December 11, 2017
Comments Off on Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
Posted in: IEEE 2017, NS2
Authentication handover and privacy protection in 5G hetnets using software-defined networking Abstract Recently, densified small cell deployment with overlay coverage through coexisting heterogeneous networks has emerged as a viable solution for 5G mobile networks. However, this multi-tier architecture along with stringent latency requirements in 5G brings new challenges in security provisioning due to the potential […]
December 11, 2017
Comments Off on The Impact of Incomplete Secure Connectivity on the Lifetime of Wireless Sensor Networks
Posted in: IEEE 2017, NS2
The Impact of Incomplete Secure Connectivity on the Lifetime of Wireless Sensor Networks Abstract Key predistribution schemes accommodate secure connectivity by establishing pairwise keys between nodes. However, ensuring security for all communication links of a wireless sensor network (WSN) is nontrivial due to the memory limitations of the nodes. If some of the links are not available due to the lack of […]