Yanjun Pan (University of Arizona)

In this talk, we will explore the experimental approach for our paper "PoF: Proof-of-Following for Vehicle Platoons" that appears in NDSS 2022. We will present our initial research hypothesis on the temporal and spatial correlation of ambient RF signals due to large-scale fading and the use of the RF correlation to derive security in the context of vehicle platooning. We will describe the set of experiments that were designed to test our hypothesis in different settings (highway, urban environment, static setting, indoor setting). We will present the testbed iterations (RF testbed plus platooning testbed) to collect the desired measurements and the calibration and analysis of those measurements to validate the initial hypothesis. Further, we will share the challenges and useful experiences gained during the experimentation process and note the lesson learned for future experimental efforts.

Speaker's biography

Yanjun Pan is an assistant professor in the Department of Computer Science and Computer Engineering at the University of Arkansas. Her research interests include wireless security, wireless sensing, and network optimization, with emphases on physical layer security, mmWave sensing, and cross-layer network optimization. She holds a Ph.D. in Electrical and Computer Engineering from the University of Arizona and is a recipient of the 2021 N2Women Young Researcher Fellowship.

View More Papers

Hybrid Trust Multi-party Computation with Trusted Execution Environment

Pengfei Wu (School of Computing, National University of Singapore), Jianting Ning (College of Computer and Cyber Security, Fujian Normal University; Institute of Information Engineering, Chinese Academy of Sciences), Jiamin Shen (School of Computing, National University of Singapore), Hongbing Wang (School of Computing, National University of Singapore), Ee-Chien Chang (School of Computing, National University of Singapore)

Read More

PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against...

Xuewei Feng (Tsinghua University), Qi Li (Tsinghua University), Kun Sun (George Mason University), Ke Xu (Tsinghua University), Baojun Liu (Tsinghua University), Xiaofeng Zheng (Institute for Network Sciences and Cyberspace, Tsinghua University; QiAnXin Technology Research Institute & Legendsec Information Technology (Beijing) Inc.), Qiushi Yang (QiAnXin Technology Research Institute & Legendsec Information Technology (Beijing) Inc.), Haixin Duan…

Read More

Chhoyhopper: A Moving Target Defense with IPv6

A S M Rizvi (University of Southern California/Information Sciences Institute) and John Heidemann (University of Southern California/Information Sciences Institute)

Read More

An In-depth Analysis of Duplicated Linux Kernel Bug Reports

Dongliang Mu (Huazhong University of Science and Technology), Yuhang Wu (Pennsylvania State University), Yueqi Chen (Pennsylvania State University), Zhenpeng Lin (Pennsylvania State University), Chensheng Yu (George Washington University), Xinyu Xing (Pennsylvania State University), Gang Wang (University of Illinois at Urbana-Champaign)

Read More