• Publications
  • Influence
An effective key management scheme for heterogeneous sensor networks
TLDR
In this paper, we present an effective key management scheme that takes advantage of the powerful high-end sensors in heterogeneous sensor networks. Expand
  • 459
  • 27
  • PDF
5G wireless backhaul networks: challenges and research advances
TLDR
We analyze the wireless backhaul traffic in two typical network architectures adopting small cell and millimeter wave communication technologies. Expand
  • 484
  • 21
  • PDF
A Cooperation Strategy Based on Nash Bargaining Solution in Cooperative Relay Networks
TLDR
This paper proposes a cooperation strategy among rational nodes in a wireless cooperative relaying network as an effort to solve two basic problems, i.e., when to cooperate and how to cooperate. Expand
  • 153
  • 19
Home M2M networks: Architectures, standards, and QoS improvement
TLDR
A cross-layer joint admission and rate control design is proposed for QoS-aware multimedia sharing. Expand
  • 423
  • 17
  • PDF
Internet of Things Architecture: Recent Advances, Taxonomy, Requirements, and Open Challenges
TLDR
We investigate, highlight, and report premier research advances made in IoT architecture recently. Expand
  • 287
  • 14
Inter-Group Complementary Codes for Interference-Resistant CDMA Wireless Communications
TLDR
Spreading code plays an extremely important role on the overall performance of a CDMA system. Expand
  • 60
  • 12
MeDShare: Trust-Less Medical Data Sharing Among Cloud Service Providers via Blockchain
TLDR
In this paper, we propose MeDShare, a system that addresses the issue of medical data sharing among medical big data custodians in a trust-less environment that provides data provenance, auditing, and control for shared medical data in cloud repositories among big data entities. Expand
  • 297
  • 11
Cognitive radio based hierarchical communications infrastructure for smart grid
TLDR
The current centrally controlled power grid is undergoing a drastic change in order to deal with increasingly diversified challenges, including environment and infrastructure. Expand
  • 249
  • 11
  • PDF
A survey of secure mobile Ad Hoc routing protocols
TLDR
We focus on security aspects of theMANET routing protocols with a particular focus on the security aspects. Expand
  • 364
  • 11
  • PDF
ACPN: A Novel Authentication Framework with Conditional Privacy-Preservation and Non-Repudiation for VANETs
  • J. Li, H. Lu, M. Guizani
  • Computer Science
  • IEEE Transactions on Parallel and Distributed…
  • 1 April 2015
TLDR
In Vehicular Ad hoc NETworks (VANETs), authentication is a crucial security service for both inter-vehicle and vehicle-roadside communications. Expand
  • 158
  • 11
  • PDF