Search
Now showing items 1-10 of 13
Security and privacy in emerging networks: Part 1 [Guest Editorial]
(
IEEE
, 2015 , Article)
With the recent advancements in networking technologies, some new emerging networks are being implemented that have the potential to be deployed broadly and on a large scale in the near future. In the wired domain, these ...
An Accountable, Privacy-Preserving, and Efficient Authentication Framework for Wireless Access Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Article)
The convergence of wireless access networks significantly changes the way we live and work, bringing us closer to the goal of computing anywhere at any time. Security, privacy, accountability, and efficiency issues are of ...
Security Analysis of a Space-Based Wireless Network
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
With the gradual deployment of the spacebased wireless network, security risks in the data communication between satellites and even the internal structure of a satellite become extremely important. In this article, we use ...
Mobile application security: Malware threats and defenses
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
Due to the quantum leap in functionality, the rate of upgrading traditional mobile phones to smartphones is tremendous. One of the most attractive features of smartphones is the availability of a large number of apps for ...
Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks
(2013 , Article)
Wireless sensor networks (WSNs) are widely applicable in monitoring and control of environment parameters. It is sometimes necessary to disseminate data through wireless links after they are deployed in order to adjust ...
Secure service provision in smart grid communications
(2012 , Article)
The smart grid provides a platform for thirdparty service providers to remotely monitor and manage energy usage for consumers. At the same time, the involvement of service providers brings a new set of security threats to ...
Security and privacy in emerging networks: Part II [Guest Editorial]
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article Review)
This is the second part of the " Security and Privacy in Emerging Networks" Feature Topic. In Part I, which was published in April 2015, we selected those contributions that dealt with the theory behind the security and ...
Handover authentication for mobile networks: Security and efficiency aspects
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
A handover authentication module in mobile networks enables mobile nodes to securely and seamlessly roam over multiple access points. However, designing an appropriate handover authentication protocol is a difficult task ...
Accountable and privacy-enhanced access control in wireless sensor networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
In general, owners and users of wireless sensor networks (WSNs) are different entities. A user may want to hide his/her data access privacy from anyone else including the network owner and, at the same time, users who ...
Secure and distributed data discovery and dissemination in wireless sensor networks
(
IEEE Computer Society
, 2015 , Article)
A data discovery and dissemination protocol for wireless sensor networks (WSNs) is responsible for updating configuration parameters of, and distributing management commands to, the sensor nodes. All existing data discovery ...