Department of Electrical and Computer Engineering University of Arizona 
Loukas Lazos
Home Students Research Publications Teaching Prof. Activities Vitae    

Book Chapters

  1. Secure Localization for Wireless Sensor Networks using Range-Independent Methods
    Loukas Lazos, and Radha Poovendran
    Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, Editors: R. Poovendran, C. Wang, S. Roy, Springer Verlag, New York, 2006Book

Journal Publications

  1. Swift Jamming Attack on Frequency Offset Estimation: The Achilles' Heel of OFDM Systems, pdf
    Hanif Rahbari, Marwan Krunz, and Loukas Lazos
    to appear in the IEEE Transactions on Mobile Computing.
     
  2. AMD: Audit-based Misbehavior Detection in Wireless Ad Hoc Networkspdfpdf
    Yu Zhang, Loukas Lazos, and William Jr. Kozma
    to appear in the IEEE Transactions on Mobile Computing.
     
  3. Time-Delayed Broadcasting for Defeating Inside Jammers, pdfappendix
    Sisi Liu, Loukas Lazos, and Marwan Krunz
    IEEE Transactions on Dependable and Secure Computing,Vol. 12 No. 3, pp. 351 – 265, 2015.
     
  4. Vulnerabilities of Cognitive Radio MAC Protocols and Countermeasurespdf
    Yan Zhang and Loukas Lazos,
    IEEE Network, Vol. 27, No. 3, pp 40 – 45, 2013.
     
  5. Packet-Hiding Methods for Preventing Selective Jamming Attackspdf
    Alejandro Proano and Loukas Lazos
    IEEE Transactions on Dependable and Secure Computing, (TDSC) Vol. 9, No. 1, pp. 101 – 114, 2012.
     
  6. Thwarting Control-Channel Jamming Attacks from Inside Jammerspdfpdf
    Sisi Liu, Loukas Lazos, and Marwan Krunz
    IEEE Transactions on Mobile Computing, (TMC), Vol. 11, No. 9, pp. 1545 – 1558, 2012.
     
  7. Cluster-based Control Channel Allocation in Opportunistic Cognitive Radio Networkspdfpdf
    Sisi Liu, Loukas Lazos, and Marwan Krunz
    IEEE Transactions on Mobile Computing, (TMC), Vol. 11, No. 10, pp. 1436 – 1449, 2012.
     
  8. Graph-based criteria for spectrum-aware clustering in cognitive radio networkspdf
    Milan Bradonjic and Loukas Lazos
    Ad Hoc Networks Journal, Vol 10, No. 1, pp. 75 – 94, 2012
     
  9. Selective Jamming/Dropping Insider Attacks in Wireless Mesh Networkspdf
    Loukas Lazos and Marwan Krunz
    IEEE Network, Vol. 25, No. 1, pp. 31 – 34, 2011.
     
  10. Securing Low-cost RFID Systems: an Unconditionally Secure Approachpdf
    Basel Alomair, Loukas Lazos, and Radha Poovendran
    Journal of Computer Security (JCS), Vol. 19, No. 2, pp. 229 – 257, 2011.
     
  11. Analytic Evaluation of Target Detection in Heterogeneous Wireless Sensor Networkspdf
    Loukas Lazos, Radha Poovendran, and James A. Ritcey
    ACM Transactions on Sesnor Networks (TOSN), Vol. 5, No. 2, pp. 1 – 38, 2009.
     
  12. Energy and Bandwidth-Efficient Key Distribution in Wireless Ad-Hoc Networks: A Cross-Layer Approachpdf
    Javier Salido, Loukas Lazos, and Radha Poovendran
    IEEE/ACM Transactions on Networking, (TON), Vol. 15, No. 6, pp. 1527 – 1540, 2007.
     
  13. Detection of Mobile Targets on the Plane and in Space using Heterogeneous Sensor Networkspdf
    Loukas Lazos, Radha Poovendran, and James A. Ritcey
    ACM/Springer Journal on Wireless Networks (WINET), 2007.
     
  14. Stochastic Coverage in Heterogeneous Sensor Networkspdf
    Loukas Lazos, and Radha Poovendran
    ACM Transactions on Sesnor Networks (TOSN), August 2006, Vol. 2, Issue 3, pp. 325 – 358.
     
  15. A Graph Theoretic Framework for Preventing the Wormhole Attack in Wireless Ad Hoc Networkspdf
    Radha Poovendran, and Loukas Lazos
    ACM/Springer Journal on Wireless Networks (WINET), May 2006, printed, Vol. 13, Issue 1, February 2007.
     
  16. Power Proximity Based Key Management for Secure Multicast in Ad Hoc Networkspdf
    Loukas Lazos, and Radha Poovendran
    ACM/Springer Journal on Wireless Networks (WINET), May 2006, printed, Vol. 13, Issue 1, February 2007.
     
  17. High Resolution Localization for Wireless Sensor Networkspdf
    Loukas Lazos, and Radha Poovendran
    IEEE Journal on Selected Areas in Communications, Special Issue on Network Security, (JSAC), February 2006, Vol. 24, Issue 2, pp. 233 – 246.
     
  18. SeRLoc: Robust Localization for Wireless Sensor Networkspdf
    Loukas Lazos, and Radha Poovendran
    ACM Transactions on Sensor Networks (TOSN), August 2005, Vol. 1, Issue 1, pp. 73 – 100.
     

Conference/Workshop Publications

  1. Verifying ADS-B Navigation Information Through Doppler Shift Measurementspdfppt
    Nirnimesh Ghose and Loukas Lazos
    34th IEEE/AIAA Digital Avionics Systems Conference (DASC 2015) (2nd place best graduate student paper award).
     
  2. PHYVOS: Physical Layer Voting for Secure and Fast Cooperationpdfppt
    Bocan Hu, Yan Zhang, and Loukas Lazos
    IEEE Conference on Communications and Network Security (CNS 2015).
     
  3. IMap: Visualizing Network Activity over Internet Mapspdfppt
    J. Joseph Fowler, Thienne Johnson, Paolo Simonetto, Michael Schneider, Carlos Acedo, Stephen Kobourov, and Loukas Lazos
    Eleventh Workshop on Visualization for Cyber Security (VIZSEC 2014).
     
  4. Network Anomaly Detection Using Autonomous System Flow Aggregatespdfppt
    Thienne Johnson and Loukas Lazos
    IEEE Global Communications Conference (
    GLOBECOM 2014).
     
  5. FD-MMAC: Combating Multi-Channel Hidden and Exposed Terminals Using a Single Transceiverpdfppt
    Yan Zhang, Loukas Lazos, Kai Chen, Bocan Hu, and Swetha Shivaramaiah
    33rd IEEE International Conference on Computer Communications (INFOCOM 2014).
     
  6. Security Vulnerability and Countermeasures of Frequency Offset Correction in 802.11a Systemspdf ppt
    Hanif Rahbari, Marwan Krunz, and Loukas Lazos
    33rd IEEE International Conference on Computer Communications (INFOCOM 2014).
     
  7. Collusion-Resistant Query Anonymization for Location-Based Servicespdfppt
    Qin Zhang and Loukas Lazos
    IEEE International Conference on Communications (ICC 2014).
     
  8. Countering Selfish Misbehavior in Multi-channel MAC Protocolspdfppt
    Yan Zhang and Loukas Lazos
    32nd IEEE International Conference on Computer Communications (INFOCOM 2013).
     
  9. Perfect Contextual Information Privacy in WSNs under Colluding Eavesdropperspdf
    Alejandro Proano and Loukas Lazos
    6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2013).
     
  10. Hiding Contextual Information in WSNspdfppt
    Alejandro Proano and Loukas Lazos
    3rd IEEE International Workshop on Data Security and Privacy in wireless Networks (D-SPAN 2012)
    in conjunction with WoWMoM 2012, INVITED PAPER.
     
  11. Thwarting Inside Jamming Attacks on Wireless Broadcast Communicationspdfppt
    Loukas Lazos, Sisi Liu, and Marwan Krunz
    4th ACM Conference on Wireless Network Security (WiSec 2011)
     
  12. A Primary User Authentication System for Mobile Cognitive Radio Networkspdfppt
    Swathi Chandrashekar, and Loukas Lazos
    The 3rd International Workshop on Cognitive Radio and Advanced Spectrum Management (COGART 2010), INVITED PAPER.
     
  13. Selective Jamming Attacks in Wireless Networkspdfppt
    Alejandro Proano and Loukas Lazos
    IEEE International Conference on Communications (ICC 2010).
     
  14. Dealing with Liars: Misbehavior Identification via Renyi-Ulam Gamespdfppt
    William Kozma Jr., and Loukas Lazos
    5th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2009).
     
  15. Spectrum Opportunity-Based Control Channel Assignment in Cognitive Radio Networkspdfppt
    Loukas Lazos, Sisi Liu, and Marwan Krunz
    6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON 2009).
     
  16. Mitigating Control-Channel Jamming Attacks in Multi-channel Wireless Ad Hoc Networkspdf
    Loukas Lazos, Sisi Liu, and Marwan Krunz
    2nd ACM Conference on Wireless Network Security (
    WiSec 2009).
     
  17. REAct: Resource-Efficient Accountability for Node Misbehavior in Ad Hoc Networks based on Random Audits (short paper)pdf
    William Kozma Jr., and Loukas Lazos
    2nd ACM Conference on Wireless Network Security (WiSec 2009).
     
  18. Reactive Identification of Misbehavior in Ad Hoc Networks Based on Random Audits (Poster)pdf
    William Kozma Jr., and Loukas Lazos
    Fifth Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks (Secon 2008).
     
  19. Passive Attacks on a Class of Authentication Protocols for RFIDpdf
    Basel Alomair, Loukas Lazos, and Radha Poovendran
    Tenth International Conference on Information Security and Cryptology (ICISC 2007).
     
  20. Probabilistic Detection of Mobile Targets in Heterogeneous Sensor Networkspdf
    Loukas Lazos, Radha Poovendran, and James A. Ritcey
    Sixth International Symposium on Information Processing in Sensor Networks (IPSN 2007).
     
  21. On the Deployment of Heterogeneous Sensor Networks for Detection of Mobile Targetspdf
    Loukas Lazos, Radha Poovendran, and James A. Ritcey
    Fifth International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt 2007).
     
  22. Coverage in Heterogeneous Sensor Networkspdf
    Loukas Lazos, and Radha Poovendran
    Fourth International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt 2006).
     
  23. ROPE: Robust Position Estimation in Wireless Sensor Networkspdf
    Loukas Lazos, Srdjan Capkun, and Radha Poovendran
    Fourth International Symposium on Information Processing in Sensor Networks (IPSN 2005).
     
  24. Preventing Wormhole Attacks on Wireless Ad Hoc Networks: A Graph Theoretic Approachpdf
    Loukas Lazos, Radha Poovendran, C. Meadows, P. Syverson, and L. W. Chang
    IEEE Wireless Communications and Networking Conference (WCNC 2005).
     
  25. SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networkspdf
    Loukas Lazos, and Radha Poovendran
    ACM Workshop on Wireless Security (WiSe 2004).
     
  26. VP3: Using Vertex Path and Power Proximity for Energy Efficient Key Distribution pdf
    Loukas Lazos, Javier Salido, and Radha Poovendran
    IEEE Vehicular Technology Conference, (VTC 2004).
     
  27. Cross-Layer Design for Energy-Efficient Secure Multicast Communications in Ad Hoc Networkspdf
    Loukas Lazos, and Radha Poovendran
    IEEE International Conference on Communications (ICC 2004).
     
  28. Energy-Aware Secure Multicast Communication in Ad-hoc Networks Using Geographic Location Informationpdf
    Loukas Lazos, and Radha Poovendran
    IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP 2003).
     
  29. Secure Broadcast in Energy-Aware Wireless Sensor Networks pdf
    Loukas Lazos, and Radha Poovendran
    IEEE International Symposium on Advances in Wireless Communications (ISWC 2002).
     

Theses - Technical Reports

  1. Dissertation: Securing Network Services for Wireless Ad Hoc and Sensor Networks pdf
    Loukas Lazos
    Ph.D. Dissertation, University of Washington, August 2006.
     
  2. TR: Energy-Aware Secure Multicast Communication In Wireless Ad-Hoc Networks pdf
    Loukas Lazos, and Radha Poovendran
    University of Washington, UWEETR-2003-0013, 2003.
     
  3. Location-Aware Secure Wireless Multicast in Ad-Hoc Networks under Heterogeneous Pathloss pdf
    Loukas Lazos, and Radha Poovendran, and Gregory H. Cirincione
    University of Washington, UWEETR-2003-0012, 2003



Home Students Research Publications Teaching Prof. Activities Vitae