Search For:

Displaying 1-13 out of 13 total
Distributed Privacy-Preserving Access Control in Sensor Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Rui Zhang,Yanchao Zhang,Kui Ren
Issue Date:August 2012
pp. 1427-1438
The owner and users of a sensor network may be different, which necessitates privacy-preserving access control. On the one hand, the network owner need enforce strict access control so that the sensed data are only accessible to users willing to pay. On th...
 
LR-Seluge: Loss-Resilient and Secure Code Dissemination in Wireless Sensor Networks
Found in: Distributed Computing Systems, International Conference on
By Rui Zhang, Yanchao Zhang
Issue Date:June 2011
pp. 497-506
Code dissemination in wireless sensor networks refers to the process of disseminating a new code image via wireless links to all sensor nodes after they are deployed. It is desirable and often necessary due to the need for, e.g., removing program bugs and ...
 
JR-SND: Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks
Found in: Distributed Computing Systems, International Conference on
By Rui Zhang, Yanchao Zhang, Xiaoxia Huang
Issue Date:June 2011
pp. 529-538
Secure neighbor discovery is fundamental to mobile ad hoc networks (MANETs) deployed in hostile environments and refers to the process in which two neighboring nodes exchange messages to discover and authenticate each other. It is vulnerable to the jamming...
 
A Coverage Inference Protocol for Wireless Sensor Networks
Found in: IEEE Transactions on Mobile Computing
By Chi Zhang, Yanchao Zhang, Yuguang Fang
Issue Date:June 2010
pp. 850-864
After a wireless sensor network (WSN) is deployed, sensor nodes are usually left unattended for a long period of time. There is an inevitable devolution of the connected coverage of the WSN due to battery exhaustion of sensor nodes, intended physical destr...
 
An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fang
Issue Date:September 2010
pp. 1227-1239
Vehicular ad hoc network (VANET) can offer various services and benefits to users and thus deserves deployment effort. Attacking and misusing such network could cause destructive consequences. It is therefore necessary to integrate security requirements in...
 
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
Found in: IEEE Transactions on Dependable and Secure Computing
By Jinyuan Sun,Chi Zhang,Yanchao Zhang,Yuguang Fang
Issue Date:March 2011
pp. 295-307
Anonymity has received increasing attention in the literature due to the users' awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network services without being traced. While anonymity-related issues have been extensivel...
 
Defending Against Physical Destruction Attacks on Wireless Sensor Networks
Found in: MILCOM
By Chi Zhang, Yanchao Zhang, Yuguang Fang
Issue Date:October 2006
pp. 1-7
In order to defeat physical destruction attacks on wireless sensor networks, the base station (BS) need have the ability to continuously self-monitor the change of the WSN's coverage performance. In this paper, we propose a secure coverage inference protoc...
 
PEACE: A Novel Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Kui Ren, Shucheng Yu, Wenjing Lou, Yanchao Zhang
Issue Date:February 2010
pp. 203-215
Recently, multihop wireless mesh networks (WMNs) have attracted increasing attention and deployment as a low-cost approach to provide broadband Internet access at metropolitan scale. Security and privacy issues are of most concern in pushing the success of...
 
LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks
Found in: IEEE Transactions on Mobile Computing
By Kui Ren, Wenjing Lou, Yanchao Zhang
Issue Date:May 2008
pp. 585-598
Providing desirable data security, i.e., confidentiality, authenticity and availability, in wireless sensor networks (WSNs) is challenging, as WSNs usually consist of a large number of resource constraint sensor nodes, deployed in unattended/hostile enviro...
 
A Fine-Grained Reputation System for Reliable Service Selection in Peer-to-Peer Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Yanchao Zhang, Yuguang Fang
Issue Date:August 2007
pp. 1134-1145
Distributed peer-to-peer (P2P) applications have been gaining momentum recently. In such applications, all participants are equal peers simultaneously functioning as both clients and servers to each other. A fundamental problem is, therefore, how to select...
 
Securing Mobile Ad Hoc Networks with Certificateless Public Keys
Found in: IEEE Transactions on Dependable and Secure Computing
By Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
Issue Date:October 2006
pp. 386-399
This paper studies key management, a fundamental problem in securing mobile ad hoc networks (MANETs). We present IKM, an ID-based key management scheme as a novel combination of ID-based and threshold cryptography. IKM is a certificateless solution in that...
 
Secure Spatial Top-<i>k</i> Query Processing via Untrusted Location-based Service Providers
Found in: IEEE Transactions on Dependable and Secure Computing
By Rui Zhang,Jingchao Sun,Yanchao Zhang,Chi Zhang
Issue Date:May 2014
pp. 1
This paper considers a novel distributed system for collaborative location-based information generation and sharing which become increasingly popular due to the explosive growth of Internet-capable and location-aware mobile devices. The system consists of ...
 
Secure multidimensional range queries in sensor networks
Found in: Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing (MobiHoc '09)
By Jing Shi, Rui Zhang, Yanchao Zhang
Issue Date:May 2009
pp. 1-2
Most future large-scale sensor networks are expected to follow a two-tier architecture which consists of resource-rich master nodes at the upper tier and resource-poor sensor nodes at the lower tier. Sensor nodes submit data to nearby master nodes which th...
     
 1