Learn More
—Normally, authentication in vehicular ad-hoc networks (VANETs) uses Public Key Infrastructure (PKI) to verify the integrity of messages and the identity of message senders. The issues considered in the authentication schemes include the level of security and computational efficiency in verification processes. Most existing schemes focus mainly on assuring(More)
Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients' full control over their PHI, we propose a fine-grained(More)
The EPC Class-1 Generation-2 specification(Gen-2 in brief) is widely accepted as the standard for RFID tags under grant number ISO18000-6c. However, there are two problems in view of its security authentication protocols. First of all, there is no unified standard for the security requirements, such as which threats should be protected against. Secondly,(More)
—Mobile nodes in the Internet of things often move from one cluster to another, in which cryptography based protocols are required to provide rapid identification authentication and privacy protection. A single-step protocol was presented for the occasion that the mobile node joins a new cluster. The presented protocol contains a valid request message and(More)
Addressing security and privacy issues is a prerequisite for market-ready Vehicular Ad Hoc Networks. In this paper, an anonymous batch authentication scheme is proposed to authenticate multiple requests sent from different vehicles at the same time. The scheme achieves privacy-preserving by pseudonyms, ensures the backward privacy of the revoked vehicles by(More)
The cloud-assisted Body Sensor Networks (BSN) often has an architecture of Multi-hop Wireless Networks (MWN) model, in which both the body sensors and the users must be secure to protect the whole infrastructure. Unfortunately, both the information providers and the users are movable and resource-constrained in communication and computation. Thus some new(More)
Development of theory and technology of wireless sensor network (WSN) has made it possible to satisfy the new demand for location-based services such as location based access control. However, most of existing techniques do not take into account the security of location estimate of some access node whose goal would be to try to confuse the localization(More)
The research of message certification in Vehicular Ad Hoc Networks (VANETs) has been focused on two aspects. One is the On Board Unit (OBU) certificates with Road Side Unit (RSU) one by one, and another is RSU goes to the batch certification after it collects a certain number of vehicle's messages. However, when the number of messages received by RSU is(More)