Wade Trappe

Publications

Books:

 

1. W. Trappe and L. C. Washington, Introduction to Cryptography with Coding Theory. Prentice Hall, (First Edition 2001, Second Edition 2005).

2. K.J.R. Liu, W. Trappe, Z. J Wang, M. Wu, H. Zhao, Digital Fingerprinting for Multimedia Forensics, Hindawi Press, 2005.

3. Y. Sun, W. Trappe, K.J.R. Liu, Network-Aware Security for Group Communications, Springer-Verlag, 2007.

4. Y. Chen, W. Xu, W. Trappe, Y. Zhang, Securing Emerging Wireless Systems: Lower-layer Approaches, Springer-Verlag, under development.

 

Refereed Journals:

 

1. W. Xu, W. Trappe, Y. Zhang, Defending Wireless Sensor Networks from Radio Interference through Channel Adaptation, to appear in ACM Trans. on Sensor Networks.

2. Y. Chen, K. Kleisouris, X. Li, W. Trappe, R. Martin, Security Analysis of the Robustness of Localization Algorithms to Signal Strength Attacks, to appear in ACM Trans. On Sensor Networks.

3. P. Kamat, W. Trappe, Y. Zhang, Source Location Privacy in Wireless Sensor Networks, to appear in IEEE Transactions on Parallel and Distributed Computing.

4. K. Ma, Y. Zhang, W. Trappe, Managing Mobile Sensor Networks Using Network Dynamics, IEEE Transactions on Parallel and Distributed Computing, vol. 19, pg. 106-120, Jan. 2008.

5. Q. Li and W. Trappe, Detecting Spoofing and Anomalous Traffic in Wireless Network via Forge-Resistant Relationships, in IEEE Trans. on Information Forensics and Security, vol. 2, pg. 793-808, Dec. 2007.

6. Q. Li and W. Trappe, Reducing Delay and Enhancing DoS Resistance in Multicast Authentication through Multi-grade Security, IEEE Trans. On Information Forensics and Security, vol. 1, pg. 190-204, June 2006. 

7. W. Xu, K. Ma, W. Trappe, Y. Zhang, Jamming Sensor Networks: Attack and Defense Strategies, IEEE Networks Special Issue on Sensor Networks, vol. 20, pg. 41-47, May 2006.

8. M. Wu, W. Trappe, Z.J. Wang, K.J.R. Liu, Collusion-resistant Fingerprinting for Multimedia, IEEE Signal Processing Magazine, vol. 21, pg. 15-27, 2004.

9. Z. J. Wang, M. Wu, W. Trappe and K.J.R. Liu, Group Oriented Fingerprinting for Multimedia Forensics, EURASIP Journal of Applied Signal Processing, pg. 2153-2173, October 2004. (EURASIP Best Paper Award, 2005)

10. W. Trappe, M. Wu, Z. Wang, and K. J. R. Liu, Anti-Collusion Fingerprinting for Multimedia, IEEE Transactions on Signal Processing, vol. 51, pg. 1069-1087, 2003. (IEEE SPS Best Paper Award, 2005)

11. W. Trappe, J. Song, R. Poovendran, and K. J. R. Liu, Key Management and Distribution for Secure Multimedia Multicast, IEEE Transactions on Multimedia, vol. 5, pg. 544-557, 2003.

12. Y. Sun, W. Trappe, and K. J. R. Liu, A Scalable Multicast Key Management for Heterogeneous Wireless Networks, IEEE Transactions on Networking, vol. 12, pg. 653-666, 2004.

13. W. Trappe, Y. Wang, and K. J. R. Liu, Resource-aware Conference Key Establishment for Heterogeneous Networks, IEEE/ACM Transactions on Networking, vol. 13, pg. 134-146, 2005.

14. Z. J. Wang, M. Wu, H. Zhao, W. Trappe, and K.J.R. Liu, Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation, IEEE Trans. On Image Proc, vol. 14, pg. 804-821, 2005.

15. T. Lawrence, W. Trappe, and N. Bedford, The Influence of an Offshore Rise on Low-Frequency Modal Propagation, Journal of Underwater Acoustics, Vol. 48, No. 1, pg. 29-36, January 1998.

16. P. McCarty, J. Gross, W. Trappe, and D. Grant, Minimum Detectable Target Strength Using Spectral Estimation Methods for the Active Barrier Problem, Journal of Underwater Acoustics, vol. 45, no. 1, pg. 135-154, January 1995.

17. T. Lawrence and W. Trappe, Analysis of an Active Barrier Experiment in a Stable Shallow Water Environment, Journal of Underwater Acoustics, vol. 45, no. 1, pg. 65-86, January 1995.

 

Refereed Conferences:

 

1. W. Xu, W. Trappe, Y. Zhang, Anti-Jamming Timing Channels for Wireless Networks, to appear in the 1st ACM Conference on Wireless Security (WiSec), 2008. (Acceptance Rate: 16.7%)

2. S. Chen, Y. Chen, W. Trappe, Exploiting Environmental Properties for Wireless Localization and Location Aware Applications, to appear in the IEEE International Conference on Pervasive Computing and Communications (Percom), 2008. (Acceptance Rate: 11.9%)

3. Q. Li, M. Zhao, J. Walker, Y. Hu, A. Perrig, W. Trappe, SEAR: A Secure Efficient Ad hoc On Demand Routing Protocol for Wireless Networks, to appear in the ACM Symposium on Information, Computer and Communication Security (ASIACCS), 2008. (Acceptance Rate: 22%)

4. Y. Zhang, Z. Li, W. Trappe, Power-Modulated Challenge-Response Schemes for Verifying Location Claims, in Proceedings of the IEEE Global Telecommunication Conference (Globecom), pg. 39-43, Nov. 2007.

5. M. Loiacono, J. Rosca, W. Trappe, The Snowball Effect: Detailing Performance Anomalies of 802.11 Rate Adaptation, in Proceedings of the IEEE Global Telecommunication Conference (Globecom), pg. 5117-5122, Nov. 2007.

6. L. Xiao, L. Greenstein, N. Mandayam, W. Trappe, Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication, Proceedings of the IEEE Global Telecommunication Conference (Globecom), pg. 4646-4651, Nov. 2007.

7. S. Chen, Y. Chen, W. Trappe, Poster: Exploiting Environmental Properties for Wireless Localization, in Proceedings of the Thirteenth Annual International Conference on Mobile Computing and Networking (MobiCom 2007), 2007.

8. Z. Li, R. Yates, W. Trappe,  Secure Communication with a Fading Eavesdropper Channel, in the Proceedings of the IEEE International Symposium on Information Theory (ISIT), 2007.

9. Z. Li, R. Yates, W. Trappe, Secrecy Communication via Multi-antenna Transmission, in Proceedings of the 41st Annual Conference on Information Science and Systems, pg. 905-910, March 2007. 

10. P. Kamat, W. Xu, W. Trappe, Y. Zhang, Temporal Privacy in Wireless Sensor Networks, to appear in the Proceedings of the 27th IEEE Int. Conference on Distributed Computing Systems (ICDCS07), 2007. (Acceptance Rate: 13%)

11. Y. Zhang, G. Bhanage, W. Trappe, Y. Zhang, R. Howard, Facilitating an Active Transmit-only RFID System through Receiver-based Processing, in the Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks, 2007. (Acceptance Rate: 20%)

12. Y. Chen, W. Trappe, R. Martin, Detecting and Localizing Wireless Spoofing Attacks, in the Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks, 2007. (Acceptance Rate: 20%)

13. M. Kuroda, W. Trappe, R. Nomura, A Radio-independent Authentication Protocol (EAP-CRP) for Networks of Cognitive Radios, in the Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks, 2007. (Acceptance Rate: 20%)

14. X. Wenyuan, W. Trappe, Y. Zhang, Channel Surfing: Defending Wireless Sensor Networks from Jamming and Interference, in the Proceedings of the IEEE/ACM International Conference on Information Processing in Sensor Networks (IPSN), 2007. (Acceptance Rate: 22%)

15. Y. Chen, W. Trappe, R. Martin, Attack Detection in Wireless Localization, in the Proceedings of the 26th Annual IEEE Conference on Computer Communications (Infocom), 2007. (Acceptance Rate: 18%)

16. Z. Li, R. Yates, W. Trappe, Secrecy Capacity of Independent Parallel Channels, Proceedings of the 44th Annual Allerton Conference  on Communication, Control, and Computing, Sept. 2006. 

17. W. Xu, W. Trappe and Y. Zhang, Poster Abstract: Channel Surfing: Defending Wireless Sensor Networks from Jamming and Interference, Proceedings of the 4th ACM Conference on Embedded Networked Sensor Systems (SenSys 2006).

18. S. Chen, Y. Zhang, W. Trappe, Inverting Sensor Networks and Actuating the Environment for Spatio-Temporal Access Control, in the Proceedings of the 2nd ACM workshop on Security of Ad hoc and Sensor Networks, 2006.

19. Z. Li, W. Xu, R. Miller, W. Trappe, Securing Wireless Systems Via Lower Layer Enforcements, in the Proceedings of the 2006 ACM Workshop on Wireless Security. (Acceptance Rate: 19.6%)

20. P. Kamat, A. Kamat, W. Trappe, Poster: An Identity-based Security Framework for Vehicular Networks, in the Proceedings of the Third ACM International Workshop on Vehicular Ad Hoc Networks, 2006.

21. Q. Li, W. Trappe, Light-weight Detection of Spoofing Attacks in Wireless Networks, in Proceedings of IEEE Workshop on Wireless and Sensor Network Security, 2006.

22. W. Xu, P. Kamat, W. Trappe, TRIESTE: A Trusted Radio Infrastructure for Enforcing SpecTrum Etiquettes, in Proceedings of the IEEE Workshop on Networking Technologies for Software Defined Radio (SDR) Networks.

23. Q. Li and W. Trappe, Relationship-based Detection of Spoofing-related Anomalous Traffic in Ad Hoc Networks, Proceedings of the Third IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Networks, 2006. (Acceptance Rate: 26%)

24. Y. Chen, J-A. Francisco, W. Trappe and R. Martin, A Practical Approach to Landmark Deployment for Indoor Localization, Proceedings of the Third IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Networks, 2006. (Acceptance Rate: 26%)

25. Y. Chen, K. Kleisouris, X. Li, W. Trappe, R. Martin, The Robustness of Localization Algorithms to Signal Strength Attacks: A Comparative Study, In Proceedings of International Conference on Distributed Computing in Sensor Systems (DCOSS 2006), San Francisco, CA, USA, June 2006.

26. K. Ma, Y. Zhang, W. Trappe, Mobile Network Management and Robust Spatial Retreats via Network Dynamics, In Proceedings of the 1st International Workshop on Resource Provisioning and Management in Sensor Networks (RPMSN05), pp. 235-242, Nov. 2005.

27. W. Trappe, Y. Zhang, B. Nath, MIAMI: Methods and Infrastructure for the Assurance of Measurement Information, In Proceedings of the 2nd International VLDB Workshop on Data Management for Sensor Networks, pg. 11-17, August 2005

28. Q. Li and W. Trappe, Staggered TESLA: A Multicast Authentication Scheme Resistant to DoS Attacks, In the Proceedings of the IEEE Global Telecommunication Conference (Globecom), pp. 1670-1675, Nov. 2005.

29. Z. Li and W. Trappe, Collusion-resistant fingerprints from WBE sequence sets, In Proceedings of the IEEE International Conference on Communications, pg. 1336-1340, 2005.

30. W. Xu, W. Trappe, Y. Zhang, and T. Wood, The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks, Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (Mobihoc05), pg. 46-57, 2005. (Acceptance Rate: 14%)

31. Z. Li, W. Trappe, Y. Zhang and B. Nath, Robust Statistical Methods for Securing Wireless Localization in Sensor Networks, Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN05), pg. 91-98, 2005. (Acceptance Rate: 20%)

32. P. Kamat, Y. Zhang, W. Trappe and C. Ozturk, Enhancing Source-Location Privacy in Sensor Network Routing, Proceedings of the 25th IEEE Int. Conference on Distributed Computing Systems (ICDCS05), pg. 599-608, 2005. (Acceptance Rate: 13%)

33. W. Xu, T. Wood, W. Trappe and Y. Zhang, Channel Surfing and Spatial Retreats: Defenses Against Wireless Denial of Service, Proceedings of the 2004 ACM Workshop on Wireless Security, pg. 80-89, 2004. (Acceptance Rate: 20%)

34. W. Xu, W. Trappe and S. Paul, Key Management for 3G MBMS Security, Proceedings of the IEEE Global Telecommunication Conference (Globecom), pp. 2276-2280, 2004.

35. C. Ozturk, Y. Zhang, W. Trappe, Source-Location Privacy in Energy-Constrained Sensor Network Routing, Proceedings of the 2nd ACM Workshop on Security of Ad hoc and Sensor Networks, pp. 88-93, Oct. 2004.

36. Z. Li, Y. Zhang, W. Trappe and B. Nath, Securing Wireless Localization: Living with Bad Guys, 2004 DIMACS Workshop on Mobile and Wireless Security.

37. Z. J. Wang, M. Wu, H. Zhao, K.J.R. Liu and W. Trappe, Resistance of Orthogonal Gaussian Fingerprints to Collusion Attacks, Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, vol. 1, pg. 617-620, 2003.

38. Z. J. Wang, M. Wu, W. Trappe and K.J.R. Liu, Anti-collusion of Group-oriented Fingerprinting, Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, vol. 2, pg. 217-220, 2003.

39. M. Bohge and W. Trappe, An Authentication Framework for Hierarchical Ad Hoc Sensor Networks, Proceedings of the 2003 ACM Workshop on Wireless Security, pg. 79-87, 2003. (Acceptance Rate: 25%)

40. C. Ozturk, Y. Zhang, W. Trappe and M. Ott, Source-location privacy for networks of energy-constrained sensors, Proceedings of 2nd IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, pg. 68-72, 2004.

41. Y. Sun, W. Trappe, K.J.R. Liu, Topology-Aware Key Management for Wireless Multicast, IEEE Globecom 03, pg. 1471-1475, 2003.

42. W. Trappe, M. Wu, and K. J. R. Liu, Joint Coding and Embedding for Collusion-Resistant Fingerprinting, EUSIPCO 2002, special session on Security Issues in Digital Watermarking.

43. W. Trappe, M. Wu, and K. J. R. Liu, Anti-Collusion Codes: Multi-User and Multimedia Perspectives, IEEE International Conference on Image Processing (ICIP), vol. 2, pg. 149-152, 2002.

44. W. Trappe, M. Wu, and K. J. R. Liu, Collusion-Resistant Fingerprinting for Multimedia, IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, vol. 4, pg. 3309-3312, 2002.

45. W. Trappe, Y. Wang, and K. J. R. Liu, Establishment of Conference Keys in Heterogeneous Networks, IEEE Int. Conference on Communications, pg. 2201-2205, 2002.

46. Y. Sun, W. Trappe, and K. J. R. Liu, An Efficient Key Management Scheme for Secure Wireless Multicast, IEEE Int. Conference on Communications, pg. 1236-1240, 2002.

47. B. Sun, W. Trappe, Y. Sun, and K.J.R. Liu, A Time-Efficient Contributory Key Agreement Scheme for Secure Group Communication, IEEE Int. Conf. on Communications, pg. 1159-1163, 2002.

48. W. Trappe, J. Song, R. Poovendran, and K. J. R. Liu, Key Distribution for Secure Multimedia Multicasts via Data Embedding, IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, May 2001.

49. W. Trappe, Y. Wang, and K. J. R. Liu, Group Key Agreement Using Divide-and-Conquer Strategies, 35th Conference on Information Sciences and Systems, The Johns Hopkins University, March 2001.

50. J. Song, R. Poovendran, W. Trappe, and K. J. R. Liu, A Dynamic Key Distribution Scheme Using Data Embedding for Secure Multimedia Multicast, Proceedings of SPIE Security and Watermarking for Multimedia, Vol. 4314, pg. 618-628, 2001.

51. W. Trappe and K. J. R. Liu. Denoising via Adaptive Lifting Schemes, Proceedings of SPIE Wavelet Applications in Signal and Image Processing VIII, Vol. 4119, pg. 302-312, 2000 (Invited paper).

52. W. Trappe, H. Zheng, and K. J. R. Liu, Adaptive Lifting Coding Scheme for Video Scene Changes, IEEE Workshop on Multimedia Signal Processing, September 1999.

53. W. Trappe and K. J. R. Liu, Adaptivity in the Lifting Scheme, 33rd Annual Conference on Information Sciences and Systems, The Johns Hopkins University, pg. 950-955, March 1999.

54. J. D. Lakey and W. Trappe, Signal Analysis by Composite Wavelet Transforms, Proc. Approximation Theory VIII, World Scientific, 1996. 

55. J. D. Lakey and W. Trappe, Analysis of Chirp Signals by Time-Frequency Localization Frames, Proceedings of SPIE Wavelet Applications in Signal and Image Processing IV, Vol. 2825, pg. 551-560, 1996.