About
41
Publications
21,746
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,443
Citations
Publications
Publications (41)
With the rapid development of wireless communication and mobile devices, heterogeneous networks have emerged as a promising paradigm to provide users with various services in Internet of Things (IoTs). However, due to the limited resources, the spectrum sharing in heterogeneous networks becomes a new challenge. Therefore, in this paper we present a...
Vehicular networks enable vehicles to generate and broadcast messages in order to improve traffic safety and efficiency. However, due to the non-trusted environments, it is difficult for vehicles to evaluate the credibilities of received messages. In this paper, we propose a decentralized trust management system in vehicular networks based on block...
In this paper, we investigate multi-message authentication to combat adversaries with infinite computational capacity. An authentication framework over a wiretap channel $(W_1,W_2)$ is proposed to achieve information-theoretic security with the same key. The proposed framework bridges the two research areas in physical (PHY) layer security: secure...
With the flourishing and advancement of the IoT, the smart city has become an emerging paradigm, consisting of ubiquitous sensing, heterogeneous network infrastructure, and intelligent information processing and control systems. A smart city can monitor the physical world in real time, and provide intelligent services to both local residents and tr...
Human-to-human infection, as a type of fatal public health threats, can rapidly spread in a human population, resulting in a large amount of labor and health cost for treatment, control and prevention. To slow down the spread of infection, social network is envisioned to provide detailed contact statistics to isolate susceptive people who has frequ...
Cognitive radio sensor network (CRSN) has emer-ged as a promising solution to address the spectrum scarcity problem in traditional sensor networks, by enabling sensor nodes to opportunistically access licensed spectrum. To protect the transmission of primary users and enhance spectrum utilization, collaborative spectrum sensing is generally adopted...
Data publish-subscribe service is an effective approach to selectively share and selectively receive data. Towards the huge amount of data generated in our daily life, cloud systems, with economical but powerful storage and computing resources, are inevitably becoming the most appropriate platform for data publication and subscription. However, clo...
For Industrial Wireless Sensor Networks, it is essential to reliably sense and deliver the environmental data on time to avoid system malfunction. While energy harvesting is a promising technique to extend the lifetime of sensor nodes, it also brings new challenges for system reliability due to the stochastic nature of the harvested energy. In this...
With the ever-increasing demands on multimedia applications, cloud computing, due to its economical but powerful resources, is becoming a natural platform to process, store, and share multimedia contents. However, the employment of cloud computing also brings new security and privacy issues as few public cloud servers can be fully trusted by users....
How to control the access of the huge amount of big data becomes a very challenging issue, especially when big data are stored in the cloud. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising encryption technique that enables end-users to encrypt their data under the access policies defined over some attributes of data consumers a...
to be published in IEEE Network Magazine in 2016
In this paper, we propose a dynamic bandwidth allocation scheme based on Stackelberg game for a heterogeneous network to simultaneously offer mobile social users with bandwidth via multiple homing access. In specific, network operators in the heterogeneous network compete with each other to determine the price of the bandwidth based on the predicti...
The mobile crowdsourcing network (MCN) is a promising network architecture that applies the principles of crowdsourcing to perform tasks with human involvement and powerful mobile devices. However, it also raises some critical security and privacy issues that impede the application of MCNs. In this article, in order to better understand these criti...
With the flourishing of multi-functional wearable devices and the widespread use of smartphones, MHN becomes a promising paradigm of ubiquitous healthcare to continuously monitor our health conditions, remotely diagnose phenomena, and share health information in real time. However, MHNs raise critical security and privacy issues, since highly sensi...
In cloud, data access control is a crucial way to ensure data security. Functional encryption (FE) is a novel cryptographic primitive supporting fine-grained access control of encrypted data in cloud. In FE, every ciphertext is specified with an access policy, a decryptor can access the data if and only if his secret key matches with the access pol...
The emerging vehicular ad hoc network (VANET) enables vehicles to access the Internet through roadside access points (APs). An important issue in system deployment is determining how many roadside APs shall be installed on a road. However, the existing works fail to provide rigorous and accurate analysis for VANETs. In this paper, we propose a gene...
Data access control is an effective way to ensure the data security in the cloud. Due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. Ciphertext-Policy Attribute-based Encryption (CP-ABE) is regarded as one of the most suitable technologies for data access control in clo...
Ciphertext-Policy Attribute-based Encryption (CP-ABE) is a promising technique for access control of encrypted data, which requires a trusted authority to manage all the attributes and distributes keys in the system. In multi-authority cloud storage systems, the users’ attributes come from different domains each of which is managed by a different a...
In cloud storage systems, data owners host their data on cloud servers and users (data consumers) can access the data from cloud servers. Due to the data outsourcing, however, this new paradigm of data hosting service also introduces new security challenges, which requires an independent auditing service to check the data integrity in the cloud. In...
Due to the high volume and velocity of big data, it is an effective option to store big data in the cloud, because the cloud has capabilities of storing big data and processing high volume of user access requests. Attribute-Based Encryption (ABE) is a promising technique to ensure the end-to-end security of big data in the cloud. However, the polic...
Due to the high volume and velocity of big data, it is an effective option to store big data in the cloud, as the cloud has capabilities of storing big data and processing high volume of user access requests. Attribute-Based Encryption (ABE) is a promising technique to ensure the end-to-end security of big data in the cloud. However, the policy upd...
Cloud storage service allows data owner to outsource their data to the cloud and through which provide the data access to the users. Because the cloud server and the data owner are not in the same trust domain, the semi-trusted cloud server cannot be relied to enforce the access policy. To address this challenge, traditional methods usually require...
Data access control is an effective way to ensure data security in the cloud. However, due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. Existing access control schemes are no longer applicable to cloud storage systems, because they either produce multiple encrypted co...
In cloud computing, data owners host their data on cloud servers and users (data consumers) can access the data from cloud servers. Due to the data outsourcing, however, this new paradigm of data hosting service also introduces new security challenges, which requires an independent auditing service to check the data integrity in the cloud. Some exi...
In MIMO networks, there are two transmission strategies, SM (spatial multiplexing) and IC (interference cancellation). The use of SM and IC brings additional complexity for routing and transmission scheduling of the links. Almost all existing works on throughput optimization for MIMO systems are based on the assumption that traffic routing is given...
In the data center, a server can work in either active state or power-saving state. The power consumption in the power-saving state is almost 0, thus it is always desirable to allocate as many VMs as possible to some active servers and leave the rest to power-saving state in order to reduce the energy consumption of the data center. In this paper,...
A cloud storage service allows data owner to outsource their data to the cloud and through which provide the data access to the users. Because the cloud server and the data owner are not in the same trust domain, the semi-trusted cloud server cannot be relied to enforce the access policy. To address this challenge, traditional methods usually requi...
Cipher text-Policy Attribute-base Encryption (CP-ABE) is regarded as one of the most suitable technologies for data access control in cloud storage. In almost all existing CP-ABE schemes, it is assumed that there is only one authority in the system responsible for issuing attributes to the users. However, in many applications, there are multiple au...
Cloud computing is a promising computing model that enables convenient and on-demand network access to a shared pool of configurable
computing resources. The first offered cloud service is moving data into the cloud: data owners let cloud service providers
host their data on cloud servers and data consumers can access the data from the cloud server...
Due to the packet-fairness property of the 802.11 WLANs, the clients with low rates take longer time to transmit a packet and would reduce the overall network throughput, as well as the per-node throughput of those high data rate clients. We propose a collaborative relay method, which allows high data rate clients to relay traffic for the low data...
Threshold User Authentication is widely used to provide distributed authentication service in Wireless Mesh Networks(WMNs). In a (t, n) threshold authentication scheme, secret authentication keys are shared among n mesh authentication servers (MAS) and any t out of n MASs can collaboratively provide the authentication service. The existing threshol...
There are two widely used interference models to characterize interference in wireless communication, protocol model and physical model. The protocol model simplifies the interference by considering only two concerned communication links (or nodes). It ignores the cumulative interference from other links (or nodes). On the other side, the physical...
With the development of wireless sensor network technology, more and more WSNs applications have the requirements of dealing with the critical mission. In this paper, we focus on the time critical problems of WSNs applications and design a new level control temporal consistency model with the priority tag. Then a Temporal Consistency Optimized Algo...
We propose an efficient teleportation scheme for an unknown state to either one of two receivers via GHZ-like states. We also discuss the fidelity of the quantum state when the control party is uncooperative.
We present a new quantum key distribution (QKD) scheme using EPR pairs and Bell state measurement, accompanied by quantum one-way function. The security of our scheme derives from BB84 protocol, and several other features make our QKD scheme fairly suitable for QKD network designs. So we then apply a modified version of our QKD scheme to construct...
In this paper, we propose a secure user authentication protocol with nonentanglement-based QKD on jammable public channels between two parties, Alice and Bob. First, via an arbitrator (Trent), the protocol provides both quantum authentication and quantum key distribution. Second, due to the registration to the trusted third party and the initial bi...