scispace - formally typeset
H

Haowen Chan

Researcher at Carnegie Mellon University

Publications -  82
Citations -  6436

Haowen Chan is an academic researcher from Carnegie Mellon University. The author has contributed to research in topics: Medicine & Chemistry. The author has an hindex of 15, co-authored 19 publications receiving 6221 citations. Previous affiliations of Haowen Chan include University of Pittsburgh.

Papers
More filters
Proceedings ArticleDOI

Random key predistribution schemes for sensor networks

TL;DR: The random-pairwise keys scheme is presented, which perfectly preserves the secrecy of the rest of the network when any node is captured, and also enables node-to-node authentication and quorum-based revocation.
Journal ArticleDOI

Security and privacy in sensor networks

TL;DR: The miniature wireless sensor nodes developed from low-cost off-the-shelf components at the University of California, Berkeley, as part of its smart dust projects, establish a self-organizing sensor network when dispersed into an environment.
Proceedings ArticleDOI

PIKE: peer intermediaries for key establishment in sensor networks

TL;DR: This work describes peer intermediaries for key establishment (PIKE), a class of key-establishment protocols that involves using one or more sensor nodes as a trusted intermediary to facilitate key establishment, and shows that both the communication and memory overheads of PIKE protocols scale sub-linearly with the number of nodes in the network yet achieving higher security against node compromise than other protocols.
Book ChapterDOI

ACE: An Emergent Algorithm for Highly Uniform Cluster Formation

TL;DR: The efficient subdivision of a sensor network into uniform, mostly non-overlapping clusters of physically close nodes is an important building block in the design of efficient upper layer network functions such as routing, broadcast, data aggregation, and query processing.
Proceedings ArticleDOI

Secure hierarchical in-network aggregation in sensor networks

TL;DR: This work presents the first algorithm for provably secure hierarchical in-network data aggregation, and is guaranteed to detect any manipulation of the aggregate by the adversary beyond what is achievable through direct injection of data values at compromised nodes.