Liangmin Wang

Learn More
—Normally, authentication in vehicular ad-hoc networks (VANETs) uses Public Key Infrastructure (PKI) to verify the integrity of messages and the identity of message senders. The issues considered in the authentication schemes include the level of security and computational efficiency in verification processes. Most existing schemes focus mainly on assuring(More)
—Mobile nodes in the Internet of things often move from one cluster to another, in which cryptography based protocols are required to provide rapid identification authentication and privacy protection. A single-step protocol was presented for the occasion that the mobile node joins a new cluster. The presented protocol contains a valid request message and(More)
The cloud-assisted Body Sensor Networks (BSN) often has an architecture of Multi-hop Wireless Networks (MWN) model, in which both the body sensors and the users must be secure to protect the whole infrastructure. Unfortunately, both the information providers and the users are movable and resource-constrained in communication and computation. Thus some new(More)