Publications

Copyright Note: The electronic versions of the published papers are made available to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and conditions invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Book
  1. Donggang Liu, Peng Ning, Security for Wireless Sensor Networks, Springer. ISBN: 0387327231. December 2006.
Journal Publications
  1. Dazhi Zhang, Donggang Liu, Christoph Csallner, Jeff Lei, David Kung, "Demand-Driven Security Testing for C Programs", under second-round review The Elsevier Journal of Systems & Software (JSS) , 2012.
  2. Qi Dong, Donggang Liu, Matthew Wright, Mitigating Jamming Attacks in Wireless Broadcast Systems, to appear in Wireless Networks (WINET), Springer, 2013.
  3. Na Li, Mayank Raj, Dongaang Liu, Matthew Wright, and Sajal K. Das, Using Data Mules to Preserve Source Location Privacy in Wireless Sensor Networks, to appear in Elsevier Pervasive and Mobile Computing(PMC), 2012.
  4. Qi Dong, Donggang Liu, Peng Ning, Providing DoS Resistance for Signature-Based Broadcast Authentication in Sensor Networks, to appear in ACM Transactions on Embedded Computing Systems (TECS), 2012.
  5. Dazhi Zhang, Donggang Liu, Jeff Lei, David Kung, Christoph Csallner, Nathaniel Nystrom, Wenhua Wang, "SimFuzz: Test Case Similarity Directed Deep Fuzzing", to appear in The Elsevier Journal of Systems & Software (JSS) , 2011.
  6. Kiran Mehta, Donggang Liu, and Matthew Wright, "Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper," to appear in IEEE Transactions on Mobile Computing (TMC), 2011.
  7. Qi Dong and Donggang Liu, Using Auxiliary Sensors for Pairwise Key Establishment in WSN, to appear in ACM Transactions on Embedded Computing Systems (TECS), 2010.
  8. Donggang Liu, Qi Dong, Hardening Embedded Networking Devices Against Side- Channel Attacks, to appear in International Journal on Ad Hoc & Sensor Wireless Networks (AHSWN), 2010.
  9. Donggang Liu, Efficient and Distributed Access control for Sensor Networks, in Wireless Networks (WINET), Springer, 2010.
  10. Jun-Won Ho, Donggang Liu, Matthew Wright, and Sajal K. Das, Distributed Detection of Replica Node Attacks with Group Deployment Knowledge in Wireless Sensor Networks, to appear in Ad-Hoc Networks Journal (Elsevier) Special Edition on Privacy and Security in Wireless Sensor Networks, 2009.
  11. Donggang Liu, Peng Ning, An Liu, Cliff Wang, Wenliang Du, Attack-Resistant Location Estimation in Wireless Sensor Networks, in ACM Transactions in Information and Systems Security (TISSEC), 2008.
  12. Donggang Liu, Peng Ning, Wenliang Du, Group-Based Key Pre-Distribution in Wireless Sensor Networks , in ACM Transactions on Sensor Networks (TOSN), 2008.
  13. Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia, Efficient security mechanisms for overlay multicast based content delivery, Elsevier Journal of Computer Communications, Feb 2007.
  14. Donggang Liu, Peng Ning, Improving Key Pre-Distribution with Deployment Knowledge in Static Sensor Networks, ACM Transactions on Sensor Networks (TOSN), Volume 1, Issue 2, Pages 204 - 239, November 2005.
  15. Donggang Liu, Peng Ning, Rongfang Li, Establishing Pairwise Keys in Distributed Sensor Networks, in ACM Transactions on Information and System Security, Vol. 8, No.1, pages 41 -- 77, February 2005. (More results than the conference version, including actual implementation and performance results on MICA2 motes.)
  16. Donggang Liu, Peng Ning, Multi-Level µTESLA: A Broadcast Authentication System for Distributed Sensor Networks, ACM Transactions on Embedded Computing Systems (TECS), Vol. 3, No. 4, pages 800--836, November 2004. (extended version)
Book Chapters
  1. Donggang Liu, Efficient and Distributed Access Control for Sensor Networks, Handbook on Securing Cyber-Physical Critical Infrastructure, S. Das, K. Kant, and N. Zhang , Elsevier, Jan 2012.
  2. Donggang Liu, Qi Dong, Detecting Misused Keys in Wireless Sensor Networks, to appear in Yang Xiao, Frank H. Li, and Hui Chen (Eds.), Handbook on Security and Networks, World Scientific Publishing Inc., 2010
  3. Donggang Liu, Broadcast Authentication, to appear in Henk C.A. van Tilborg & Sushil Jajodia (Eds.), Encyclopedia of Cryptography and Security (2nd Edition), Springer, 2010.
  4. Donggang Liu, Node Clone Defense, to appear in Henk C.A. van Tilborg & Sushil Jajodia (Eds.), Encyclopedia of Cryptography and Security (2nd Edition), Springer, 2010.
  5. Donggang Liu, Secure Localization, to appear in Henk C.A. van Tilborg & Sushil Jajodia (Eds.), Encyclopedia of Cryptography and Security (2nd Edition), Springer, 2010.
  6. Donggang Liu, Probabilistic Key Sharing, to appear in Henk C.A. van Tilborg & Sushil Jajodia (Eds.), Encyclopedia of Cryptography and Security (2nd Edition), Springer, 2010.
  7. Donggang Liu, Peng Ning, Wenliang Du, Group-Based Key Predistribution for Wireless Sensor Networks, in R. Beyah, J. McNair, C. Corbett (Eds), Security in Ad Hoc and Sensor Networks , World Scientific Publishing, Inc., 2008.
  8. Peng Ning, Donggang Liu, Wenliang Du, Secure and Resilient Location Discovery in Wireless Sensor Networks, To appear in Cliff Wang, Radha Poovendran, Sumit Roy (Eds), WSN Localization and Time Synchronization, Springer, 2007.
  9. Peng Ning, Donggang Liu, Broadcast Authentication and Key Management for Secure Sensor Networks, in Ivan Stojmenovic (Ed.), Sensor Networks, John Wiley & Sons, 2005.
Conference Publications
  1. Xiaowei Mei, Donggang Liu, Kun Sun, Dingbang Xu, On Feasibility of Fingerprinting Wireless Sensor Nodes Using Physical Properties, to appear in Proceedings of IEEE IEEE International Parallel and Distributed Processing Symposium (IPDPS), May 2013
  2. Donggang Liu, Joshua Raymer, Andy Fox, Efficient and Timely Jamming Detection in Wireless Sensor Networks, in Proceedings of IEEE International Conference on Mobile Ad hoc and Sensor Systems (MASS), October 2012.
  3. Kartik Siddhabathula, Qi Dong, Donggang Liu, and Matthew Wright, Fast Jamming Detection in Sensor Networks, Proc. IEEE International Conference on Communications (ICC), June 2012.
  4. Na Li, Mayank Raj, Dongaang Liu, Matthew Wright, and Sajal K. Das, Using Data Mules to Preserve Source Location Privacy in Wireless Sensor Networks, Proc. International Conference on Distributed Computing and Networking (ICDCN), Jan. 2012. Finalist (one of three) for "Best Paper: Networking Track".
  5. Wenhua Wang, Yu Lei, Donggang Liu, David Kung, Christoph Csallner, Dazhi Zhang, Raghu Kacker, and Rick Kuhn, A combinatorial approach to detecting buffer overflow vulnerabilities, to appear in Proceedings of Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (acceptance ratio 17.6%), 2011.
  6. Dazhi Zhang, Donggang Liu, DataGuard: Dynamic Data Attestation in Wireless Sensor Networks, in Proceedings of Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (acceptance ratio 23%), 2010.
  7. Dazhi Zhang, Donggang Liu, Jeff Lei, David Kung, Christoph Csallner, and Wenhua Wang, Detecting Vulnerabilities in C Programs Using Trace-Based Testing, in Proceedings of Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (acceptance ratio 23%), 2010.
  8. Qi Dong, Donggang Liu, Adaptive Jamming-Resistant Broadcast Systems with Partial Channel Sharing, to appear in Proceedings of the International Conference on Distributed Computing Systems (ICDCS) (acceptance ratio 14.4%), 2010
  9. Qi Dong, Donggang Liu, Resilient Cluster Leader Election for Wireless Sensor Networks, in Proceedings of The IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON) (acceptance ratio 18.8%), 2009.
  10. Donggang Liu, Protecting Neighbor Discovery Against Node Compromises in Sensor Networks, in Proceedings of the International Conference on Distributed Computing Systems (ICDCS) (acceptance ratio 16.3%), 2009
  11. Dazhi Zhang, Wenhua Wang, Donggang Liu, Yu Lei, David Kung, Student Paper: Reusing Exisiting Test Cases for Security Testing, in Proceedings of International Symposium on Software Reliability Engineering (ISSRE), 2008.
  12. Yi Ouyang, Zhengyi Le, Donggang Liu, Fillia Makedon, Source Location Privacy against Laptop-Class Attacks in Sensor Networks, in Proceedings of International Conference on Security and Privacy in Communication Networks (SecureComm) (acceptance rate 20.2%), 2008
  13. Qi Dong, Donggang Liu, Peng Ning, Pre-Authentication Filters: Providing DoS Resistance for Signature-Based Broadcast Authentication in Wireless Sensor Networks, in Proceedings of ACM Conference on Wireless Network Security (WiSec) (acceptance rate 16.7%), 2008.
  14. Kiran Mehta, Donggang Liu, Mathew Wright, Location Privacy in Sensor Networks Against a Global Eavesdropper, in Proceedings of the IEEE International Conference on Network Protocols (ICNP 2007) (acceptance rate 14.5%), October 2007.
  15. Donggang Liu, Resilient Cluster Formation for Sensor Networks, in Proceedings of the International Conference on Distributed Computing Systems (ICDCS 2007) (acceptance rate 13.4%), June 2007 (Full Version).
  16. Donggang Liu, Efficient and Distributed Access Control for Sensor Networks, in Proceedings of the International Conference on Distributed Computing in Sensor Systems (DCOSS 2007), June, 2007.
  17. Qi Dong, Donggang Liu, Using Auxiliary Sensors for Pairwise Key Establishment in WSN, in Proceedings of 2007 IFIP International Conferences on Networking (Networking 2007) (acceptance rate 22.5%), May 2007.
  18. Donggang Liu, Qi Dong, Detecting Misused Keys in Wireless Sensor Networks, in Proceedings of 2007 International Performance Computing and Communications Conference (IPCCC 2007), April 2007.
  19. Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodia, Practical Broadcast Authentication in Sensor Networks, in Proceedings of The 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous 2005), July 2005.
  20. Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, and Sushil Jajodia, Efficient Security Mechanisms for Overlay Multicast-based Content Distribution, in Proceedings of Applied Cryptography and Network Security (ACNS) conference, New York, June, 2005
  21. Donggang Liu, Peng Ning, Wenliang Du, Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks, in Proceedings of the The 25th International Conference on Distributed Computing Systems (ICDCS '05), pages 609--619, June 2005.
  22. Donggang Liu, Peng Ning, Wenliang Du, Attack-Resistant Location Estimation in Sensor Networks, in Proceedings of The Fourth International Symposium on Information Processing in Sensor Networks (IPSN '05), pages 99 -- 106, April 2005.
  23. Donggang Liu, Peng Ning, Kun Sun, Efficient Self-Healing Group Key Distribution with Revocation Capability, in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), pages 231--240, Washington D.C., October, 2003. (Acceptance ratio: 35/253) (Full version)
  24. Donggang Liu, Peng Ning, Establishing Pairwise Keys in Distributed Sensor Networks, in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), pages 52--61, Washington D.C., October, 2003. (Acceptance ratio: 35/253)
  25. Donggang Liu, Peng Ning, Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks, in Proceedings of the 10th Annual Network and Distributed System Security Symposium, pages 263--276, February 2003. (Acceptance ratio:17/82)
Workshop Publications
  1. Donggang Liu, Qi Dong, Combating Side-Channel Attacks Using Key Management, in Proceedings of International Workshop on Security in Systems and Networks (SSN), 2009.
  2. Jun-Won Ho, Donggang Liu, Matthew Wright, Sajal Das, Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks, in Proceedings of IEEE International Workshop on Sensor Network and Systems for Pervasive Computing (PerSeNS), 2009.
  3. Donggang Liu, Peng Ning, Wenliang Du, Group-Based Key Pre-Distribution in Wireless Sensor Networks, in Proceedings of 2005 ACM Workshop on Wireless Security (WiSe 2005), September 2005.
  4. Donggang Liu, Peng Ning, Location-Based Pairwise Key Establishments for Static Sensor Networks, in 2003 ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN '03), October 2003. (Acceptance ratio: 14/71)