• Publications
  • Influence
A survey of key management schemes in wireless sensor networks
TLDR
This paper provides a survey of key management schemes in wireless sensor networks and notices that no key distribution technique is ideal to all the scenarios where sensor networks are used; therefore the techniques employed must depend upon the requirements of target applications and resources of each individual sensor network. Expand
An effective key management scheme for heterogeneous sensor networks
TLDR
This paper presents an effective key management scheme that takes advantage of the powerful high-end sensors in heterogeneous sensor networks and provides better security with low complexity and significant reduction on storage requirement, compared with existing key management schemes. Expand
MeDShare: Trust-Less Medical Data Sharing Among Cloud Service Providers via Blockchain
TLDR
The proposed MeDShare system is blockchain-based and provides data provenance, auditing, and control for shared medical data in cloud repositories among big data entities and employs smart contracts and an access control mechanism to effectively track the behavior of the data. Expand
Internet Protocol Television (IPTV): The Killer Application for the Next-Generation Internet
TLDR
To deploy IPTV services with a full quality of service (QoS) guarantee, many underlying technologies must be further studied. Expand
Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks
TLDR
This paper presents a secure and efficient routing protocol for HSNs - two tier secure routing (TTSR) that takes advantage of powerful high-end sensors in an HSN and demonstrates that TTSR can defend typical attacks on sensor routing. Expand
Cognitive femtocell networks: an opportunistic spectrum access for future indoor wireless coverage
TLDR
A joint opportunistic interference avoidance scheme with Gale-Shapley spectrum sharing (GSOIA) based on the interweave paradigm to mitigate both tier interferences in macro/femto heterogeneous networks. Expand
Defending Resource Depletion Attacks on Implantable Medical Devices
TLDR
This research identifies a new kind of attacks on IMDs -Resource Depletion (RD) attacks that could deplete IMD resources (e.g., battery power) quickly and designs a novel Support Vector Machine (SVM) based scheme to address the RD attacks. Expand
Cross-App Interference Threats in Smart Homes: Categorization, Detection and Handling
TLDR
This work systematically categorizes Cross-App Interference threats and encode them using satisfiability modulo theories (SMT), and presents HomeGuard, a system for detecting and handling CAI threats in real deployments. Expand
A Routing-Driven Key Management Scheme for Heterogeneous Sensor Networks
TLDR
A novel routing-driven key management scheme, which only establishes shared keys for neighbor sensors that may communicate with each other, which can provide better security with significant saving on sensor storage space and energy consumption than some existing key management schemes. Expand
Achieving Efficient and Secure Data Acquisition for Cloud-Supported Internet of Things in Smart Grid
TLDR
An efficient and secure data acquisition scheme based on ciphertext policy attribute-based encryption that can fulfill the security requirements of the Cloud-IoT in smart grid and effectively reduce the time cost compared with other popular approaches. Expand
...
1
2
3
4
5
...