Yanjun Pan (University of Arizona)

In this talk, we will explore the experimental approach for our paper "PoF: Proof-of-Following for Vehicle Platoons" that appears in NDSS 2022. We will present our initial research hypothesis on the temporal and spatial correlation of ambient RF signals due to large-scale fading and the use of the RF correlation to derive security in the context of vehicle platooning. We will describe the set of experiments that were designed to test our hypothesis in different settings (highway, urban environment, static setting, indoor setting). We will present the testbed iterations (RF testbed plus platooning testbed) to collect the desired measurements and the calibration and analysis of those measurements to validate the initial hypothesis. Further, we will share the challenges and useful experiences gained during the experimentation process and note the lesson learned for future experimental efforts.

Speaker's biography

Yanjun Pan is an assistant professor in the Department of Computer Science and Computer Engineering at the University of Arkansas. Her research interests include wireless security, wireless sensing, and network optimization, with emphases on physical layer security, mmWave sensing, and cross-layer network optimization. She holds a Ph.D. in Electrical and Computer Engineering from the University of Arizona and is a recipient of the 2021 N2Women Young Researcher Fellowship.

View More Papers

coucouArray ( [post_type] => ndss-paper [post_status] => publish [posts_per_page] => 4 [orderby] => rand [tax_query] => Array ( [0] => Array ( [taxonomy] => category [field] => id [terms] => Array ( [0] => 42 [1] => 55 ) ) ) [post__not_in] => Array ( [0] => 8411 ) )

FedCRI: Federated Mobile Cyber-Risk Intelligence

Hossein Fereidooni (Technical University of Darmstadt), Alexandra Dmitrienko (University of Wuerzburg), Phillip Rieger (Technical University of Darmstadt), Markus Miettinen (Technical University of Darmstadt), Ahmad-Reza Sadeghi (Technical University of Darmstadt), Felix Madlener (KOBIL)

Read More

ditto: WAN Traffic Obfuscation at Line Rate

Roland Meier (ETH Zürich), Vincent Lenders (armasuisse), Laurent Vanbever (ETH Zürich)

Read More

Demystifying Local Business Search Poisoning for Illicit Drug Promotion

Peng Wang (Indiana University Bloomington), Zilong Lin (Indiana University Bloomington), Xiaojing Liao (Indiana University Bloomington), XiaoFeng Wang (Indiana University Bloomington)

Read More

Binary Search in Secure Computation

Marina Blanton (University at Buffalo (SUNY)), Chen Yuan (University at Buffalo (SUNY))

Read More

Privacy Starts with UI: Privacy Patterns and Designer Perspectives in UI/UX Practice

Anxhela Maloku (Technical University of Munich), Alexandra Klymenko (Technical University of Munich), Stephen Meisenbacher (Technical University of Munich), Florian Matthes (Technical University of Munich)

Vision: Profiling Human Attackers: Personality and Behavioral Patterns in Deceptive Multi-Stage CTF Challenges

Khalid Alasiri (School of Computing and Augmented Intelligence Arizona State University), Rakibul Hasan (School of Computing and Augmented Intelligence Arizona State University)

From Underground to Mainstream Marketplaces: Measuring AI-Enabled NSFW Deepfakes on Fiverr

Mohamed Moustafa Dawoud (University of California, Santa Cruz), Alejandro Cuevas (Princeton University), Ram Sundara Raman (University of California, Santa Cruz)