A secure and anonymous communicate scheme over the internet of things

Q Sun, K Lin, C Si, Y Xu, S Li, P Gope - ACM Transactions on Sensor …, 2022 - dl.acm.org
Anonymous exchange of data has a strong demand in many scenarios. With the
development of IoT and wireless networks, plenty of smart devices are interconnected …

Systematic literature review on the state of the art and future research work in anonymous communications systems

MA Nia, A Ruiz-Martinez - Computers & electrical engineering, 2018 - Elsevier
Privacy is an important research topic due to its implications in society. Among the topics
covered by privacy, we can highlight how to establish anonymous communications. During …

Fundamentals of physical layer anonymous communications: Sender detection and anonymous precoding

Z Wei, F Liu, C Masouros… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In the era of big data, anonymity is recognized as an important attribute in privacy-preserving
communications. The existing anonymous authentication and routing designs are applied at …

Physical layer anonymous precoding: The path to privacy-preserving communications

Z Wei, C Masouros, HV Poor… - IEEE Wireless …, 2022 - ieeexplore.ieee.org
Next-generation systems aim to increase both the speed and responsiveness of wireless
communications while supporting compelling applications such as edge-cloud computing …

PHY Layer Anonymous Precoding: Sender Detection Performance and Diversity-Multiplexing Tradeoff

Z Wei, C Masouros, X Zhu, P Wang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Departing from traditional data security-oriented designs, the aim of anonymity is to conceal
the transmitters' identities during communications to all possible receivers. In this work, joint …

Polynomial Vault: A secure and robust fingerprint based authentication

SS Ali, II Ganapathi, S Mahyo… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Fingerprint matching is one of the extensively used tools to authenticate users. It has been
accepted by governments of various countries to authenticate their citizens. The common …

Physical layer anonymous precoding design: From the perspective of anonymity entropy

Z Wei, C Masouros, P Wang, X Zhu… - IEEE Journal on …, 2022 - ieeexplore.ieee.org
In the era of e-Health, privacy protection has become imperative in applications that carry
personal and sensitive data. Departing from the data-perturbation based privacy-preserving …

Road-to-vehicle communications with time-dependent anonymity: A lightweight construction and its experimental results

K Emura, T Hayashi - IEEE Transactions on Vehicular …, 2017 - ieeexplore.ieee.org
This paper describes techniques that enable vehicles to collect local information (such as
road conditions and traffic information) and report it via road-to-vehicle communications. To …

Joint Autonomous Underwater Vehicle Trajectory and Energy Optimization for Underwater Covert Communications

J Chen, J Wang, Z Wei, Y Ren… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Underwater covert communication (UCC) technology can prevent legitimate transmission
from being intercepted upon by potential eavesdroppers while ensuring a certain rate at the …

Online/Offline and History Indexing Identity-Based Fuzzy Message Detection

Z Wang, F Liu, S Yiu, L Lan - IEEE Transactions on Information …, 2023 - ieeexplore.ieee.org
Fuzzy message detection is a novel cryptographic primitive in which the remote storage
cloud can help the client carry out fuzzy detections with some false-positive rate. This …