Papers by Christopher Zuver
Wireless networks have become the critical infrastructure that enables such applications as senso... more Wireless networks have become the critical infrastructure that enables such applications as sensor networks, mobile personal computing devices, and avionics communication systems. As such, the security of these wireless networks has become an important research issue. Recent literature on wireless network security has focused on traditional security issues, such as encryption and authentication. Less attention has been paid to protecting the quality of service (QoS) assurances that guarantee that critical and important traffic will be routed preferentially through the network. In research that has studied QoS in the face of adversarial attacks, only specific layers of the network protocol stack have been evaluated. In this paper we argue that an integrated architecture for in-network protection of QoS assurances for each individual network traffic flow is essential to wireless network security.
Proceedings of the 3rd international conference on Embedded networked sensor systems - SenSys '05, 2005
... This demo presents several types of services. ... Any unusual changes in this data will cause... more ... This demo presents several types of services. ... Any unusual changes in this data will cause the mote to sound its alarm, send an alert message to the nearest base station, and record the event in the mote's local tuple space. ...
Proceedings of the 3rd international conference on Embedded networked sensor systems - SenSys '05, 2005
ABSTRACT We present a novel radio interference based sensor localization method for wireless sens... more ABSTRACT We present a novel radio interference based sensor localization method for wireless sensor networks. The technique relies on a pair of nodes emitting radio waves simultaneously at slightly different frequencies. The carrier frequency of the composite ...
Proceedings 2003 IEEE International Conference on Microelectronic Systems Education. MSE'03, 2003
Lafayette receive some basic instruction on IC design, including layout. Students who take advanc... more Lafayette receive some basic instruction on IC design, including layout. Students who take advanced courses receive more coverage of analog and mixed-signal design.
ACM SIGCOMM Computer Communication Review, 2003
Tools have been developed to automatically integrate and test networking systems in reconfigurabl... more Tools have been developed to automatically integrate and test networking systems in reconfigurable hardware. These tools dynamically generate circuits for Field Programmable Gate Arrays (FPGAs). A library of hardware-accelerated modules has been developed that processes Internet Protocol (IP) packets, performs header rule matching, scans packet payloads, and implements per-flow queueing. Other functions can be added to the library as extensible modules.
Lecture Notes in Computer Science, 2003
An extensible firewall has been implemented that performs packet filtering, content scanning, and... more An extensible firewall has been implemented that performs packet filtering, content scanning, and per-flow queuing of Internet packets at Gigabit/second rates. The firewall uses layered protocol wrappers to parse the content of Internet data. Packet payloads are scanned for keywords using parallel regular expression matching circuits. Packet headers are compared to rules specified in Ternary Content Addressable Memories (TCAMs). Per-flow queuing is performed to mitigate the effect of Denial of Service attacks. All packet processing operations were implemented with reconfigurable hardware and fit within a single Xilinx Virtex XCV2000E Field Programmable Gate Array (FPGA). The singlechip firewall has been used to filter Internet SPAM and to guard against several types of network intrusion. Additional features were implemented in extensible hardware modules deployed using run-time reconfiguration.
Uploads
Papers by Christopher Zuver