• Publications
  • Influence
A survey of key management schemes in wireless sensor networks
This paper provides a survey of key management schemes in wireless sensor networks and notices that no key distribution technique is ideal to all the scenarios where sensor networks are used; therefore the techniques employed must depend upon the requirements of target applications and resources of each individual sensor network. Expand
An effective key management scheme for heterogeneous sensor networks
This paper presents an effective key management scheme that takes advantage of the powerful high-end sensors in heterogeneous sensor networks and provides better security with low complexity and significant reduction on storage requirement, compared with existing key management schemes. Expand
Refinements on IEEE 802.11 Distributed Coordination Function Modeling Approaches
A new backoff decrement model is proposed that retains the simplicity of traditional DCF models while being able to take into account such a correlation between consecutive channel slots and statistical homogeneity. Expand
Security and Privacy in Cloud Computing
The authors obtain a common goal to provide a comprehensive review of the existing security and privacy issues in cloud environments to present the relationships among them, the vulnerabilities that may be exploited by attackers, the threat models, as well as existing defense strategies in a cloud scenario. Expand
Secure data aggregation in wireless sensor networks: A comprehensive overview
The relationship between security and data aggregation process in wireless sensor networks is investigated and a taxonomy of secure data aggregation protocols is given by surveying the current ''state-of-the-art'' work in this area. Expand
Home M2M networks: Architectures, standards, and QoS improvement
The architecture of home M2M networks decomposed into three subareas depending on the radio service ranges and potential applications is presented, and cross-layer joint admission and rate control design is reported for QoS-aware multimedia sharing. Expand
Authentication and Access Control in the Internet of Things
  • Jing Liu, Yang Xiao, C. Chen
  • Computer Science
  • 32nd International Conference on Distributed…
  • 18 June 2012
This paper mainly analyzes existing authentication and access control methods, and then, it designs a feasible one for the Internet of Things. Expand
Cyber Security and Privacy Issues in Smart Grids
In order to build a reliable smart grid, an overview of relevant cyber security and privacy issues is presented and several potential research fields are discussed at the end of this paper. Expand
Internet Protocol Television (IPTV): The Killer Application for the Next-Generation Internet
To deploy IPTV services with a full quality of service (QoS) guarantee, many underlying technologies must be further studied. Expand
Distributed Collaborative Control for Industrial Automation With Wireless Sensor and Actuator Networks
This paper proposes and evaluates a new distributed estimation and collaborative control scheme for industrial control systems with WSANs and shows that the proposed method effectively achieves control objectives and maintains robust against inaccurate system parameters. Expand