Autonomic schemes for threat mitigation in Internet of Things

QM Ashraf, MH Habaebi - Journal of Network and Computer Applications, 2015 - Elsevier
Abstract Internet of Things (IoT) refers to the expansion of Internet technologies to include
wireless sensor networks (WSNs) and smart objects by extensive interfacing of exclusively …

A survey of group key distribution schemes with self-healing property

T Rams, P Pacyna - IEEE Communications Surveys & Tutorials, 2012 - ieeexplore.ieee.org
Secure key distribution schemes for group communications allow to establish a secure
multicast communication between a group manager and group members through an …

Independent motion detection in 3D scenes

HS Sawhney, Y Guo, R Kumar - IEEE Transactions on Pattern …, 2000 - ieeexplore.ieee.org
This paper presents an algorithmic approach to the problem of detecting independently
moving objects in 3D scenes that are viewed under camera motion. There are two …

Self-healing group key distribution protocol in wireless sensor networks for secure IoT communications

H Guo, Y Zheng, X Li, Z Li, C Xia - Future Generation Computer Systems, 2018 - Elsevier
Abstract The Internet of Things (IoT) aims to collect a large amount of data and exchange
them over wireless networks by connecting billions of perception objects. Security becomes …

[HTML][HTML] A new key protocol design for cryptocurrency wallet

S Sung - ICT Express, 2021 - Elsevier
The majority of hacking accidents in cryptocurrency occur when the information of a
cryptocurrency wallet is stolen. Since the cryptocurrency wallet is simply used for a key …

Modified access polynomial based self-healing key management schemes with broadcast authentication and enhanced collusion resistance in wireless sensor …

X Sun, X Wu, C Huang, Z Xu, J Zhong - Ad Hoc Networks, 2016 - Elsevier
Though lots of research results about self-healing key management under unreliable links
have been proposed, there are still some shortcomings, such as the inefficiency of …

United we stand: Intrusion resilience in mobile unattended WSNs

R Di Pietro, G Oligeri, C Soriente… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) are susceptible to a wide range of attacks due to their
distributed nature, limited sensor resources, and lack of tamper resistance. Once a sensor is …

Intrusion-resilience in mobile unattended WSNs

R Di Pietro, G Oligeri, C Soriente… - 2010 Proceedings IEEE …, 2010 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) are susceptible to a wide range of attacks due to their
distributed nature, limited sensor resources and lack of tamper-resistance. Once a sensor is …

Color image quality assessment based on image quality parameters perceived by human vision system

ZX Xie, ZF Wang - 2010 International Conference on …, 2010 - ieeexplore.ieee.org
A color image quality assessment (C-IQA) method was proposed based on the primary and
fundamental image quality parameters perceived by human vision system. The methods for …

One-way hash chain-based self-healing group key distribution scheme with collusion resistance capability in wireless sensor networks

Q Wang, H Chen, L Xie, K Wang - Ad Hoc Networks, 2013 - Elsevier
In order to resolve the collusion resistance problem in the one-way hash chain-based self-
healing group key distribution schemes and improve the performance of previous self …