Fault-tolerant and scalable key management for smart grid
D Wu, C Zhou - IEEE Transactions on Smart Grid, 2011 - ieeexplore.ieee.org
In this paper, we study the problem of secure key management for smart grid. Since existing
key management schemes are not suitable for deployment in smart grid, in this paper, we …
key management schemes are not suitable for deployment in smart grid, in this paper, we …
A proxy signature-based swarm drone authentication with leader selection in 5G networks
Drones are imperative for the 5G architecture as a mobile source to expand network
coverage and support seamless services, particularly through enabling device-to-device …
coverage and support seamless services, particularly through enabling device-to-device …
An efficient mobile authentication scheme for wireless networks
C Tang, DO Wu - IEEE Transactions on Wireless …, 2008 - ieeexplore.ieee.org
This paper proposes an efficient authentication scheme, which is suitable for low-power
mobile devices. It uses an elliptic-curve-eryptosystem based trust delegation mechanism to …
mobile devices. It uses an elliptic-curve-eryptosystem based trust delegation mechanism to …
On the IEEE 802.11 i security: a denial‐of‐service perspective
The IEEE 802.11 i standard provides authentication and security at the Medium Access
Control layer in wireless local area networks (WLANs). It involves an authentication process …
Control layer in wireless local area networks (WLANs). It involves an authentication process …
Time-bound anonymous authentication for roaming networks
We propose an anonymous authentication protocol that supports time-bound credentials for
an efficient revocation. It is especially suitable for large-scale network in roaming scenario …
an efficient revocation. It is especially suitable for large-scale network in roaming scenario …
Detecting and Reducing the Denial of Service attacks in WLANs
Wireless LANs are susceptible to Denial of Service (DoS) attacks. None of the existing
wireless security protocols considers protection against them. We propose a novel scheme …
wireless security protocols considers protection against them. We propose a novel scheme …
A proxy signature-based drone authentication in 5G D2D networks
5G is the beginning of a new era in cellular communication, bringing up a highly connected
network with the incorporation of the Internet of Things (IoT). To flexibly operate all the IoT …
network with the incorporation of the Internet of Things (IoT). To flexibly operate all the IoT …
An anonymous and self-verified mobile authentication with authenticated key agreement for large-scale wireless networks
Increasing numbers of mobile users are being allowed to use wireless networks, and
universal access is being promoted. In the absent of a single, trusted authentication server, it …
universal access is being promoted. In the absent of a single, trusted authentication server, it …
Mobile privacy in wireless networks-revisited
C Tang, DO Wu - IEEE Transactions on Wireless …, 2008 - ieeexplore.ieee.org
With the widespread use of mobile devices, the privacy of mobile location information
becomes an important issue. In this paper, we present the requirements on protecting …
becomes an important issue. In this paper, we present the requirements on protecting …
Secure delegation-based authentication protocol for wireless roaming service
JL Tsai, NW Lo, TC Wu - IEEE Communications Letters, 2012 - ieeexplore.ieee.org
Portable devices, with wireless communication capability, are used widely in everyday life.
Preventing personal sensitive information from being revealed to an adversary through …
Preventing personal sensitive information from being revealed to an adversary through …