Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    PTSLP: Position Tracking Based Source Location Privacy for Wireless Sensor Networks

    Abundant experiments have shown that phantom source nodes cannot leave far away from the real source node. In this paper, we propose a novel position tracking based source location privacy (PTSLP) protection s...

    Hao Wang, Guangjie Han, Chunsheng Zhu in Radio Frequency Identification and IoT Sec… (2017)

  2. Chapter and Conference Paper

    Security-Enhanced Reprogramming with XORs Coding in Wireless Sensor Networks

    Reprogramming is an important function required by wireless sensor networks (WSNs). Due to the openness of WSNs, more and more researchers pay attention to the security aspect of reprogramming, but confidentia...

    Depeng Chen, Dao**g He, Sammy Chan in Information and Communications Security (2016)

  3. Chapter and Conference Paper

    Network Anomaly Detection Using Unsupervised Feature Selection and Density Peak Clustering

    Intrusion detection systems (IDSs) play a significant role to effectively defend our crucial computer systems or networks against attackers on the Internet. Anomaly detection is an effective way to detect intr...

    **ejun Ni, Dao**g He, Sammy Chan in Applied Cryptography and Network Security (2016)

  4. Chapter and Conference Paper

    Call Admission Control for 3G CDMA Networks with Differentiated QoS

    A call admission control (CAC) scheme for 3G wireless networks based on the estimated interference and differentiated quality of service (QoS) is proposed in this paper. In this CAC scheme, the interferences i...

    Qian Huang, Hui Min Chen, King Tim Ko in NETWORKING 2002: Networking Technologies, … (2002)