An identity-based security system for user privacy in vehicular ad hoc networks

J Sun, C Zhang, Y Zhang, Y Fang - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
Vehicular ad hoc network (VANET) can offer various services and benefits to users and thus
deserves deployment effort. Attacking and misusing such network could cause destructive …

Location-based compromise-tolerant security mechanisms for wireless sensor networks

Y Zhang, W Liu, W Lou, Y Fang - IEEE Journal on selected …, 2006 - ieeexplore.ieee.org
Node compromise is a serious threat to wireless sensor networks deployed in unattended
and hostile environments. To mitigate the impact of compromised nodes, we propose a suite …

Secure and efficient data communication protocol for wireless body area networks

C Hu, H Li, Y Huo, T **ang… - IEEE Transactions on multi …, 2016 - ieeexplore.ieee.org
Wireless Body Area Networks (WBANs) are expected to play a major role in the field of
patient-health monitoring in the near future, which gains tremendous attention amongst …

Body area network security: a fuzzy attribute-based signcryption scheme

C Hu, N Zhang, H Li, X Cheng… - IEEE journal on selected …, 2013 - ieeexplore.ieee.org
Body Area Networks (BANs) are expected to play a major role in the field of patient-health
monitoring in the near future. While it is vital to support secure BAN access to address the …

On broadcast authentication in wireless sensor networks

K Ren, W Lou, K Zeng, PJ Moran - IEEE Transactions on …, 2007 - ieeexplore.ieee.org
Broadcast authentication is a critical security service in wireless sensor networks (WSNs),
since it enables users to broadcast the WSN in an authenticated way. Symmetric key based …

MDPA: multidimensional privacy‐preserving aggregation scheme for wireless sensor networks

X Lin, R Lu, X Shen - Wireless Communications and Mobile …, 2010 - Wiley Online Library
In this paper, we propose a novel multidimensional privacy‐preserving data aggregation
scheme for improving security and saving energy consumption in wireless sensor networks …

A pairing-based user authentication scheme for wireless clients with smart cards

YM Tseng, TY Wu, JD Wu - Informatica, 2008 - content.iospress.com
With rapid growth of mobile wireless networks, handheld devices are popularly used by
people and many mobile applications have been rapidly developed. Considering the limited …

High efficient key-insulated attribute based encryption scheme without bilinear pairing operations

H Hong, Z Sun - SpringerPlus, 2016 - Springer
Attribute based encryption (ABE) has been widely applied for secure data protection in
various data sharing systems. However, the efficiency of existing ABE schemes is not high …

A secure authentication and billing architecture for wireless mesh networks

Y Zhang, Y Fang - Wireless Networks, 2007 - Springer
Wireless mesh networks (WMNs) are gaining growing interest as a promising technology for
ubiquitous high-speed network access. While much effort has been made to address issues …

ECS‐CP‐ABE: A lightweight elliptic curve signcryption scheme based on ciphertext‐policy attribute‐based encryption to secure downlink multicast communication in …

S Khasawneh, M Kadoch - Transactions on Emerging …, 2021 - Wiley Online Library
As an integral part of the smart grid, advanced metering infrastructure (AMI) implements two‐
way communication to enable the smart grid achieving the desired performance …