Book Chapters

  • Y. Xiao, M.J. Plyler, B. Sun, and Y. Pan, "Frame Format, Channel Access, And Piconet Operation of IEEE 802.15.3 Wireless PANs," Chapter 8 of Emerging Wireless LANs, Wireless PANs, and Wireless MANs: IEEE 802.11, IEEE 802.15, 802.16 Wireless Standard Family, Publisher: Wiley, ISBN-10: 0471720690.
  • Y. Xiao, M.J. Plyler, B. Sun, and Y. Pan, "Power Management and Security of IEEE 802.15.3 Wireless PANs," Chapter 9 of Emerging Wireless LANs, Wireless PANs, and Wireless MANs: IEEE 802.11, IEEE 802.15, 802.16 Wireless Standard Family, Publisher: Wiley, ISBN-10: 0471720690.
  • V. Krishna, Y. Xiao, B. Sun, X. Du, and F. Hu, "Key Management Schemes in Sensor Networks," book chapter in Wireless/Mobile Network Security, edited by Y. Xiao, X. Shen, and D-Zhu, Du, ISBN: 0387280405, Springer 2006.
  • B. Sun, Y. Xiao, and K. Wu, "Intrusion Detection in Cellular Mobile Networks," book chapter in Wireless/Mobile Network Security, edited by Y. Xiao, and X. Shen, and D.-Z. Du (Eds.), ISBN: 0387280405, Springer 2006.
  • K. Wu, and B. Sun,"Intrusion Detection for Wireless Mobile Ad Hoc Networks," Chapter 3 in Security and Routing in Wireless Networks, edited by Y. Pan and Y. Xiao (Eds), ISBN: 159454316X, Nova Science Publishers, 2005, pp. 55-82.
  • Refereed Journal Papers

  • Y. Xiao, H. Chen, K. Wu, B. Sun, Y. Zhang, X. Sun, and C. Liu, "Coverage and Detection of a Randomized Scheduling Algorithm in Wireless Sensor Networks," IEEE Transactions on Computers, accepted.
  • B. Sun, G. Yan, Y. Xiao, and T.Andrew Yang, "Self-propagating Mal-packets in Wireless Sensor Networks: Dynamics and Defense Implications," Elsevier Ad Hoc Networks Journal, Vol. 7, No. 8, 2009, pp. 1489-1500.
  • T. Andrew Yang, D. Jain, and B. Sun, "Development of Emulation-Based Projects for Teaching Wireless Sensor Networks," Journal of Computing Sciences in Colleges, 2008.
  • B. Sun, Y. Xiao, C.-C Li, H.-H Chen, and T. Andrew Yang, "Security Co-Existence of Wireless Sensor Networks and RFID For Pervasive Computing," To appear in Elsevier Computer communications Journal, 2008.
  • Y. Xiao, V. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway, "A Survey of Key Management Schemes in Wireless Sensor Networks," Elsevier Computer communications Journal, Special issue on Security on Wireless Ad Hoc and Sensor Networks, Vol. 30, No. 11-12, May, 2007, pp. 2314-2341.
  • Y. Xiao, H. Chen, H.-H.Chen, B. Sun, and C. L. P. Chen, "Optimal Utilization in Mobile Database Failure Restoration," IEEE Transactions on Wireless Communications, Vol. 6, No. 7, 2007, pp. 2086-2095.
  • <
  • B. Sun, Y. Xiao, and R. Wang, "Detection of Fraudulent Usage in Wireless Networks," IEEE Transactions on Vehicular Technology, Vol. 56, No.6, Nov. 2007, pp. 3912-3923.
  • B. Sun, K. Wu, Y. Xiao, and R. Wang, "Integration of mobility and intrusion detection for wireless Ad Hoc networks," (Wiley) International Journal of Communication Systems, Vol. 20, No. 6, June 2007, pp. 695-721.
  • Y. Xiao, H.-H Chen, B. Sun, R. Wang, and S Sethi, "MAC Security and Security Overhead Analysis in the IEEE 802.15.4 Wireless Sensor Networks," EURASIP Journal on Wireless Communications and Networking, DOI: 10.1155/WCN/2006/93830, 2006, pp. 1-12.
  • K. Wu, D. Dreef, B. Sun, and Y. Xiao, "Secure Data Aggregation without Persistent cryptographic operations in Wireless Sensor Networks," Elsevier AD HOC Networks Journal, Special Issue on Security Issues in Sensor and AD HOC Networks, Vol. 15, No. 1, 2007, pp. 100-111.
  • C. Liu, K. Wu, Y. Xiao, and B. Sun, "Random Coverage with Guaranteed Connectivity: Joint Scheduling for Wireless Sensor Networks," IEEE Transactions on Parallel and Distributed Systems, Vol. 17, No. 6, June 2006, pp. 562-575.
  • B. Sun, C.-C Li, K. Wu, and Y. Xiao, "A Lightweight Secure Protocol for Wireless Sensor Networks", Elsevier Computer Communications Journal Special Issue on Wireless Sensor Networks: Performance, Reliability, Security, and Beyond, 2006, pp. 2556-2568.
  • W. Stewart, Y. Xiao, B. Sun, and H. Chen, "Security Mechanisms and Vulnerabilities in the IEEE 802.15.3 Wireless Personal Area Networks" International Journal of Wireless and Mobile Computing (IJWMC), Special Issue on Security of Computer Network and Mobile Systems, Vol.2, No. 1, 2007, pp. 14-27.
  • B. Sun, F. Yu, K. Wu, Y. Xiao, V. C. M. Leung, "Enhancing Security using Mobility-Based Anomaly Detection in Cellular Mobile Networks," IEEE Transactions on Vehicular Technology, Vol. 55, No. 3, pp. 1385-1396, May 2006.
  • B. Sun, K. Wu, and U. Pooch, "Zone-based Intrusion Detection System for Mobile Ad Hoc Networks," International Journal of Ad Hoc & Sensor Wireless Networks, Vol. 2, No. 3, 2006.
  • Magazine Articles

  • B. Sun, L. Osborne, Y. Xiao, and S. Guizani, "Intrusion Detection Techniques in Mobile Ad Hoc and Wireless Sensor Networks", IEEE Wireless Communications Magazine, May 2007, pp/ 56-63.
  • Y. Xiao, X. Shen, B. Sun, and L. Cai, "Security and Privacy in RFID and Applications in Telemedicine," IEEE Communications Magazine special issue on Wireless Technology Advances and Challenges for Telemedicine, Vol. 44, No. 4, 2006, pp. 64-72.
  • R.-H. Wang, B. Gutha, S. Horan, Y. Xiao, B. Sun, "Which Transmission Mechanism Is Best for Space Internet: Window-based, Rate-based, or A Hybrid of the two?," IEEE Wireless Communications Mag., Vol. 12, No. 6, Dec. 2005, pp. 42-49.
  • Refereed Conference/Workshop Papers

  • G. Yan, S. Eidenbenz, and B. Sun, "Mobi-Watchdog: You Can Steal, But You Can't Run!",Proc. of ACM Conference on Wireless Network Security (WiSec), March 2009, Zurich, Switzerland.
  • B. Sun, D. Shrestha, G. Yan, and Y. Xiao, "Self-propagate Mal-packets in Wireless Sensor Networks: Dynamics and Defense Implications", IEEE Globecom 2008, Dec. 2008, New Orleans, LA.
  • A. Olteanu, Y. Xiao, F. Hu, and B. Sun, "A Lightweight Block Cipher Based on a Multiple Recursive Generator", IEEE Globecom 2008, Dec. 2008, New Orleans, LA.
  • B. Sun, G. Yan, and Y. Xiao, "Worm Propagation Dynamics in Wireless Sensor Networks", IEEE ICC 2008, May 2008, Beijing.
  • K. Wu, Y. Xiao, J. Li, and B. Sun, " Distributed Algorithm for Finding Global Icebergs over Wireless Networks with Linked Counting Bloom Filters", IEEE ICC 2008, May 2008, Beijing.
  • B. Sun, N. Chand, K. Wu, and Y. Xiao, "Change-Point Monitoring for Secure In-Network Aggregation in Wireless Sensor Networks", IEEE GLOBECOM 2007, Dec., 2007, Washington D.C.
  • B. Sun, X. Jin, K. Wu, and Y. Xiao, "Integration of Secure In-Network Aggregation and System Monitoring for Wireless Sensor Networks", IEEE ICC 2007, Glasgow, June, 2007, pp. 1476-1471.
  • Y. Xiao, H. Chen, K. Wu, B. Sun, and C. Liu, "Modeling Detection Metrics in Randomized Scheduling Algorithm in Wireless Sensor Networks ", IEEE WCNC 2007, Hong Kong, March, 2007, pp. 3741-3745.
  • B. Sun, X. Jin, Y. Xiao, and R. Wang, "Enhancing Security using Mobility Profile for Cellular Mobile Networks", IEEE GLOBECOM 2006, Nov. 2006, San Francisco, CA.
  • B. Sun, Y. Xiao, R. Wang, and S. Guizani, "Enhancing Security using Calling Activity for Wireless Networks", IEEE GLOBECOM 2006, San Francisco, CA, Nov. 2006.
  • B. Sun. C.-C, Li, Y. Xiao, "A Lightweight Secure Solution for RFID", IEEE GLOBECOM 2006, Nov. 2006, San Francisco, CA.
  • Y. Xiao, B. Sun, H.-H. Chen, S. Guizani, R. Wang, "Performance Analysis of Advanced Encryption Standard (AES)", IEEE GLOBECOM 2006, Nov. 2006, San Francisco, CA.
  • Y. Xiao, H. Chen, K. Wu, C. Liu, B. Sun, "Maximizing Network Life Time under QoS constraints in Wireless Sensor Networks", IEEE GLOBECOM 2006, Nov. 2006, San Francisco, CA.
  • K. Wu, D. Dreef, B. Sun, and Y. Xiao, "Secure Data Aggregation without Persistent Cryptographic Operations in Wireless Sensor Networks," First International Workshop on eSafety and Convergence of Heterogeneous Wireless Networks (eSCo-Wi), held together with the 25th IEEE International Performance, Computing, and Communications Conference (IPCCC), Phoenix, AZ, April 12, 2006.
  • B. Sun, C.-C Li, K. Wu, and Y. Xiao, "A LCG-based Secure Protocol for Wireless Sensor Networks", IEEE International Conference on Communications (ICC 2006), Istanbul, Turkey, 2006, pp. 3627-3632.
  • B. Sun, Z. Chen, R. Wang, F. Yu, and V.C.M. Leung, "Towards Adaptive Anomaly Detection in Cellular Mobile Networks", IEEE Consumer Communications and Networking Conference (CCNC'06), Las Vegas, 2006, pp. 666 - 670.
  • Y. Xiao, S. Sethi, H.-H Chen, and B. Sun, "Security Services and Enhancements in the IEEE 802.15.4 Wireless Sensor Networks," IEEE Globecom'05, St. Louis, MO, Nov. 2005.
  • R.H. Wang, S. Horan, B. Gutha, B. Sun, P. Regury, "An Experimental Analysis of Rate-based and Window-based Transmission Mechanisms over Simulated Space-Internet Links," IEEE Globecom'05, St. Louis, MO, Nov. 2005.
  • C.-C Li, B. Sun, "Using Linear Congruential Generators for Cryptographic Purposes," 20th International Conference on Computers and Their Applications, New Orleans, LA, March 16-18, 2005.
  • C.-C Li, H.S.R. Kandati, B. Sun, "Security evaluation of email encryption using random noise generated by LCGs," 15th Consortium for Computing Sciences in Colleges: South Central Region, Lake Charles, LA, April 2005.
  • B. Sun, F. Yu, K. Wu, and V.C.M. Leung, "Mobility-Based Anomaly Detection in Cellular Mobile Networks," Proceedings of ACM Wireless Security (WiSe'04) in conjunction with ACM Mobicom'04, Philedelphia, PA, 2004, pp. 61-69.
  • B. Sun, K. Wu, and U. Pooch, "Towards Adaptive Intrusion Detection for Mobile Ad Hoc Networks," IEEE Globecom 2004.
  • B. Sun, K. Wu, and U. Pooch, "Routing Anomaly Detection in Mobile Ad-Hoc Networks," IEEE International Conference on Computer Communications and Networks (ICCCN'03), Dallas, TX, 2003, pp. 25-31.
  • B. Sun, K. Wu, and U. Pooch, "Alert Aggregation in Mobile Ad-Hoc Networks," ACM Wireless Security (WiSe'03) in conjunction with ACM Mobicom'03, San Deigo, CA. pp. 69-78.
  • B. Sun, Y. Guan, J. Chen and U. Pooch, "Detecting Black-hole Attack in Mobile Ad-Hoc Networks," 5th European Personal Mobile Communications Conference, Scotland, 2003, pp.490-495.
  • J. Chen, Y. Guan, B. Sun, and U. Pooch, "An Energy-Efficient Mechanism for Data-Centric Storage in Sensor Networks," in 7th World Multiconference on Systematics, Cybernetics and Informatics (SCI 2003), Orlando, FL., July 27-30, 2003.
  • B. Sun, K. Wu and U. Pooch, "Secure Routing Against Black-hole Attack in Mobile Ad Hoc Networks," IASTED International Conference on Communications and Computer Networks (CCN'02), Cambridge, M.A., Nov., 2002.
  • H. Jiang, S. Cheng, Y, He, and B. Sun,"Multicasting along Energy-Efficient Meshes in Mmobile Ad Hoc Networks," IEEE Wireless Communications and Networking Conference (WCNC'02), vol. 2, March, 2002, pp. 807-811.
  • B. Sun, J. Liao, and J. Chen, "Analysis and Implementation of Mobile SCP", High Technology Letters, 1998, volume 4. P. R.China (in Chinese).