[PDF][PDF] An enhanced two-factor user authentication scheme in wireless sensor networks.

D He, Y Gao, S Chan, C Chen, J Bu - Ad Hoc Sens. Wirel. Networks, 2010 - academia.edu
Designing a user authentication protocol for wireless sensor networks is a difficult task
because wireless networks are susceptible to attacks and sensor node has limited energy …

SafeQ: Secure and efficient query processing in sensor networks

F Chen, AX Liu - 2010 Proceedings IEEE INFOCOM, 2010 - ieeexplore.ieee.org
The architecture of two-tiered sensor networks, where storage nodes serve as an
intermediate tier between sensors and a sink for storing data and processing queries, has …

Collaborative enforcement of firewall policies in virtual private networks

AX Liu, F Chen - Proceedings of the twenty-seventh ACM symposium on …, 2008 - dl.acm.org
The widely deployed Virtual Private Network (VPN) technology allows roaming users to
build an encrypted tunnel to a VPN server, which henceforth allows roaming users to access …

Verifiable fine-grained top-k queries in tiered sensor networks

R Zhang, J Shi, Y Liu, Y Zhang - 2010 Proceedings IEEE …, 2010 - ieeexplore.ieee.org
Most large-scale sensor networks are expected to follow a two-tier architecture with resource-
poor sensor nodes at the lower tier and resource-rich master nodes at the upper tier. Master …

Privacy-preserving search over encrypted personal health record in multi-source cloud

X Yao, Y Lin, Q Liu, J Zhang - IEEE Access, 2018 - ieeexplore.ieee.org
Cloud-based Personal Health Record systems (CB-PHR) have great potential in facilitating
the management of individual health records. Security and privacy concerns are among the …

An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks

R Fan, D He, X Pan, L ** - Journal of Zhejiang University SCIENCE C, 2011 - Springer
Wireless sensor networks (WSNs) are vulnerable to security attacks due to their deployment
and resource constraints. Considering that most large-scale WSNs follow a two-tiered …

Top- Query Result Completeness Verification in Tiered Sensor Networks

CM Yu, GK Ni, Y Chen, E Gelenbe… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Storage nodes are expected to be placed as an intermediate tier of large scale sensor
networks for caching the collected sensor readings and responding to queries with benefits …

A digital watermarking approach to secure and precise range query processing in sensor networks

Y Yi, R Li, F Chen, AX Liu, Y Lin - 2013 Proceedings IEEE …, 2013 - ieeexplore.ieee.org
Two-tiered wireless sensor networks offer good scalability, efficient power usage, and space
saving. However, storage nodes are more attractive to attackers than sensors because they …

Securing top-k query processing in two-tiered sensor networks

X Kui, J Feng, X Zhou, H Du, X Deng, P Zhong… - Connection …, 2021 - Taylor & Francis
Integrity and privacy are two important secure matrices in cyber security. Due to the limited
resources and computing capability of the sensor nodes, it is challenging to simultaneously …

Privacy-and integrity-preserving range queries in sensor networks

F Chen, AX Liu - IEEE/ACM Transactions on Networking, 2012 - ieeexplore.ieee.org
The architecture of two-tiered sensor networks, where storage nodes serve as an
intermediate tier between sensors and a sink for storing data and processing queries, has …