• Publications
  • Influence
UAV-Enabled Intelligent Transportation Systems for the Smart City: Applications and Challenges
TLDR
This article describes the possible ITS applications that can use UAVs and highlights the potential and challenges for UAV-enabled ITS for next-generation smart cities. Expand
  • 299
  • 9
A Survey on Homomorphic Encryption Schemes
TLDR
We present Homomorphic Encryption (HE), a special kind of encryption scheme which allows any third party to operate on the encrypted data without decrypting it in advance. Expand
  • 124
  • 7
  • PDF
Drones for smart cities: Issues in cybersecurity, privacy, and public safety
TLDR
It is expected that drones will take a major role in the connected smart cities of the future. Expand
  • 106
  • 7
  • PDF
Peek-a-boo: i see your smart home activities, even encrypted!
TLDR
A myriad of IoT devices such as bulbs, switches, speakers in a smart home environment allow users to easily control the physical world around them and facilitate their living styles through the sensors already embedded in these devices. Expand
  • 51
  • 6
  • PDF
VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks
TLDR
We introduce an energy-efficient Virtual Energy-Based Encryption and Keying (VEBEK) scheme for WSNs that significantly reduces the number of transmissions needed for rekeying to avoid stale keys. Expand
  • 59
  • 6
  • PDF
A Survey on Smart Grid Cyber-Physical System Testbeds
TLDR
An increasing interest is emerging on the development of smart grid cyber-physical system testbeds. Expand
  • 152
  • 5
Sensitive Information Tracking in Commodity IoT
TLDR
In this paper, we present SainT, a static taint analysis tool for IoT applications. Expand
  • 88
  • 5
  • PDF
Block4Forensic: An Integrated Lightweight Blockchain Framework for Forensics Applications of Connected Vehicles
TLDR
We propose a permissioned blockchain framework among the various elements involved to manage the collected vehicle-related data. Expand
  • 95
  • 4
  • PDF
Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks
TLDR
This work addresses the challenges with the traditional approach to securing sensor networks and presents a comprehensive framework, Di-Sec, that defends against all known and forthcoming attacks. Expand
  • 32
  • 4
  • PDF
MACA: A privacy-preserving multi-factor cloud authentication system utilizing big data
TLDR
We present a privacy-preserving multi-factor authentication system utilizing the features of big data called MACA. Expand
  • 32
  • 3
  • PDF