AKM-IoV: Authenticated key management protocol in fog computing-based Internet of vehicles deployment

M Wazid, P Bagga, AK Das, S Shetty… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
Internet of Vehicles (IoV) is an intelligent application of Internet of Things (IoT) in smart
transportation that takes intelligent commitments to the passengers to improve traffic safety …

Edge-computing-based trustworthy data collection model in the internet of things

T Wang, L Qiu, AK Sangaiah, A Liu… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
It is generally accepted that the edge computing paradigm is regarded as capable of
satisfying the resource requirements for the emerging mobile applications such as the …

Crowdsourcing mechanism for trust evaluation in CPCS based on intelligent mobile edge computing

T Wang, H Luo, X Zheng, M **e - ACM Transactions on Intelligent …, 2019 - dl.acm.org
Both academia and industry have directed tremendous interest toward the combination of
Cyber Physical Systems and Cloud Computing, which enables a new breed of applications …

Data collection in underwater sensor networks based on mobile edge computing

S Cai, Y Zhu, T Wang, G Xu, A Liu, X Liu - IEEE Access, 2019 - ieeexplore.ieee.org
With the rapid developments in edge devices and wireless technologies, the underwater
wireless sensor networks (UWSNs) are in the process of vigorous development. In UWSNs …

An incentive-based protection and recovery strategy for secure big data in social networks

Y Wu, H Huang, N Wu, Y Wang, MZA Bhuiyan… - Information Sciences, 2020 - Elsevier
Big data sources, such as smart vehicles, IoT devices, and sensor networks, differ from
traditional data sources in both output volume and variety. Big data is usually stored on …

A risk defense method based on microscopic state prediction with partial information observations in social networks

YK Wu, H Huang, Q Wu, A Liu, T Wang - Journal of Parallel and Distributed …, 2019 - Elsevier
The development of network science has led to an increase in the size and user number of
social networks. Messages (eg, rumors, leaked user information) will quickly spread to social …

A queuing delay utilization scheme for on-path service aggregation in services-oriented computing networks

M Huang, W Liu, T Wang, H Song, X Li, A Liu - IEEE Access, 2019 - ieeexplore.ieee.org
In services-oriented computing networks, packets in the process of routing to a data center
must wait for a sufficient amount of data before service aggregation to reduce the network …

Robust authenticated key agreement protocol for internet of vehicles-envisioned intelligent transportation system

S Thapliyal, M Wazid, DP Singh, AK Das… - Journal of Systems …, 2023 - Elsevier
Abstract Internet of Vehicles (IoV) is a wireless network, which employs well-established
Internet protocols and networks to share information between vehicles, people, and …

Delay and energy-efficient data collection scheme-based matrix filling theory for dynamic traffic IoT

X **ang, W Liu, T Wang, M **e, X Li, H Song… - EURASIP Journal on …, 2019 - Springer
Data collection is the basic functions of the Internet of Things (IoT), in which the sensed data
are concentrations from sensor nodes to the sink, with a timely style, so the smart response …

To reduce delay, energy consumption and collision through optimization duty-cycle and size of forwarding node set in WSNs

F Wang, W Liu, T Wang, M Zhao, M **e, H Song… - IEEE …, 2019 - ieeexplore.ieee.org
Fast and energy efficient transmission is an important and challenging issue for wireless
sensor networks (WSNs). Energy efficiency is also an important concern of green …