Book Chapters
- Secure Localization for Wireless Sensor Networks using
Range-Independent Methods
Loukas Lazos, and Radha Poovendran
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, Editors: R. Poovendran, C. Wang, S. Roy, Springer Verlag, New York, 2006
Journal Publications
- In-band Secret-Free Pairing for COTS Wireless Devices,
Nirnimesh Ghose, Loukas Lazos, and Ming Li
to appear in the IEEE Transactions on Mobile Computing.
- Proofs of Physical Reliability for Cloud Storage Systems,
Li Li and Loukas Lazos
to appear in the IEEE Transactions on Parallel and Distributed Computing
- Repair Strategies for Mobile Storage Systems,
Gokhan Calis, Swetha Shivaramaiah, Onur Ozan Koyluoglu, and Loukas Lazos
to appear in the IEEE Transactions on Cloud Computing
- Trading Privacy for Utility in Database-Assisted Dynamic Spectrum Access,
Ahmed M. Salama, Ming Li, Loukas Lazos, Yong Xiao, and Marwan Krunz
IEEE Transactions on Cognitive Communications and Networking, Vol. 5, No. 3, pp. 611 – 624, 2019
- Secure Physical Layer Voting,
Nirnimesh Ghose, Bocan Hu, Yan Zhang, and Loukas Lazos
IEEE Transactions on Mobile Computing,Vol. 17, No. 3, pp. 688 – 702, 2018
- Multi-Channel Medium Access without Control Channels: A Full Duplex MAC Design,
Yan Zhang, Loukas Lazos, Kai Chen, Bocan Hu, and Swetha Shivaramaiah
IEEE Transactions on Mobile Computing,
- Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs,
Alejandro Proano, Loukas Lazos, and Marwan Krunz
IEEE Transactions on Mobile Computing.Vol. 16, No. 3, pp. 857 – 871, 2017.
- Swift Jamming Attack on Frequency Offset Estimation: The Achilles' Heel of OFDM Systems,
Hanif Rahbari, Marwan Krunz, and Loukas Lazos
IEEE Transactions on Mobile Computing. Vol. 15, No. 5, pp. 1264 – 1278, 2016.
- AMD: Audit-based Misbehavior Detection in Wireless Ad Hoc Networks
Yu Zhang, Loukas Lazos, and William Jr. Kozma
IEEE Transactions on Mobile Computing. Vol. 15, No. 8, pp. 1893 – 1907, 2016.
- Time-Delayed Broadcasting for Defeating Inside Jammers,
Sisi Liu, Loukas Lazos, and Marwan Krunz
IEEE Transactions on Dependable and Secure Computing,Vol. 12 No. 3, pp. 351 – 265, 2015.
- Vulnerabilities of Cognitive Radio MAC Protocols and Countermeasures
Yan Zhang and Loukas Lazos,
IEEE Network, Vol. 27, No. 3, pp 40 – 45, 2013.
- Packet-Hiding Methods for Preventing Selective Jamming Attacks
Alejandro Proano and Loukas Lazos
IEEE Transactions on Dependable and Secure Computing, (TDSC) Vol. 9, No. 1, pp. 101 – 114, 2012.
- Thwarting Control-Channel Jamming Attacks from Inside Jammers
Sisi Liu, Loukas Lazos, and Marwan Krunz
IEEE Transactions on Mobile Computing, (TMC), Vol. 11, No. 9, pp. 1545 – 1558, 2012.
- Cluster-based Control Channel Allocation in Opportunistic Cognitive Radio Networks
Sisi Liu, Loukas Lazos, and Marwan Krunz
IEEE Transactions on Mobile Computing, (TMC), Vol. 11, No. 10, pp. 1436 – 1449, 2012.
- Graph-based criteria for spectrum-aware clustering in cognitive radio networks
Milan Bradonjic and Loukas Lazos
Ad Hoc Networks Journal, Vol 10, No. 1, pp. 75 – 94, 2012
- Selective Jamming/Dropping Insider Attacks in Wireless Mesh Networks
Loukas Lazos and Marwan Krunz
IEEE Network, Vol. 25, No. 1, pp. 31 – 34, 2011.
- Securing Low-cost RFID Systems: an Unconditionally Secure Approach
Basel Alomair, Loukas Lazos, and Radha Poovendran
Journal of Computer Security (JCS), Vol. 19, No. 2, pp. 229 – 257, 2011.
- Analytic Evaluation of Target Detection in Heterogeneous Wireless Sensor Networks
Loukas Lazos, Radha Poovendran, and James A. Ritcey
ACM Transactions on Sesnor Networks (TOSN), Vol. 5, No. 2, pp. 1 – 38, 2009.
- Energy and Bandwidth-Efficient Key Distribution in Wireless Ad-Hoc Networks: A
Cross-Layer Approach
Javier Salido, Loukas Lazos, and Radha Poovendran
IEEE/ACM Transactions on Networking, (TON), Vol. 15, No. 6, pp. 1527 – 1540, 2007.
- Detection of Mobile Targets on the Plane and in Space using Heterogeneous Sensor
Networks
Loukas Lazos, Radha Poovendran, and James A. Ritcey
ACM/Springer Journal on Wireless Networks (WINET), 2007.
- Stochastic Coverage in Heterogeneous Sensor Networks
Loukas Lazos, and Radha Poovendran
ACM Transactions on Sesnor Networks (TOSN), August 2006, Vol. 2, Issue 3, pp. 325 – 358.
- A Graph Theoretic Framework for Preventing the Wormhole Attack in Wireless Ad Hoc
Networks
Radha Poovendran, and Loukas Lazos
ACM/Springer Journal on Wireless Networks (WINET), May 2006, printed, Vol. 13, Issue 1, February 2007.
- Power Proximity Based Key Management for Secure Multicast in Ad Hoc Networks
Loukas Lazos, and Radha Poovendran
ACM/Springer Journal on Wireless Networks (WINET), May 2006, printed, Vol. 13, Issue 1, February 2007.
- High Resolution Localization for Wireless Sensor Networks
Loukas Lazos, and Radha Poovendran
IEEE Journal on Selected Areas in Communications, Special Issue on Network Security, (JSAC), February 2006, Vol. 24, Issue 2, pp. 233 – 246.
- SeRLoc: Robust Localization for Wireless Sensor Networks
Loukas Lazos, and Radha Poovendran
ACM Transactions on Sensor Networks (TOSN), August 2005, Vol. 1, Issue 1, pp. 73 – 100.
Conference/Workshop Publications
- Latent-Variable Private Information Retrieval
Islam Samy, Mohamed A. Attia, Ravi Tandon, and Loukas Lazos
IEEE International Symposium on Information Theory (ISIT 2020).
- Energy-efficient LTE/Wi-Fi Coexistence
Xiao Han, Islam Samy, and Loukas Lazos
IEEE International Conference on Communications (ICC 2020).
- Privacy-Utility Tradeoff in Dynamic Spectrum Sharing with Non-Cooperative Incumbent Users
Ahmed M. Salama, Ming Li, Loukas Lazos, Yong Xiao, and Marwan Krunz
IEEE International Conference on Communications (ICC 2020).
- On the Capacity of Leaky Private Information Retrieval
Islam Samy, Ravi Tandon, and Loukas Lazos
IEEE International Symposium on Information Theory (ISIT 2019).
- Optimum Priority Class Selection under Wi-Fi/LTE Coexistence
Xiao Han, Islam Samy, and Loukas Lazos
IEEE International Conference on Communications (ICC 2019).
- Multimodal Graph Analysis of Cyber Attacks
Nirnimesh Ghose, Loukas Lazos, Jerzy Rozenblit, and Ronald Breiger
Spring Simulation Conference (SpringSim 2019).
- On the Privacy and Utility Tradeoff in Database-Assisted Dynamic Spectrum Access
Ahmed M. Salama, Ming Li, Loukas Lazos, Yong Xiao, and Marwan Krunz
EEE International Symposium on Dynamic Spectrum Access Networks (DySPAN 2018).
- LTE Misbehavior Detection in Wi-Fi/LTE Coexistence Under the LAA-LTE Standard
Islam Samy, Loukas Lazos, Ming Li, Yong Xiao, and Marwan Krunz
ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2018).
- Secure Device Bootstrapping without Secrets Resistant to Signal Manipulation Attacks
Nirnimesh Ghose, Loukas Lazos, and Ming Li
IEEE Symposium on Security & Privacy (Oakland) 2018 (S&P 2018).
- SFIRE: Secret-Free In-band Trust Establishment for COTS Wireless Devices
Nirnimesh Ghose, Loukas Lazos, and Ming Li
IEEE International Conference on Computer Communication (INFOCOM 2018).
- HELP: Helper-Enabled In-Band Device Pairing Resistant
Against Signal Cancellation
Nirnimesh Ghose, Loukas Lazos, and Ming Li
26th USENIX Security Symposium (USENIX 2017).
- FEAL: Fine-Grained Evaluation of Active Learning in
Collaborative Learning Spaces
Sixing Liu, Roman Lysecky. and Loukas Lazos
2017 ASEE Annual Conference & Exposition (ASEE 2017).
- Verifying ADS-B Navigation Information Through Doppler Shift Measurements
Nirnimesh Ghose and Loukas Lazos
34th IEEE/AIAA Digital Avionics Systems Conference (DASC 2015) (2nd place best graduate student paper award).
- PHYVOS: Physical Layer Voting for Secure and Fast Cooperation
Bocan Hu, Yan Zhang, and Loukas Lazos
IEEE Conference on Communications and Network Security (CNS 2015).
- IMap: Visualizing Network Activity over Internet Maps
J. Joseph Fowler, Thienne Johnson, Paolo Simonetto, Michael Schneider, Carlos Acedo, Stephen Kobourov, and Loukas Lazos
Eleventh Workshop on Visualization for Cyber Security (VIZSEC 2014).
- Network Anomaly Detection Using Autonomous System Flow Aggregates
Thienne Johnson and Loukas Lazos
IEEE Global Communications Conference (GLOBECOM 2014).
- FD-MMAC: Combating Multi-Channel Hidden and Exposed Terminals Using a Single Transceiver
Yan Zhang, Loukas Lazos, Kai Chen, Bocan Hu, and Swetha Shivaramaiah
33rd IEEE International Conference on Computer Communications (INFOCOM 2014).
- Security Vulnerability and Countermeasures of Frequency Offset Correction in 802.11a Systems
Hanif Rahbari, Marwan Krunz, and Loukas Lazos
33rd IEEE International Conference on Computer Communications (INFOCOM 2014).
- Collusion-Resistant Query Anonymization for
Location-Based Services
Qin Zhang and Loukas Lazos
IEEE International Conference on Communications (ICC 2014).
- Countering Selfish Misbehavior in Multi-channel MAC Protocols
Yan Zhang and Loukas Lazos
32nd IEEE International Conference on Computer Communications (INFOCOM 2013).
- Perfect Contextual Information Privacy in WSNs under Colluding Eavesdroppers
Alejandro Proano and Loukas Lazos
6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2013).
- Hiding Contextual Information in WSNs
Alejandro Proano and Loukas Lazos
3rd IEEE International Workshop on Data Security and Privacy in wireless Networks (D-SPAN 2012)
in conjunction with WoWMoM 2012, INVITED PAPER.
- Thwarting Inside Jamming Attacks on Wireless Broadcast Communications
Loukas Lazos, Sisi Liu, and Marwan Krunz
4th ACM Conference on Wireless Network Security (WiSec 2011)
- A Primary User Authentication System for Mobile Cognitive Radio Networks
Swathi Chandrashekar, and Loukas Lazos
The 3rd International Workshop on Cognitive Radio and Advanced Spectrum Management (COGART 2010), INVITED PAPER.
- Selective Jamming Attacks in Wireless Networks
Alejandro Proano and Loukas Lazos
IEEE International Conference on Communications (ICC 2010).
- Dealing with Liars: Misbehavior Identification via Renyi-Ulam Games
William Kozma Jr., and Loukas Lazos
5th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2009).
- Spectrum Opportunity-Based Control Channel Assignment in Cognitive Radio Networks
Loukas Lazos, Sisi Liu, and Marwan Krunz
6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON 2009).
- Mitigating Control-Channel Jamming Attacks in Multi-channel Wireless Ad Hoc Networks
Loukas Lazos, Sisi Liu, and Marwan Krunz
2nd ACM Conference on Wireless Network Security (WiSec 2009).
- REAct: Resource-Efficient Accountability for Node Misbehavior in Ad Hoc Networks based
on Random Audits (short paper)
William Kozma Jr., and Loukas Lazos
2nd ACM Conference on Wireless Network Security (WiSec 2009).
- Reactive Identification of Misbehavior in Ad Hoc Networks Based on Random Audits
(Poster)
William Kozma Jr., and Loukas Lazos
Fifth Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks (Secon 2008).
- Passive Attacks on a Class of Authentication Protocols for RFID
Basel Alomair, Loukas Lazos, and Radha Poovendran
Tenth International Conference on Information Security and Cryptology (ICISC 2007).
- Probabilistic Detection of Mobile Targets in Heterogeneous Sensor Networks
Loukas Lazos, Radha Poovendran, and James A. Ritcey
Sixth International Symposium on Information Processing in Sensor Networks (IPSN 2007).
- On the Deployment of Heterogeneous Sensor Networks for Detection of Mobile Targets
Loukas Lazos, Radha Poovendran, and James A. Ritcey
Fifth International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt 2007).
- Coverage in Heterogeneous Sensor Networks
Loukas Lazos, and Radha Poovendran
Fourth International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt 2006).
- ROPE: Robust Position Estimation in Wireless Sensor Networks
Loukas Lazos, Srdjan Capkun, and Radha Poovendran
Fourth International Symposium on Information Processing in Sensor Networks (IPSN 2005).
- Preventing Wormhole Attacks on Wireless Ad Hoc Networks: A Graph Theoretic Approach
Loukas Lazos, Radha Poovendran, C. Meadows, P. Syverson, and L. W. Chang
IEEE Wireless Communications and Networking Conference (WCNC 2005).
- SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks
Loukas Lazos, and Radha Poovendran
ACM Workshop on Wireless Security (WiSe 2004).
- VP3: Using Vertex Path and Power Proximity for Energy Efficient Key Distribution
Loukas Lazos, Javier Salido, and Radha Poovendran
IEEE Vehicular Technology Conference, (VTC 2004).
- Cross-Layer Design for Energy-Efficient Secure Multicast Communications in Ad Hoc
Networks
Loukas Lazos, and Radha Poovendran
IEEE International Conference on Communications (ICC 2004).
- Energy-Aware Secure Multicast Communication in Ad-hoc Networks Using Geographic
Location Information
Loukas Lazos, and Radha Poovendran
IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP 2003).
- Secure Broadcast in Energy-Aware Wireless Sensor Networks
Loukas Lazos, and Radha Poovendran
IEEE International Symposium on Advances in Wireless Communications (ISWC 2002).
Theses - Technical Reports
- TR: Proofs of Reliability
Li Li and Loukas Lazos
University of Washington, UAECETR-2016-001, 2016.
- Dissertation: Securing Network Services for Wireless Ad Hoc and Sensor Networks
Loukas Lazos
Ph.D. Dissertation, University of Washington, August 2006.
- TR: Energy-Aware Secure Multicast Communication In Wireless Ad-Hoc Networks
Loukas Lazos, and Radha Poovendran
University of Washington, UWEETR-2003-0013, 2003.
- Location-Aware Secure Wireless Multicast in Ad-Hoc Networks under Heterogeneous
Pathloss
Loukas Lazos, and Radha Poovendran, and Gregory H. Cirincione
University of Washington, UWEETR-2003-0012, 2003