Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Donggang Liu is active.

Publication


Featured researches published by Donggang Liu.


computer and communications security | 2003

Establishing pairwise keys in distributed sensor networks

Donggang Liu; Peng Ning

Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely with each other using cryptographic techniques. However, due to the resource constraints on sensors, it is infeasible to use traditional key management techniques such as public key cryptography and key distribution center (KDC). To facilitate the study of novel pairwise key predistribution techniques, this paper presents a general framework for establishing pairwise keys between sensors on the basis of a polynomial-based key predistribution protocol [2]. This paper then presents two efficient instantiations of the general framework: a random subset assignment key predistribution scheme and a grid-based key predistribution scheme. The analysis in this paper indicates that these two schemes have a number of nice properties, including high probability (or guarantee) to establish pairwise keys, tolerance of node captures, and low communication overhead. Finally, this paper presents a technique to reduce the computation at sensors required by these schemes.


ACM Transactions in Embedded Computing Systems | 2004

Multilevel μTESLA: Broadcast authentication for distributed sensor networks

Donggang Liu; Peng Ning

Broadcast authentication is a fundamental security service in distributed sensor networks. This paper presents the development of a scalable broadcast authentication scheme named <i>multilevel μTESLA</i> based on μTESLA, a broadcast authentication protocol whose scalability is limited by its unicast-based initial parameter distribution. Multilevel μTESLA satisfies several nice properties, including low overhead, tolerance of message loss, scalability to large networks, and resistance to replay attacks as well as denial-of-service attacks. This paper also presents the experimental results obtained through simulation, which demonstrate the performance of the proposed scheme under severe denial-of-service attacks and poor channel quality.


international conference on network protocols | 2007

Location Privacy in Sensor Networks Against a Global Eavesdropper

Kiran Mehta; Donggang Liu; Matthew K. Wright

While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be critical to the mission of the sensor network, such as the location of a target object in a monitoring application, and it is often important to protect this information as well as message content. There have been several recent studies on providing location privacy in sensor networks. However, these existing approaches assume a weak adversary model where the adversary sees only local network traffic. We first argue that a strong adversary model, the global eavesdropper, is often realistic in practice and can defeat existing techniques. We then formalize the location privacy issues under this strong adversary model and show how much communication overhead is needed for achieving a given level of privacy. We also propose two techniques that prevent the leakage of location information: periodic collection and source simulation. Periodic collection provides a high level of location privacy, while source simulation provides trade-offs between privacy, communication cost, and latency. Through analysis and simulation, we demonstrate that the proposed techniques are efficient and effective in protecting location information from the attacker.


computer and communications security | 2003

Efficient self-healing group key distribution with revocation capability

Donggang Liu; Peng Ning; Kun Sun

This paper presents group key distribution techniques for large and dynamic groups over unreliable channels. The techniques proposed here are based on the self-healing key distribution methods (with revocation capability) recently developed by Staddon et al. [27]. By introducing a novel personal key distribution technique, this paper reduces (1) the communication overhead of personal key share distribution from O(t2log q) to O(tlogq), (2) the communication overhead of self-healing key distribution with t-revocation capability from O((mt2+tm)log q) to O(mtlog q), and (3) the storage overhead of the self-healing key distribution with


international conference on mobile and ubiquitous systems: networking and services | 2005

Practical broadcast authentication in sensor networks

Donggang Liu; Peng Ning; Sencun Zhu; Sushil Jajodia

t


IEEE Transactions on Mobile Computing | 2012

Protecting Location Privacy in Sensor Networks against a Global Eavesdropper

Kiran Mehta; Donggang Liu; Matthew K. Wright

-revocation capability at each group member from O(m2log q) to O(mlogq), where


ad hoc networks | 2009

Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks

Jun-Won Ho; Donggang Liu; Matthew K. Wright; Sajal K. Das

t


international workshop on security | 2008

Source location privacy against laptop-class attacks in sensor networks

Yi Ouyang; Zhengyi Le; Donggang Liu; James Ford; Fillia Makedon

is the maximum number of colluding group members,


wireless network security | 2008

Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks

Qi Dong; Donggang Liu; Peng Ning

m


international conference on distributed computing systems | 2007

Resilient Cluster Formation for Sensor Networks

Donggang Liu

is the number of sessions, and

Collaboration


Dive into the Donggang Liu's collaboration.

Top Co-Authors

Avatar

Peng Ning

North Carolina State University

View shared research outputs
Top Co-Authors

Avatar

Qi Dong

University of Texas at Arlington

View shared research outputs
Top Co-Authors

Avatar

Matthew K. Wright

University of Texas at Arlington

View shared research outputs
Top Co-Authors

Avatar

David Chenho Kung

University of Texas at Arlington

View shared research outputs
Top Co-Authors

Avatar

Dazhi Zhang

University of Texas at Arlington

View shared research outputs
Top Co-Authors

Avatar

Sajal K. Das

Missouri University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Yu Lei

University of Texas at Arlington

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sencun Zhu

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Wenhua Wang

University of Texas at Arlington

View shared research outputs
Researchain Logo
Decentralizing Knowledge