• Publications
  • Influence
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
TLDR
We proposed a three-factor anonymous authentication scheme for WSNs in Internet of Things environments, where fuzzy commitment scheme is adopted to handle the user's biometric information. Expand
  • 139
  • 12
A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things
TLDR
A user authentication protocol scheme with privacy protection for IIoT has been proposed. Expand
  • 121
  • 12
QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks
TLDR
We exploit the geographic opportunistic routing (GOR) for QoS provisioning with both end-to-end reliability and delay constraints in WSNs. Expand
  • 149
  • 11
  • PDF
An enhanced smart card based remote user password authentication scheme
TLDR
We propose a modified smart card based remote user password authentication scheme to overcome the aforementioned weaknesses. Expand
  • 210
  • 8
Adaptive resource allocation for preemptable jobs in cloud systems
TLDR
In cloud computing, computational resources are provided to remote users in the form of leases. Expand
  • 139
  • 8
Management and applications of trust in Wireless Sensor Networks: A survey
TLDR
In this paper, we present a detailed survey on various trust models that are geared towards WSNs. Expand
  • 187
  • 6
A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things
TLDR
We present a three-factor user authentication protocol for WSN to remove the weaknesses of previous protocols and compare it with other related protocols. Expand
  • 87
  • 6
A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity
TLDR
A new user anonymous authentication protocol based on WMSNs is designed so as to remove the drawbacks of the protocol of He et al. Expand
  • 66
  • 6
ZiFind: Exploiting cross-technology interference signatures for energy-efficient indoor localization
TLDR
This paper presents a new indoor localization system called ZiFind that exploits the cross-technology interference in the unlicensed 2.4 GHz frequency spectrum. Expand
  • 67
  • 6
  • PDF
Towards minimum-delay and energy-efficient flooding in low-duty-cycle wireless sensor networks
TLDR
We design a distributed Minimum-Delay Energy-efficient flooding Tree (MDET) algorithm to construct an energy optimal tree with flooding delay bounding. Expand
  • 46
  • 6
  • PDF