• Accountable and privacy-enhanced access control in wireless sensor networks 

      He, Daojing; Chan, Sammy; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article)
      In general, owners and users of wireless sensor networks (WSNs) are different entities. A user may want to hide his/her data access privacy from anyone else including the network owner and, at the same time, users who ...
    • An Accountable, Privacy-Preserving, and Efficient Authentication Framework for Wireless Access Networks 

      He, Daojing; Chan, Sammy; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Article)
      The convergence of wireless access networks significantly changes the way we live and work, bringing us closer to the goal of computing anywhere at any time. Security, privacy, accountability, and efficiency issues are of ...
    • An enhanced public key infrastructure to secure smart grid wireless communication networks 

      He, Daojing; Chan, Sammy; Zhang, Yan; Guizani, Mohsen; Chen, Chun; ... more authors (2014 , Article)
      It is expected that the smart grid will radically add new functionalities to legacy electrical power systems. However, we believe that this will in turn introduce many new security risks. With the smart grid's backbone ...
    • Handover authentication for mobile networks: Security and efficiency aspects 

      He, Daojing; Chan, Sammy; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article)
      A handover authentication module in mobile networks enables mobile nodes to securely and seamlessly roam over multiple access points. However, designing an appropriate handover authentication protocol is a difficult task ...
    • How Does Social Behavior Affect Your Password? 

      He, Daojing; Yu, Hang; Zhou, Beibei; Zhu, Shanshan; Zhang, Min; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      A password is an important method of identity authentication, so there are endless research attempts on passwords, but most of them are based on different languages and technologies. As far as we know, no one has studied ...
    • Mobile application security: Malware threats and defenses 

      He, Daojing; Chan, Sammy; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article)
      Due to the quantum leap in functionality, the rate of upgrading traditional mobile phones to smartphones is tremendous. One of the most attractive features of smartphones is the availability of a large number of apps for ...
    • Offloading Time Optimization via Markov Decision Process in Mobile-Edge Computing 

      Yang, Guisong; Hou, Ling; He, Xingyu; He, Daojing; Chan, Sammy; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      Computation offloading from a mobile device to the edge server is an emerging paradigm to reduce completion latency of intensive computations in mobile-edge computing (MEC). In order to satisfy the delay-sensitive computing ...
    • Secure and distributed data discovery and dissemination in wireless sensor networks 

      He, Daojing; Chan, Sammy; Guizani, Mohsen; Yang, Haomiao; Zhou, Boyang ( IEEE Computer Society , 2015 , Article)
      A data discovery and dissemination protocol for wireless sensor networks (WSNs) is responsible for updating configuration parameters of, and distributing management commands to, the sensor nodes. All existing data discovery ...
    • Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks 

      He, Daojing; Chan, Sammy; Tang, Shaohua; Guizani, Mohsen (2013 , Article)
      Wireless sensor networks (WSNs) are widely applicable in monitoring and control of environment parameters. It is sometimes necessary to disseminate data through wireless links after they are deployed in order to adjust ...
    • Secure service provision in smart grid communications 

      He, Daojing; Chen, Chun; Bu, Jiajun; Chan, Sammy; Zhang, Yan; ... more authors (2012 , Article)
      The smart grid provides a platform for thirdparty service providers to remotely monitor and manage energy usage for consumers. At the same time, the involvement of service providers brings a new set of security threats to ...
    • Security Analysis of a Space-Based Wireless Network 

      He, Daojing; Li, Xuru; Chan, Sammy; Gao, Jiahao; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      With the gradual deployment of the spacebased wireless network, security risks in the data communication between satellites and even the internal structure of a satellite become extremely important. In this article, we use ...
    • Security and privacy in emerging networks: Part 1 [Guest Editorial] 

      Guizani, Mohsen; He, Daojing; Ren, Kui; Rodrigues, Joel; Chan, Sammy; ... more authors ( IEEE , 2015 , Article)
      With the recent advancements in networking technologies, some new emerging networks are being implemented that have the potential to be deployed broadly and on a large scale in the near future. In the wired domain, these ...
    • Security and privacy in emerging networks: Part II [Guest Editorial] 

      Guizani, Mohsen; He, Daojing; Ren, Kui; Rodrigues, Joel J. P.; Chan, Sammy; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article Review)
      This is the second part of the " Security and Privacy in Emerging Networks" Feature Topic. In Part I, which was published in April 2015, we selected those contributions that dealt with the theory behind the security and ...
    • Small data dissemination for wireless sensor networks: The security aspect 

      He, Daojing; Chan, Sammy; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2014 , Article)
      In wireless sensor networks small data dissemination protocols are used to adjust configuration parameters of sensors, or distribute management commands and queries to sensors. For security reasons every disseminated data ...
    • User privacy and data trustworthiness in mobile crowd sensing 

      He, Daojing; Chan, Sammy; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article)
      Smartphones and other trendy mobile wearable devices are rapidly becoming the dominant sensing, computing and communication devices in peoples' daily lives. Mobile crowd sensing is an emerging technology based on the sensing ...