A survey on wireless wearable body area networks: A perspective of technology and economy

DS Bhatti, S Saleem, A Imran, Z Iqbal, A Alzahrani… - Sensors, 2022 - mdpi.com
The deployment of wearable or body-worn devices is increasing rapidly, and thus
researchers' interests mainly include technical and economical issues, such as networking …

Wireless communication and security issues for cyber–physical systems and the Internet-of-Things

A Burg, A Chattopadhyay, KY Lam - Proceedings of the IEEE, 2017 - ieeexplore.ieee.org
Wireless sensors and actuators connected by the Internet-of-Things (IoT) are central to the
design of advanced cyber-physical systems (CPSs). In such complex, heterogeneous …

Autonomous vehicle: Security by design

A Chattopadhyay, KY Lam… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Security of (semi)-autonomous vehicles is a growing concern, first, due to the increased
exposure of the functionality to potential attackers; second, due to the reliance of …

Secure and efficient data transmission for cluster-based wireless sensor networks

H Lu, J Li, M Guizani - IEEE transactions on parallel and …, 2013 - ieeexplore.ieee.org
Secure data transmission is a critical issue for wireless sensor networks (WSNs). Clustering
is an effective and practical way to enhance the system performance of WSNs. In this paper …

An efficient and safe road condition monitoring authentication scheme based on fog computing

M Cui, D Han, J Wang - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
In recent years, with the development of intelligent vehicles and wireless sensor network
technology, the research on road safety has attracted much attention in vehicular ad-hoc …

You think, therefore you are: Transparent authentication system with brainwave-oriented bio-features for IoT networks

L Zhou, C Su, W Chiu, KH Yeh - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The Internet-of-Things (IoT) is an evolutionary paradigm seamlessly integrating an
enormous number of smart objects within the Internet. Recently, with the rapid growth and …

Time-based direct revocable ciphertext-policy attribute-based encryption with short revocation list

JK Liu, TH Yuen, P Zhang, K Liang - … ACNS 2018, Leuven, Belgium, July 2 …, 2018 - Springer
In this paper, we propose an efficient revocable Ciphertext-Policy Attribute-Based Encryption
(CP-ABE) scheme. We base on the direct revocation approach, by embedding the …

Enhanced-AES encryption mechanism with S-box splitting for wireless sensor networks

M Gupta, A Sinha - International Journal of Information Technology, 2021 - Springer
The sensor networks have revolutionized wireless technology with next-generation
internetworking and scalable infrastructure. Since, the autonomous sensor operates in …

Efficient identity-based online/offline encryption and signcryption with short ciphertext

J Lai, Y Mu, F Guo - International Journal of Information Security, 2017 - Springer
The technique of online/offline is regarded as a promising approach to speed up the
computation of encryption, because the most part of computation, such as pairing over …

Gaussian sampling in lattice-based cryptography

T Prest - 2015 - theses.hal.science
Although rather recent, lattice-based cryptography has stood out on numerous points, be it
by the variety of constructions that it allows, by its expected resistance to quantum …