Secure multifactor authenticated key agreement scheme for industrial IoT

R Vinoth, LJ Deborah, P Vijayakumar… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
The application of Internet of Things (IoT) has generally penetrated into people's life and
become popular in recent years. The IoT devices with different functions are integrated and …

B-TSCA: Blockchain assisted trustworthiness scalable computation for V2I authentication in VANETs

C Wang, J Shen, JF Lai, J Liu - IEEE Transactions on Emerging …, 2020 - ieeexplore.ieee.org
The rapid development of 5G networks has made smart driving possible. The vehicular ad-
hoc networks (VANETs) are the main environment for smart driving, providing road …

Secure real-time traffic data aggregation with batch verification for vehicular cloud in VANETs

J Shen, D Liu, X Chen, J Li, N Kumar… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
The vehicular cloud provides many significant advantages to Vehicular ad-hoc Networks
(VANETs), such as unlimited storage space, powerful computing capability and timely traffic …

Secure routing with multi-watchdog construction using deep particle convolutional model for IoT based 5G wireless sensor networks

S Rajasoundaran, AV Prabu, S Routray… - Computer …, 2022 - Elsevier
Fifth Generation (5G) security principles are widely expected with effective cryptography
models, information security models, Machine Learning (ML) based Intrusion Detection …

An efficient and certificateless conditional privacy-preserving authentication scheme for wireless body area networks big data services

S Ji, Z Gui, T Zhou, H Yan, J Shen - IEEE Access, 2018 - ieeexplore.ieee.org
To gurantee the security and privacy of the patient's physiological data in wirelss body area
networks (WBANs), it is important to secure the communication between the personal digital …

[PDF][PDF] Improved Energy Based Multi-Sensor Object Detection in Wireless Sensor Networks.

T Palanisamy, D Alghazzawi… - … Automation & Soft …, 2022 - pdfs.semanticscholar.org
Wireless Sensor Networks (WSNs) are spatially distributed to independent sensor networks
that can sense physical characteristics such as temperature, sound, pressure, energy, and …

Efficient data integrity auditing with corrupted data recovery for edge computing in enterprise multimedia security

D Liu, J Shen, P Vijayakumar, A Wang… - Multimedia Tools and …, 2020 - Springer
Enterprise multimedia can provide various services for enterprises and staffs, such as
minutes of the meeting, staff training and internal news release. The format of enterprise …

Detecting false data injection attacks using canonical variate analysis in power grid

C Pei, Y Xiao, W Liang, X Han - IEEE Transactions on Network …, 2020 - ieeexplore.ieee.org
With the knowledge of the measurement configuration and the topology structure of a power
system, attackers can launch false data injection attacks (FDIAs) without detection by …

Secure big data communication for energy efficient intra-cluster in WSNs

A Wang, J Shen, P Vijayakumar, Y Zhu, L Tian - Information Sciences, 2019 - Elsevier
Big data communications in wireless sensor networks (WSNs) play a very important role in
the energy efficiency and lifetime of routing schemes. Nowadays, multi-hop path routing …

Data aggregation in heterogeneous wireless sensor networks by using local tree reconstruction algorithm

Z Zhang, J Li, X Yang - Complexity, 2020 - Wiley Online Library
Aiming at the transmission of heterogeneous data in heterogeneous networks, a topology
optimization algorithm of heterogeneous wireless sensor networks based on local tree …