Department of Electrical and Computer Engineering University of Arizona 
Loukas Lazos
Home Students Research Publications Teaching Prof. Activities Vitae    

Book Chapters

  1. Secure Localization for Wireless Sensor Networks using Range-Independent Methods
    Loukas Lazos, and Radha Poovendran
    Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, Editors: R. Poovendran, C. Wang, S. Roy, Springer Verlag, New York, 2006Book

Journal Publications

  1. Time-Delayed Broadcasting for Defeating Inside Jammers, pdfappendix
    Sisi Liu, Loukas Lazos, and Marwan Krunz
    to appear in the IEEE Transactions on Dependable and Secure Computing.
     
  2. Vulnerabilities of Cognitive Radio MAC Protocols and Countermeasurespdf
    Yan Zhang and Loukas Lazos,
    IEEE Network,Vol. 27, No. 3, pp 40 – 45, 2013.
     
  3. AMD: Audit-based Misbehavior Detection in Wireless Ad Hoc Networkspdfpdf
    Yu Zhang, Loukas Lazos, and William Jr. Kozma
    available for online access on the IEEE Transactions on Mobile Computing.
     
  4. Vulnerabilities of Cognitive Radio MAC Protocols and Countermeasurespdf
    Yan Zhang and Loukas Lazos
    to appear in theIEEE Network.
     
  5. Packet-Hiding Methods for Preventing Selective Jamming Attackspdf
    Alejandro Proano and Loukas Lazos
    IEEE Transactions on Dependable and Secure Computing, (TDSC) Vol. 9, No. 1, pp. 101 – 114, 2012.
     
  6. Thwarting Control-Channel Jamming Attacks from Inside Jammerspdfpdf
    Sisi Liu, Loukas Lazos, and Marwan Krunz
    IEEE Transactions on Mobile Computing, (TMC), Vol. 11, No. 9, pp. 1545 – 1558, 2012.
     
  7. Cluster-based Control Channel Allocation in Opportunistic Cognitive Radio Networkspdfpdf
    Sisi Liu, Loukas Lazos, and Marwan Krunz
    IEEE Transactions on Mobile Computing, (TMC), Vol. 11, No. 10, pp. 1436 – 1449, 2012.
     
  8. Graph-based criteria for spectrum-aware clustering in cognitive radio networkspdf
    Milan Bradonjic and Loukas Lazos
    To appear in Ad Hoc Networks Journal, Vol 10, No. 1, pp. 75 – 94, 2012
     
  9. Selective Jamming/Dropping Insider Attacks in Wireless Mesh Networkspdftxt
    Loukas Lazos and Marwan Krunz
    IEEE Network, Vol. 25, No. 1, pp. 31 – 34, 2011.
     
  10. Securing Low-cost RFID Systems: an Unconditionally Secure Approachpdftxt
    Basel Alomair, Loukas Lazos, and Radha Poovendran
    Journal of Computer Security (JCS), Vol. 19, No. 2, pp. 229 – 257, 2011.
     
  11. Analytic Evaluation of Target Detection in Heterogeneous Wireless Sensor Networkspdftxt
    Loukas Lazos, Radha Poovendran, and James A. Ritcey
    ACM Transactions on Sesnor Networks (TOSN), Vol. 5, No. 2, pp. 1 – 38, 2009.
     
  12. Energy and Bandwidth-Efficient Key Distribution in Wireless Ad-Hoc Networks: A Cross-Layer Approachpdftxt
    Javier Salido, Loukas Lazos, and Radha Poovendran
    IEEE/ACM Transactions on Networking, (TON), Vol. 15, No. 6, pp. 1527 – 1540, 2007.
     
  13. Detection of Mobile Targets on the Plane and in Space using Heterogeneous Sensor Networkspdftxt
    Loukas Lazos, Radha Poovendran, and James A. Ritcey
    ACM/Springer Journal on Wireless Networks (WINET), 2007.
     
  14. Stochastic Coverage in Heterogeneous Sensor Networkspdftxt
    Loukas Lazos, and Radha Poovendran
    ACM Transactions on Sesnor Networks (TOSN), August 2006, Vol. 2, Issue 3, pp. 325 – 358.
     
  15. A Graph Theoretic Framework for Preventing the Wormhole Attack in Wireless Ad Hoc Networkspdftxt
    Radha Poovendran, and Loukas Lazos
    ACM/Springer Journal on Wireless Networks (WINET), May 2006, printed, Vol. 13, Issue 1, February 2007.
     
  16. Power Proximity Based Key Management for Secure Multicast in Ad Hoc Networkspdftxt
    Loukas Lazos, and Radha Poovendran
    ACM/Springer Journal on Wireless Networks (WINET), May 2006, printed, Vol. 13, Issue 1, February 2007.
     
  17. High Resolution Localization for Wireless Sensor Networkspdftxt
    Loukas Lazos, and Radha Poovendran
    IEEE Journal on Selected Areas in Communications, Special Issue on Network Security, (JSAC), February 2006, Vol. 24, Issue 2, pp. 233 – 246.
     
  18. SeRLoc: Robust Localization for Wireless Sensor Networkspdftxt
    Loukas Lazos, and Radha Poovendran
    ACM Transactions on Sensor Networks (TOSN), August 2005, Vol. 1, Issue 1, pp. 73 – 100.
     

Conference Publications

  1. FD-MMAC: Combating Multi-Channel Hidden and Exposed Terminals Using a Single Transceiverpdf
    Yan Zhang, Loukas Lazos, Kai Chen, Bocan Hu, and Swetha Shivaramaiah
    33rd IEEE International Conference on Computer Communications (INFOCOM 2014), to appear.
     
  2. Security vulnerability and countermeasures of frequency offset correction in 802.11a systems
    Hanif Rahbari, Marwan Krunz, and Loukas Lazos
    33rd IEEE International Conference on Computer Communications (INFOCOM 2014), to appear.
     
  3. Collusion-Resistant Query Anonymization for Location-Based Servicespdf
    Qin Zhang and Loukas Lazos
    IEEE International Conference on Communications (ICC 2014), to appear.
     
  4. Countering Selfish Misbehavior in Multi-channel MAC Protocolspdf
    Yan Zhang and Loukas Lazos
    32nd IEEE International Conference on Computer Communications (INFOCOM 2013).
     
  5. Perfect Contextual Information Privacy in WSNs under Colluding Eavesdropperspdf
    Alejandro Proano and Loukas Lazos
    6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2013).
     
  6. Hiding Contextual Information in WSNspdf
    Alejandro Proano and Loukas Lazos
    3rd IEEE International Workshop on Data Security and Privacy in wireless Networks (D-SPAN 2012)
    in conjunction with WoWMoM 2012, INVITED PAPER.
     
  7. Thwarting Inside Jamming Attacks on Wireless Broadcast Communicationspdf
    Loukas Lazos, Sisi Liu, and Marwan Krunz
    4th ACM Conference on Wireless Network Security (WiSec 2011)
     
  8. A Primary User Authentication System for Mobile Cognitive Radio Networkspdftxt
    Swathi Chandrashekar, and Loukas Lazos
    The 3rd International Workshop on Cognitive Radio and Advanced Spectrum Management ( COGART 2010,), INVITED PAPER.
     
  9. Selective Jamming Attacks in Wireless Networkspdftxt
    Alejandro Proano and Loukas Lazos
    IEEE International Conference on Communications (ICC 2010).
     
  10. Dealing with Liars: Misbehavior Identification via Renyi-Ulam Gamespdftxt
    William Kozma Jr., and Loukas Lazos
    5th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2009).
     
  11. Spectrum Opportunity-Based Control Channel Assignment in Cognitive Radio Networkspdftxt
    Loukas Lazos, Sisi Liu, and Marwan Krunz
    6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON 2009).
     
  12. Mitigating Control-Channel Jamming Attacks in Multi-channel Wireless Ad Hoc Networkspdftxt
    Loukas Lazos, Sisi Liu, and Marwan Krunz
    2nd ACM Conference on Wireless Network Security (WiSec 2009).
     
  13. REAct: Resource-Efficient Accountability for Node Misbehavior in Ad Hoc Networks based on Random Audits (short paper)pdftxt
    William Kozma Jr., and Loukas Lazos
    2nd ACM Conference on Wireless Network Security (WiSec 2009).
     
  14. Reactive Identification of Misbehavior in Ad Hoc Networks Based on Random Audits (Poster)pdftxt
    William Kozma Jr., and Loukas Lazos
    Fifth Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks (Secon 2008).
     
  15. Passive Attacks on a Class of Authentication Protocols for RFIDpdftxt
    Basel Alomair, Loukas Lazos, and Radha Poovendran
    Tenth International Conference on Information Security and Cryptology (ICISC 2007).
     
  16. Probabilistic Detection of Mobile Targets in Heterogeneous Sensor Networkspdftxt
    Loukas Lazos, Radha Poovendran, and James A. Ritcey
    Sixth International Symposium on Information Processing in Sensor Networks (IPSN 2007).
     
  17. On the Deployment of Heterogeneous Sensor Networks for Detection of Mobile Targetspdftxt
    Loukas Lazos, Radha Poovendran, and James A. Ritcey
    Fifth International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt 2007).
     
  18. Coverage in Heterogeneous Sensor Networkspdftxt
    Loukas Lazos, and Radha Poovendran
    Fourth International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt 2006).
     
  19. ROPE: Robust Position Estimation in Wireless Sensor Networkspdftxt
    Loukas Lazos, Srdjan Capkun, and Radha Poovendran
    Fourth International Symposium on Information Processing in Sensor Networks (IPSN 2005).
     
  20. Preventing Wormhole Attacks on Wireless Ad Hoc Networks: A Graph Theoretic Approachpdftxt
    Loukas Lazos, Radha Poovendran, C. Meadows, P. Syverson, and L. W. Chang
    IEEE Wireless Communications and Networking Conference (WCNC 2005).
     
  21. SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networkspdftxt
    Loukas Lazos, and Radha Poovendran
    ACM Workshop on Wireless Security (WiSe 2004).
     
  22. VP3: Using Vertex Path and Power Proximity for Energy Efficient Key Distribution pdftxt
    Loukas Lazos, Javier Salido, and Radha Poovendran
    IEEE Vehicular Technology Conference, (VTC 2004).
     
  23. Cross-Layer Design for Energy-Efficient Secure Multicast Communications in Ad Hoc Networkspdftxt
    Loukas Lazos, and Radha Poovendran
    IEEE International Conference on Communications (ICC 2004).
     
  24. Energy-Aware Secure Multicast Communication in Ad-hoc Networks Using Geographic Location Informationpdftxt
    Loukas Lazos, and Radha Poovendran
    IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP 2003).
     
  25. Secure Broadcast in Energy-Aware Wireless Sensor Networks pdftxt
    Loukas Lazos, and Radha Poovendran
    IEEE International Symposium on Advances in Wireless Communications (ISWC 2002).
     

Theses - Technical Reports

  1. Thesis: Securing Network Services for Wireless Ad Hoc and Sensor Networks pdftxt
    Loukas Lazos
    Ph.D. Dissertation, University of Washington, August 2006.
     
  2. TR: Energy-Aware Secure Multicast Communication In Wireless Ad-Hoc Networks pdf
    Loukas Lazos, and Radha Poovendran
    University of Washington, UWEETR-2003-0013, 2003.
     
  3. Location-Aware Secure Wireless Multicast in Ad-Hoc Networks under Heterogeneous Pathloss pdf
    Loukas Lazos, and Radha Poovendran, and Gregory H. Cirincione
    University of Washington, UWEETR-2003-0012, 2003



Home Students Research Publications Teaching Prof. Activities Vitae    
             
          Valid CSS! Valid HTML 4.01 Transitional