Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Derrick Kong is active.

Publication


Featured researches published by Derrick Kong.


security of ad hoc and sensor networks | 2004

TinyPK: securing sensor networks with public key technology

Ronald Watro; Derrick Kong; Sue-fen Cuti; Charles Gardiner; Charles Lynn; Peter Kruus

Wireless networks of miniaturized, low-power sensor/actuator devices are poised to become widely used in commercial and military environments. The communication security problems for these networks are exacerbated by the limited power and energy of the sensor devices. In this paper, we describe the design and implementation of public-key-(PK)-based protocols that allow authentication and key agreement between a sensor network and a third party as well as between two sensor networks. Our work is novel in that PK technology was commonly believed to be too inefficient for use on low-power devices. As part of our solution, we exploit the efficiency of public operations in the RSA cryptosystem and design protocols that place the computationally expensive operations on the parties external to the sensor network, when possible. Our protocols have been implemented on UC Berkeley MICA2 motes using the TinyOS development environment.


workshop challenged networks | 2012

A secure content network in space

Craig Partridge; Robert Walsh; Matthew Gillen; Gregory Lauer; John Lowry; W. Timothy Strayer; Derrick Kong; David Levin; Joseph P. Loyall; Michael Paulitsch

We present a content network architecture for a cluster of satellites flying in low Earth orbit. The cluster uses a dynamic wireless network to interconnect the satellites and has an intermittent link to the ground. Even though a cluster of satellites fly in formation, their relative positions can vary widely, and occasionally the cluster can disperse and regroup in order to avoid obstacles or to affect a better arrangement. The network, therefore, is a MANET with elements of a disruption tolerant network. Further, data security is a fundamental concern. Our approach is to layer a content network over the wireless network, supporting multiple qualities of service and multiple independent levels of security.


local computer networks | 2009

An architecture for scalable network defense

Tim Strayer; Walter Clark Milliken; Ronald Watro; Walt Heimerdinger; Steven A. Harp; Robert P. Goldman; Dustin Spicuzza; Beverly Schwartz; David Patrick Mankins; Derrick Kong; Pieter Mudge Zatko

We describe a novel architecture for network defense designed for scaling to very high data rates (100 Gb/s) and very large user populations. Scaling requires both efficient attack detection algorithms as well as appropriate an execution environment. Our architecture considers the time budget of traffic data extraction and algorithmic processing, provides a suite of detection algorithms”each designed to present different and complementary views of the data—that generate many “traffic events,” and reduces false positives by correlating these traffic events into benign or malicious hypotheses.


conference on information-centric networking | 2017

Realizing a virtual private network using named data networking

Craig Partridge; Samuel C. Nelson; Derrick Kong

An approach to creating secure virtual private networks for the Named Data Networking (NDN) protocol suite is described. It encrypts and encapsulates NDN packets from higher security domains and places them as the payload in unencrypted NDN packets, much as IPsec encapsulates encrypted IP datagrams in unencrypted IP datagrams. We then leverage the well-known properties of the IP-in-IP approach, taken by IPsec in tunnel mode, to understand the strengths and weaknesses of the proposed NDN-in-NDN approach.


RFC | 2012

A Profile for Route Origin Authorizations (ROAs)

Matt Lepinski; Derrick Kong; Stephen Kent


Archive | 2002

Systems and methods for detecting network intrusions

Daniel Francis Vukelich; John H. Lowry; Derrick Kong; Wilson Wrenshall Farrell; Kenneth B. Theriault


RFC | 2012

Certificate Policy (CP) for the Resource Public Key Infrastructure (RPKI)

Stephen Kent; Derrick Kong; Karen Seo; Ronald Watro


international conference on emerging security information systems and technologies | 2014

Ghost Map: Proving Software Correctness using Games

Ronald Watro; Kerry Moffitt; Talib S. Hussain; Daniel Wyschogrod; John Ostwald; Derrick Kong; Clint A. Bowers; Eric Church; Joshua Guttman; Qinsi Wang


international conference on networks | 2015

Lightbulb: A Toolkit for Analysis of Security Policy Interactions

Derrick Kong; David Mandelberg; Andrei Lapets; Ronald Watro; Daniel Smith; Matthew Runkle


RFC | 2015

Template for a Certification Practice Statement (CPS) for the Resource PKI (RPKI)

Derrick Kong; Karen Seo; Stephen Kent

Collaboration


Dive into the Derrick Kong's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Clint A. Bowers

University of Central Florida

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge