Meiyuan Zhao
Intel
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Meiyuan Zhao.
computer and communications security | 2008
Qing Li; Yih Chun Hu; Meiyuan Zhao; Adrian Perrig; Jesse Walker; Wade Trappe
Multi-hop routing is essential to the operation of wireless ad hoc networks. Unfortunately, it is very easy for an adversary to forge or modify routing messages to inflict severe damage on the underlying routing protocol. In this paper, we present SEAR, a Secure Efficient Ad hoc Routing protocol for ad hoc networks that is mainly based on efficient symmetric cryptography, with asymmetric cryptography used only for the distribution of initial key commitments. We show, through both theoretical examination and simulations, that SEAR provides better security with significantly less overhead than other existing secure AODV protocols.
international workshop on security | 2012
Meiyuan Zhao; Jesse Walker; Chieh-Chih Wang
There has been considerable work addressing security in vehicular network systems for Intelligent Transportation System (ITS) usages. We examine the risks and proposed security solutions in this space. Our analysis leads to several key observations. The current security work misses many practical ITS usage and security requirements, since it fails to consider practical economic models and critical ITS functional requirements as a control system. Consequently, the standardized ITS communication message authenticity solutions have little utility relative to addressing the real threats. Furthermore, we discovered that fundamental re-thinking of the public key infrastructure support for secure vehicular communication is essential, because of the multi-stakeholder and cross-domain nature of many ITS usages. Based on our analysis, we call for future research directions in analyzing practical problems and designing solutions to secure vehicular communication in order to achieve its full potential.
Security and Communication Networks | 2009
Qing Li; Meiyuan Zhao; Jesse Walker; Yih Chun Hu; Adrian Perrig; Wade Trappe
Multi-hop routing is essential to the operation of wireless ad hoc networks. Unfortunately, it is very easy for an adversary to forge or modify routing messages to inflict severe damage on the underlying routing protocol. In this paper, we present SEAR, a secure efficient ad hoc routing (SEAR) protocol for ad hoc networks that is mainly based on efficient symmetric cryptography, with asymmetric cryptography used only for the distribution of initial key commitments. SEAR uses one-way hash functions to protect the propagation of the routing messages. Intermediate nodes verify the routing messages by applying one-way functions, while malicious nodes cannot construct beneficial false routing messages when forwarding them. Route error (RERR) messages are protected through a variation of the TESLA broadcast authentication scheme. The SEAR protocol does not require any additional routing packet formats, and thus follows the same basic design as ad hoc on-demand distance vector (AODV). We show, through both theoretical examination and simulations, that SEAR provides better security with significantly less overhead than other existing secure AODV (SAODV) protocols. Copyright
IEEE Journal on Emerging and Selected Topics in Circuits and Systems | 2013
Meiyuan Zhao; Jesse Walker; Chieh-Chih Wang
There has been considerable work addressing security in vehicular network systems for intelligent transportation system (ITS) usages. We examine the proposed security framework and solutions in this space. Our analysis leads to several key observations. The current security work misses many practical ITS usage and security requirements, since it fails to consider practical economic models and critical ITS functional requirements as a control system. Consequently, the standardized ITS communication message authenticity solutions have little utility relative to addressing the real threats. Furthermore, we analyzed the missing requirements for public key infrastructure support for secure vehicular communication. Based on our analysis, we call for future research directions in analyzing practical problems and designing solutions to secure vehicular communication in order to achieve its full potential.
Future Internet | 2017
Xiruo Liu; Meiyuan Zhao; Sugang Li; Feixiong Zhang; Wade Trappe
The Internet of Things (IoT) is a recent trend that extends the boundary of the Internet to include a wide variety of computing devices. Connecting many stand-alone IoT systems through the Internet introduces many challenges, with security being front-and-center since much of the collected information will be exposed to a wide and often unknown audience. Unfortunately, due to the intrinsic capability limits of low-end IoT devices, which account for a majority of the IoT end hosts, many traditional security methods cannot be applied to secure IoT systems, which open a door for attacks and exploits directed both against IoT services and the broader Internet. This paper addresses this issue by introducing a unified IoT framework based on the MobilityFirst future Internet architecture that explicitly focuses on supporting security for the IoT. Our design integrates local IoT systems into the global Internet without losing usability, interoperability and security protection. Specifically, we introduced an IoT middleware layer that connects heterogeneous hardware in local IoT systems to the global MobilityFirst network. We propose an IoT name resolution service (IoT-NRS) as a core component of the middleware layer, and develop a lightweight keying protocol that establishes trust between an IoT device and the IoT-NRS.
Archive | 2006
Jesse Walker; Kapil Sood; Meiyuan Zhao
Archive | 2007
Meiyuan Zhao; Jesse Walker
Archive | 2007
Meiyuan Zhao; Jesse Walker
Archive | 2007
Jesse Walker; Meiyuan Zhao
Archive | 2007
Jesse Walker; Meiyuan Zhao