Privacy-preserving content dissemination for vehicular social networks: Challenges and solutions
Vehicular social networks (VSNs), viewed as the integration of traditional vehicular networks
and social networks, are promising communication platforms based on the development of …
and social networks, are promising communication platforms based on the development of …
A range-based secure localization algorithm for wireless sensor networks
The accurate localization of nodes in wireless sensor networks can be jeopardized in certain
applications of fields, such as those in security and military. In order to detect the nodes that …
applications of fields, such as those in security and military. In order to detect the nodes that …
Secure location of things (SLOT): Mitigating localization spoofing attacks in the Internet of Things
The rise of geo-spatial location-based applications for the Internet of Things introduces new
location spoofing security risks. To overcome the threat of malicious spoofing attacks, we …
location spoofing security risks. To overcome the threat of malicious spoofing attacks, we …
Geo-spatial location spoofing detection for Internet of Things
We develop a new location spoofing detection algorithm for geo-spatial tagging and location-
based services in the Internet of Things (IoT), called enhanced location spoofing detection …
based services in the Internet of Things (IoT), called enhanced location spoofing detection …
TRAST: Trust-based distributed topology management for wireless multimedia sensor networks
A distributed topology management scheme in wireless multimedia sensor networks
(WMSNs) ensures coverage of an event, prolongs network lifetime, and maintains …
(WMSNs) ensures coverage of an event, prolongs network lifetime, and maintains …
A non-cooperative non-zero-sum game-based dependability assessment of heterogeneous WSNs with malware diffusion
Abstract We consider Heterogeneous Wireless Sensor Networks (HWSNs) with malware
diffusion and find a solution to assess their dependability in order to guarantee dependable …
diffusion and find a solution to assess their dependability in order to guarantee dependable …
Lightweight secure localization approach in wireless sensor networks
This paper is concerned with the security problem of Time of Arrival (ToA) based localization
schemes in a wireless sensor network (WSN) with multiple attackers and this paper focuses …
schemes in a wireless sensor network (WSN) with multiple attackers and this paper focuses …
Towards security joint trust and game theory for maximizing utility: challenges and countermeasures
L Huang, G Jia, W Fang, W Chen, W Zhang - Sensors, 2019 - mdpi.com
The widespread application of networks is providing a better platform for the development of
society and technology. With the expansion of the scope of network applications, many …
society and technology. With the expansion of the scope of network applications, many …
Reliability evaluation for clustered WSNs under malware propagation
We consider a clustered wireless sensor network (WSN) under epidemic-malware
propagation conditions and solve the problem of how to evaluate its reliability so as to …
propagation conditions and solve the problem of how to evaluate its reliability so as to …
Modeling IoT-based solutions using human-centric wireless sensor networks
The Internet of Things (IoT) has inspired solutions that are already available for addressing
problems in various application scenarios, such as healthcare, security, emergency support …
problems in various application scenarios, such as healthcare, security, emergency support …