OOS-SSS: An efficient online/offline subtree-based short signature scheme using Chebyshev chaotic maps for wireless sensor network

C Meshram, CC Lee, SG Meshram, A Meshram - IEEE Access, 2020 - ieeexplore.ieee.org
Wireless sensor network (WSN) is a network system that involves spatially distributed
devices such as wireless sensor nodes. As the data collected by the sensor nodes and …

DDSV: Optimizing delay and delivery ratio for multimedia big data collection in mobile sensing vehicles

T Li, S Tian, A Liu, H Liu, T Pei - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
The large number of mobile-sensing vehicles traveling in cities offer a novel solution to the
collection of vast amounts of multimedia data packets. When a vehicle passes through the …

[PDF][PDF] A Secure and Efficient One-time Password Authentication Scheme for WSN.

CH Ling, CC Lee, CC Yang, MS Hwang - Int. J. Netw. Secur., 2017 - academia.edu
An algorithm that a user has authenticated over remote devices should be designed to
consider the limitations of computation and lower power in a wireless sensor networks …

Efficient online/offline IBSS protocol using partial discrete logarithm for WSNs

C Meshram, PL Powar, MS Obaidat, CC Lee… - IET …, 2018 - Wiley Online Library
An online/offline identity‐based short signature (IBSS) protocol permits the signer to produce
an online IBSS in real time from a precomputed offline IBSS when given a record. Such …

Marine observation beacon clustering and recycling technology based on wireless sensor networks

Z Zhang, S Qi, S Li - Sensors, 2019 - mdpi.com
Monitoring of marine polluted areas is an emergency task, where efficiency and low-power
consumption are challenging for the recovery of marine monitoring equipment. Wireless …

Adaptive energy-efficient target detection based on mobile wireless sensor networks

T Zou, Z Li, S Li, S Lin - Sensors, 2017 - mdpi.com
Target detection is a widely used application for area surveillance, elder care, and fire
alarms; its purpose is to find a particular object or event in a region of interest. Usually, fixed …

A secure three party node authentication and key establishment scheme for the Internet of Things environment

CT Li, CC Lee, CY Weng - Journal of Internet Technology, 2018 - jit.ndhu.edu.tw
Secure three party node authentication and key establishment scheme for data exchange in
the Internet of Things (IoT) applications enables two resourceconstrained nodes to establish …

Packet scheduling algorithm to improvise the packet delivery ratio in mobile ad hoc networks

S Kurumbanshi, S Rathkanthiwar, S Patil - Proceedings of Second …, 2022 - Springer
Due to recent advances in wireless communications technologies and its changing demand
in mobile ad hoc networks, it is needed to design energy efficient network. These networks …

[PDF][PDF] Abnormal Traffic Detection Scheme Based on RBF Fuzzy Neural Network and Attention Mechanism in Robot Environment

J Liu, Z Hao, J Wang, X Zhang - International Journal of Network …, 2023 - ijns.jalaxy.com.tw
The rapid increase in terminal devices in the robot environment has brought many security
risks. Detecting abnormal traffic efficiently has become an essential task in robot safety …

[PDF][PDF] An Efficient Confidentiality Preserving Scheme Using Certificateless Encryption with High Trust Level.

R Guo, H Shi - Int. J. Netw. Secur., 2018 - ijns.jalaxy.com.tw
Certificateless public key cryptography with bilinear pairing needs costly operations, which
is not appropriate for a practical application. In this paper, we present a certificateless public …