Shishir Nagaraja
Researcher in Network Security
- E-mail
- shishir [dot] nagaraja [at] cl [dot] cam [dot] ac [dot] uk
- Phone
- +44 1223 763565
- +44 7913 594019
- Office
- GE17, William Gates Building, Computer Laboratory
Curriculum Vitae
My current C.V. is available here.
Research Interests
My main area of interest is in the security aspects of complex
networks. Complex networks are every where to be seen, they exhibit a
range of properties at the topology level that affect the dynamic
processes occuring on them. I study how conflict shapes networks and
networks are in turn shaped by conflicts. My research studies into
these aspects are stongly influenced by my philosophical perspective
of security and conflict, which is the following. Security involves
the negotiation of interests between various parties involved in
communication. Where does human communication arise from? I believe it
arises from confict. Conflict, not necessarily with the party you are
communicating with, but certainly with one or more parties you can
reach within a few hops.
One of the projects I have been doing is the analysis of topological
attack and defense in complex networks. How do various attack and
defense mechanisms scale with network size, what is the best method of
attacking various types of networks (classified by topology) and what
is the best way of defending them. Some of the early work I have
conducted in this regard is written up a technical report titled the
topology of covert conflict.
Other projects that I have been doing are the exploration of the
evolution of cooperation in peer to peer networks, traffic analysis,
and resilience analysis of the Internet. There should be more content
about this soon.
Publications
Patents
- Shishir Nagaraja and Madhusudhana H S, "Method and System for
Amassed Authorization", USPTO, 2001.
- Shishir Nagaraj, Natraj Sirisilla and H S Madhusudhana, "An
adaptive method and system for user empowered management based on
Dynamic Quorums", USPTO, November 2002.
- Ravi Kiran UVS and Shishir Nagaraja, "An Algorithm to cluster
directory users into user communities based on similarity in access",
USPTO 6,996,577, June 2006.
- Madhusudhana H S, Shishir Nagaraja and Aridaman Tripathi,
"Security and Policy Integrity in multilateral authorization systems",
USPTO 7,136,489, November 2006.
Papers and articles
- S. Nagaraja, Anonymity in the wild: Mixes on unstructured
networks, Accepted at PET (Workshop on Privacy Enhancing
Technologies), June 2007, Ottawa.
- S. Nagaraja, the topology of community hiding, Accepted at
NAACSOS (Conference of North American Association for Computational
Social and Organizational Sciences), June 2007, Atlanta.
- S. Nagaraja, On a dynamic topology of covert groups, Accepted at
Sunbelt (8th European Social Network Conference, Corfu, Greece, May
2007.
- S. Nagaraja, Privacy Amplification with Social Networks, Accepted
at SPW (Security Protocols Workshop), Brno, April 2007.
- R. Anderson, T. Moore, S. Nagaraja, A. Ozment, Incentives and
Information Security, in Algorithmic Game Theory, N. Nisan,
T. Roughgarden, E. Tardos, and V. Vazirani (editors), ISBN-13:
9780521872829, Cambridge University Press, 2007.
- T. Moore, J. Clulow, R. Anderson and S. Nagaraja, New Strategies
for Revocation in Ad-Hoc Networks, Accepted at ESAS 2007 (European
Workshop on Security and Privacy in Ad hoc and Sensor Networks).
- F. L. Wong, M. Lin, S. Nagaraja, I. Wassel and F. Stajano,
Evaluation Framework of Location Privacy of Wireless Mobile Systems with
Arbitrary Beam Pattern, Accepted at CNSR (Communication Networks and Services
Research Conference), New Brunswick, Canada, May 2007.
- S. Nagaraja and R. Anderson, the topology of covert conflict,
WEIS (Workshop on the Economics of Information Security), Cambridge,
2006.
- S. Nagaraja and R. Anderson, the topology of covert conflict,
Technical Report 637, Computer Laboratory, University of Cambridge,
2005.
- S. Nagaraja and H S Madhusudhana, Time-sync independent
Kerberos Authentication Protocol
, submitted
to IETF, 2002.
Work in progress
- S. Nagaraja, Evolutionary dynamics of conflict in large-scale social
networks: An empirical study.
- S. Nagaraja and R. Anderson, Dynamic centrality: A new defense against
topological warfare.
Previous Work
I obtained my B.E. majoring in computer science from Bangalore
University in 1999. I joined the network security group at Novell
Research at Bangalore, and worked there for about four years in
various secure distributed computing projects. Some of the patents
related to those pieces of work were issued recently, which you can
see in the list above.
Personal
When not doing research work, I am usually
dabbling with my camera. I try taking pictures with cultural or
political messages. Recently, I have been doing photoshoots in wild
life reserves which has been very exciting!
I also play the
Sitar an instrument popular in North India, Pakistan and
Afganistan, and belongs to the Hindustani school of music. I belong to
the Maihar Gharana of music.The Maihar Gharana is a new instrumental
khyal gharana, born in the early 20th century, but it has had
tremendous influence on the Hindustani instrumental music in the last
fifty years.
I play tennis in the 3rd team at
Cambridge LTC, run half-marathons now and then, practise yoga and
do a bit of gymnastics at the University
Gymnastics Club