Category: NS2

Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys

Authentication handover and privacy protection in 5G hetnets using software-defined networking Abstract Recently, densified small cell deployment with overlay coverage through coexisting heterogeneous networks has emerged as a viable solution for 5G mobile networks. However, this multi-tier architecture along with stringent latency requirements in 5G brings new challenges in security provisioning due to the potential […]


The Impact of Incomplete Secure Connectivity on the Lifetime of Wireless Sensor Networks

The Impact of Incomplete Secure Connectivity on the Lifetime of Wireless Sensor Networks Abstract Key predistribution schemes accommodate secure connectivity by establishing pairwise keys between nodes. However, ensuring security for all communication links of a wireless sensor network (WSN) is nontrivial due to the memory limitations of the nodes. If some of the links are not available due to the lack of […]