
Ren, K., K. Zeng, and W. Lou, "Fault-tolerant event boundary detection in wireless sensor networks", IEEE Global Telecommunications Conference (GLOBECOM 2006), San Francisco, CA, 11/2006.
Ren, K., W. Lou, and P. J. Moran, "A proactive data security framework for mission-critical sensor networks", IEEE Military Communication Conference (MILCOM 2006), Washington, DC, 10/2006.
Ren, K., K. Zeng, W. Lou, and P. J. Moran, "On broadcast authentication in wireless sensor networks", International Conference on Wireless Algorithms, Systems, and Applications (WASA 2006), Xi'an, China, 08/2006.
Zeng, K., W. Lou, K. Ren, and P. J. Moran, "Energy-efficient geographic routing in environmentally powered wireless sensor networks", IEEE Military Communication Conference (MILCOM 2006), Washington, DC, 10/2006.
Zeng, K., K. Ren, W. Lou, and P. J. Moran, "Energy aware efficient geographical routing in lossy wireless sensor networks with environmental energy supply", The Third International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QShine 2006), Waterloo, Ontario, Canada, 08/2006.
Ren, K., W. Lou, K. Zeng, F. Bao, J. Zhou, and R. H. Deng, "Routing optimization security in mobile IPv6", Computer Networks, vol. 50, issue 13, pp. 2401 - 2419, 9/2006.
2005
Ren, K., K. Zeng, and W. Lou, "On efficient key pre-distribution in wireless sensor networks", IEEE military communication conference (MILCOM 2005): Atlantic City, NJ, 10/2005.
Ren, K., and W. Lou, "Privacy enhanced access control in pervasive computing environments", 2nd International Conference on Broadband Networks (BroadNets 2005), Broadband Wireless Networking Symposium, Boston, MA, USA, 10/2005.
Zhang, Y., W. Liu, W. Lou, and Y. Fang, "AC-PKI: Anonymous and certificateless public key infrastructure for mobile ad hoc networks", International Conference on Communications (ICC’05), Seoul, Korea, 05/2005.
Zhang, Y., W. Liu, W. Lou, and Y. Fang, "Securing sensor networks with location-based keys", IEEE Wireless Communications and Networking Conference (WCNC’2005), New Orleans, LA, 03/2005.
Lou, W., "An efficient N-to-1 multipath routing protocol in wireless sensor networks", 2nd IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2005), Washington, DC, 11/2005.
Zeng, K., K. Ren, and W. Lou, "Geographic on-demand disjoint multipath routing in wireless ad hoc networks", IEEE military communication conference (MILCOM 2005), Atlantic City, NJ, 10/2005.
2004
Zhang, Y., W. Lou, and Y. Fang, "SIP: A Secure Incentive Protocol against Selfishness in Mobile Ad Hoc Networks", IEEE Wireless Communications and Networking Conference (WCNC’2004), Atlanta, GA, 03/2004.
Liu, W., Y. Zhang, W. Lou, and Y. Fang, "Managing wireless sensor networks with supply chain strategy", First International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QShine 2004), Dallas, TX, 10/2004.
Liu, W., Y. Zhang, W. Lou, Y. Fang, and T. Wong, "Scalable and robust data dissemination in wireless sensor networks", IEEE Global Telecommunications Conference, 2004. GLOBECOM '04.IEEE Global Telecommunications Conference, 2004. GLOBECOM '04., vol. 5, Dallas, TX, USA, IEEE, pp. 3177 - 3181, 2004.
2003
2002
2001
Lou, W., and Y. Fang, "A multipath routing approach for secure data delivery", IEEE Military Communications Conference (MILCOM’01), Mclean, VA, 10/2001.
Lou, W., L. T. Chia, B. S. Lee, and B. Wang, "The transmission of MPEG-2 VBR video under usage parameter control", International Journal of Communication Systems, vol. 14, no. 2, 03/2001.