2025
Cryptocurrency forensics automation: a deep learning and NLP-based approach for mobile platforms.
Discov. Comput., December, 2025
A comprehensive and realistic performance evaluation of post-quantum security for consumer IoT devices.
Internet Things, 2025
2024
Efficient Group Key Management for Resilient Operation of LoRaWAN-Based Smart Grid Applications.
IEEE Trans. Control. Syst. Technol., September, 2024
LNGate$^{2}$2: Secure Bidirectional IoT Micro-Payments Using Bitcoin's Lightning Network and Threshold Cryptography.
IEEE Trans. Mob. Comput., May, 2024
D-LNBot: A Scalable, Cost-Free and Covert Hybrid Botnet on Bitcoin's Lightning Network.
IEEE Trans. Dependable Secur. Comput., 2024
A Convolutional Neural Network Ensemble for Video Source Camera Forensics.
IEEE Multim., 2024
Performance Evaluation of Quantum-Resistant IKEv2 Protocol for Satellite Networking Environments.
Proceedings of the IEEE Virtual Conference on Communications, 2024
Cost-Based Modeling and Optimization of Secure Matrix Multiplication in the Cloud.
Proceedings of the IEEE International Conference on Smart Computing, 2024
Deceptive Skies: Leveraging GANs for Drone Sensor Data Falsification.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024
Enhanced Outsourced and Secure Inference for Tall Sparse Decision Trees.
Proceedings of the IEEE International Performance, 2024
Integrating Post-Quantum TLS into the Control Plane of 5G Networks.
Proceedings of the IEEE International Performance, 2024
Optimizing the Parameters of Pipelined Multi-Party Computation for Privacy-Preserving Machine Learning Applications.
Proceedings of the IEEE International Conference on Communications, 2024
Catch me if you can: Covert Information Leakage from Drones using MAVLink Protocol.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
ConFIDe: A PWM-Driven Control-Fused Intrusion Detection System for Hardware Security in Unmanned Aerial Vehicles.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
MPC-ABC: Blockchain-Based Network Communication for Efficiently Secure Multiparty Computation.
J. Netw. Syst. Manag., October, 2023
Global Communications Newsletter.
IEEE Commun. Mag., August, 2023
Ivycide: Smart Intrusion Detection System Against E-IoT Driver Threats.
IEEE Internet Things J., May, 2023
SDN-enabled vehicular networks: Theory and practice within platooning applications.
Veh. Commun., February, 2023
LGuard: Securing Enterprise-IoT Systems against Serial-Based Attacks via Proprietary Communication Buses.
DTRAP, 2023
LNMesh: Who Said You need Internet to send Bitcoin? Offline Lightning Network Payments using Community Wireless Mesh Networks.
Proceedings of the 24th IEEE International Symposium on a World of Wireless, 2023
Privacy-Preserving V2V Charge Sharing Coordination using the Hungarian Algorithm.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023
Privacy-Preserving Oriented Design for Multi-Modality Models using FL.
Proceedings of the 5th IEEE International Conference on Trust, 2023
ReplayMPC: A Fast Failure Recovery Protocol for Secure Multiparty Computation Applications using Blockchain.
Proceedings of the 2023 IEEE International Conference on Smart Computing, 2023
SDN-based GTP-U Traffic Analysis for 5G Networks.
Proceedings of the NOMS 2023, 2023
MPC-as-a-Service: A Customizable Management Protocol for Running Multi-party Computation on IoT Devices.
Proceedings of the NOMS 2023, 2023
Privacy-Preserving Collision Detection for Drone-based Aerial Package Delivery using Secure Multi-Party Computation.
Proceedings of the Twenty-fourth International Symposium on Theory, 2023
Outsourcing Privacy-Preserving Federated Learning on Malicious Networks through MPC.
Proceedings of the 48th IEEE Conference on Local Computer Networks, 2023
Design and Analysis of an Open-Source SDN-based 5G Standalone Testbed.
Proceedings of the IEEE INFOCOM 2023, 2023
Performance Evaluation of Quantum-Resistant Open Fronthaul Communications in 5G.
Proceedings of the IEEE INFOCOM 2023, 2023
Bringing DNS Service to 5G Edge for Reduced Latencies in mMTC Applications.
Proceedings of the IEEE International Conference on Industrial Technology, 2023
Performance Evaluation of Quantum-Resistant TLS for Consumer IoT Devices.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023
Adversarial Data-Augmented Resilient Intrusion Detection System for Unmanned Aerial Vehicles.
Proceedings of the IEEE International Conference on Big Data, 2023
2022
Development and Evaluation of a Publish/Subscribe IoT Data Sharing Model with LoRaWAN.
Open J. Internet Things, 2022
LNGate<sup>2</sup>: Secure Bidirectional IoT Micro-payments using Bitcoin's Lightning Network and Threshold Cryptography.
CoRR, 2022
Cryptocurrency Solutions to Enable Micropayments in Consumer IoT.
IEEE Consumer Electron. Mag., 2022
Survey on Enterprise Internet-of-Things systems (E-IoT): A security perspective.
Ad Hoc Networks, 2022
A Proxy Signature-Based Swarm Drone Authentication With Leader Selection in 5G Networks.
IEEE Access, 2022
Integration of WAVE and OpenFlow for Realization of SDN-based VANETs in ns-3.
Proceedings of the WNS3 2022: 2022 Workshop on ns-3, Virtual Event, USA, June 22, 2022
Video Origin Camera Identification using Ensemble CNNs of Positional Patches.
Proceedings of the 5th IEEE International Conference on Multimedia Information Processing and Retrieval, 2022
LoFin: LoRa-based UAV Fingerprinting Framework.
Proceedings of the IEEE Military Communications Conference, 2022
Network-Efficient Pipelining-Based Secure Multiparty Computation for Machine Learning Applications.
Proceedings of the 47th IEEE Conference on Local Computer Networks, 2022
Optimal Incentive Mechanisms for Fair and Equitable Rewards in PoS Blockchains.
Proceedings of the IEEE International Performance, 2022
Image-to-Image Translation Generative Adversarial Networks for Video Source Camera Falsification.
Proceedings of the Digital Forensics and Cyber Crime - 13th EAI International Conference, 2022
Crypto Wallet Artifact Detection on Android Devices Using Advanced Machine Learning Techniques.
Proceedings of the Digital Forensics and Cyber Crime - 13th EAI International Conference, 2022
On Algorand Transaction Fees: Challenges and Mechanism Design.
Proceedings of the IEEE International Conference on Communications, 2022
2021
HDMI-Watch: Smart Intrusion Detection System Against HDMI Attacks.
IEEE Trans. Netw. Sci. Eng., 2021
Strategic Defense Against Stealthy Link Flooding Attacks: A Signaling Game Approach.
IEEE Trans. Netw. Sci. Eng., 2021
A Usable and Robust Continuous Authentication Framework Using Wearables.
IEEE Trans. Mob. Comput., 2021
Distributed Connectivity Maintenance in Swarm of Drones During Post-Disaster Transportation Applications.
IEEE Trans. Intell. Transp. Syst., 2021
A Lightweight Privacy-Aware Continuous Authentication Protocol-PACA.
ACM Trans. Priv. Secur., 2021
Blockchain-based video forensics and integrity verification framework for wireless Internet-of-Things devices.
Secur. Priv., 2021
Building Next Generation IoT Infrastructure for Enabling M2M Crypto Economy.
Open J. Internet Things, 2021
A scalable private Bitcoin payment channel network with privacy guarantees.
J. Netw. Comput. Appl., 2021
UAV-Assisted Multi-path Parallel Routing for mmWave-Based Wireless Networks.
Internet Things, 2021
Communication-efficient certificate revocation management for Advanced Metering Infrastructure and IoT Integration.
Future Gener. Comput. Syst., 2021
3-of-3 Multisignature Approach for Enabling Lightning Network Micro-payments on IoT Devices.
CoRR, 2021
An Evaluation of Cryptocurrency Payment Channel Networks and Their Privacy Implications.
CoRR, 2021
Cryptocurrency Solutions to Enable Micro-payments in Consumer IoT.
CoRR, 2021
Improving transaction success rate in cryptocurrency payment channel networks.
Comput. Commun., 2021
LightningStrike: (in)secure practices of E-IoT systems in the wild.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
LNGate: powering IoT with next generation lightning micro-payments using threshold cryptography.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
A Proxy Signature-Based Drone Authentication in 5G D2D Networks.
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021
Efficient Group-Key Management for Low-bandwidth Smart Grid Networks.
Proceedings of the IEEE International Conference on Communications, 2021
Outsourcing Secure MPC to Untrusted Cloud Environments with Correctness Verification.
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021
PRNU-based Source Camera Identification for Multimedia Forensics.
Proceedings of the 22nd IEEE International Conference on Information Reuse and Integration for Data Science, 2021
A General and Practical Framework for Realization of SDN-based Vehicular Networks.
Proceedings of the IEEE International Performance, 2021
Enabling Micro-payments on IoT Devices using Bitcoin Lightning Network.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021
Blockchain-Based Two-Factor Authentication for Credit Card Validation.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2021
2020
Privacy-Preserving Authentication Scheme for Connected Electric Vehicles Using Blockchain and Zero Knowledge Proofs.
IEEE Trans. Veh. Technol., 2020
Guest Editorial Introduction to the Special Section on Cognitive Software Defined Networks and Applications.
IEEE Trans. Netw. Sci. Eng., 2020
Customized novel routing metrics for wireless mesh-based swarm-of-drones applications.
Internet Things, 2020
Heuristic approach for jointly optimising FeICIC and UAV locations in multi-tier LTE-advanced public safety HetNet.
IET Commun., 2020
Heuristic Approach for Jointly Optimizing FeICIC and UAV Locations in Multi-Tier LTE-Advanced Public Safety HetNet.
CoRR, 2020
A Bitcoin payment network with reduced transaction fees and confirmation times.
Comput. Networks, 2020
Connectivity Maintenance Extensions to IEEE 802.11s MAC Layer in ns-3.
Proceedings of the 2020 Workshop on ns-3, 2020
Extending IEEE 802.11s Mesh Routing for 3-D Mobile Drone Applications in ns-3.
Proceedings of the 2020 Workshop on ns-3, 2020
PoisonIvy: (In)secure Practices of Enterprise IoT Systems in Smart Buildings.
Proceedings of the BuildSys '20: The 7th ACM International Conference on Systems for Energy-Efficient Buildings, 2020
Cloud-based Deception against Network Reconnaissance Attacks using SDN and NFV.
Proceedings of the 45th IEEE Conference on Local Computer Networks, 2020
Security, Privacy and Ethical Concerns of IoT Implementations in Hospitality Domain.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020
Privacy-Preserving and Efficient Sharing of Drone Videos in Public Safety Scenarios using Proxy Re-encryption.
Proceedings of the 21st International Conference on Information Reuse and Integration for Data Science, 2020
On Sharing Models Instead of Data using Mimic learning for Smart Health Applications.
Proceedings of the IEEE International Conference on Informatics, 2020
Improving Sustainability of Cryptocurrency Payment Networks for IoT Applications.
Proceedings of the 2020 IEEE International Conference on Communications Workshops, 2020
Z-IoT: Passive Device-class Fingerprinting of ZigBee and Z-Wave IoT Devices.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Improving Transaction Success Rate via Smart Gateway Selection in Cryptocurrency Payment Channel Networks.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020
A Cost-efficient IoT Forensics Framework with Blockchain.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020
Efficient Authentication of Drones to mmWave Wireless Mesh Networks in Post-Disaster Scenarios.
Proceedings of the IEEE Global Communications Conference, 2020
Enabling Second Factor Authentication for Drones in 5G using Network Slicing.
Proceedings of the IEEE Globecom Workshops, 2020
LNBot: A Covert Hybrid Botnet on Bitcoin Lightning Network for Fun and Profit.
Proceedings of the Computer Security - ESORICS 2020, 2020
Towards Secure Smart Parking System Using Blockchain Technology.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020
2019
Spatio-Temporal Non-Intrusive Direct V2V Charge Sharing Coordination.
IEEE Trans. Veh. Technol., 2019
A privacy-preserving multifactor authentication system.
Secur. Priv., 2019
UAV positioning for out-of-band integrated access and backhaul millimeter wave network.
Phys. Commun., 2019
SDN-enabled recovery for Smart Grid teleprotection applications in post-disaster scenarios.
J. Netw. Comput. Appl., 2019
EPIC: Efficient Privacy-Preserving Scheme With EtoE Data Integrity and Authenticity for AMI Networks.
IEEE Internet Things J., 2019
A moving target defense and network forensics framework for ISP networks using SDN and NFV.
Future Gener. Comput. Syst., 2019
LNBot: A Covert Hybrid Botnet on Bitcoin Lightning Network.
CoRR, 2019
Communication-efficient Certificate Revocation Management for Advanced Metering Infrastructure.
CoRR, 2019
Efficient and privacy preserving supplier matching for electric vehicle charging.
Ad Hoc Networks, 2019
Efficient certificate revocation management schemes for IoT-based advanced metering infrastructures in smart cities.
Ad Hoc Networks, 2019
Attacking HDMI distribution networks: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
On the overhead of using zero-knowledge proofs for electric vehicle authentication: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Performance evaluation of key management schemes for wireless legacy smart grid environments: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Privacy preserving distributed matching for device-to-device IoT communications: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Preserving privacy of drone videos using proxy re-encryption technique: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Privacy-Preserving Smart Parking System Using Blockchain and Private Information Retrieval.
Proceedings of the International Conference on Smart Applications, 2019
Interference Coordination for Aerial and Terrestrial Nodes in Three-Tier LTE-Advanced HetNet.
Proceedings of the IEEE Radio and Wireless Symposium, 2019
A novel routing metric for IEEE 802.11s-based swarm-of-drones applications.
Proceedings of the MobiQuitous 2019, 2019
Server-Side Fingerprint-Based Indoor Localization Using Encrypted Sorting.
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems Workshops, 2019
Assuring the Integrity of Videos from Wireless-Based IoT Devices using Blockchain.
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems Workshops, 2019
A Privacy Framework for Charging Connected Electric Vehicles Using Blockchain and Zero Knowledge Proofs.
Proceedings of the 2019 IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), 2019
Curriculum Design Requirements and Challenges for the First Bachelor's Degree on IoT in the US.
Proceedings of the Internet of Things. A Confluence of Many Disciplines, 2019
A Replay Attack-Resistant 0-RTT Key Management Scheme for Low-Bandwidth Smart Grid Communications.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Privacy-Preserving Control of Video Transmissions for Drone-based Intelligent Transportation Systems.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
A Heuristic-Based Private Bitcoin Payment Network Formation Using Off-Chain Links.
Proceedings of the IEEE International Conference on Blockchain, 2019
HDMI-walk: attacking HDMI distribution networks via consumer electronic control protocol.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
Digital Forensics for IoT and WSNs.
Proceedings of the Mission-Oriented Sensor Networks and Systems: Art and Science, 2019
2018
The Internet of Microgrids: A Cloud-Based Framework for Wide Area Networked Microgrids.
IEEE Trans. Ind. Informatics, 2018
CP_ABSC: An attribute-based signcryption scheme to secure multicast communications in smart grids.
Math. Found. Comput., 2018
A realistic performance evaluation of privacy-preserving protocols for smart grid AMI networks.
J. Netw. Comput. Appl., 2018
Occupancy Counting With Burst and Intermittent Signals in Smart Buildings.
IEEE Internet Things J., 2018
Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled Smart Metering systems.
Future Gener. Comput. Syst., 2018
Digital Forensics for IoT and WSNs.
CoRR, 2018
EPIC: Efficient Privacy-Preserving Scheme with E2E Data Integrity and Authenticity for AMI Networks.
CoRR, 2018
Block4Forensic: An Integrated Lightweight Blockchain Framework for Forensics Applications of Connected Vehicles.
IEEE Commun. Mag., 2018
Privacy Preserving Distributed Stable Matching of Electric Vehicles and Charge Suppliers.
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018
Drone-Assisted Multi-Purpose Roadside Units for Intelligent Transportation Systems.
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018
Time Optimal Multi-UAV Path Planning for Gathering its Data from Roadside Units.
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018
WACA: Wearable-Assisted Continuous Authentication.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018
A Network Coding Based Information Spreading Approach for Permissioned Blockchain in IoT Settings.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018
OS Independent and Hardware-Assisted Insider Threat Detection and Prevention Framework.
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Utilizing NFV for Effective Moving Target Defense Against Link Flooding Reconnaissance Attacks.
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Supporting Seamless Connectivity in Drone-assisted Intelligent Transportation Systems.
Proceedings of the 43rd IEEE Conference on Local Computer Networks Workshops, 2018
Building a Private Bitcoin-Based Payment Network Among Electric Vehicles and Charging Stations.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
U-PoT: A Honeypot Framework for UPnP-Based IoT Devices.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018
Efficient Public-Key Revocation Management for Secure Smart Meter Communications Using One-Way Cryptographic Accumulators.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
IoT-enabled smart lighting systems for smart cities.
Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference, 2018
A scalable protocol stack for IEEE 802.11s-based advanced metering infrastructure networks.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018
A secure and cloud-based medical records access scheme for on-road emergencies.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018
Assessing the overhead of authentication during SDN-enabled restoration of smart grid inter-substation communications.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018
2017
Scalable Certificate Revocation Schemes for Smart Grid AMI Networks Using Bloom Filters.
IEEE Trans. Dependable Secur. Comput., 2017
Investigation of Smart Meter Data Reporting Strategies for Optimized Performance in Smart Grid AMI Networks.
IEEE Internet Things J., 2017
Privacy-Preserving Power Injection Over a Hybrid AMI/LTE Smart Grid Network.
IEEE Internet Things J., 2017
A Survey on Smart Grid Cyber-Physical System Testbeds.
IEEE Commun. Surv. Tutorials, 2017
UAV-Enabled Intelligent Transportation Systems for the Smart City: Applications and Challenges.
IEEE Commun. Mag., 2017
Utilizing Advanced Metering Infrastructure to Build a Public Key Infrastructure for Electric Vehicles.
Proceedings of the 6th ACM Symposium on Development and Analysis of Intelligent VehicularNetworks and Applications, 2017
Mitigating Selective Jamming Attacks in Smart Meter Data Collection using Moving Target Defense.
Proceedings of the 13th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2017
An Authentication Framework for Electric Vehicle-to-Electric Vehicle Charging Applications.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017
Efficient Management of Certificate Revocation Lists in Smart Grid Advanced Metering Infrastructure.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017
An attribute-based reliable multicast-over-broadcast protocol for firmware updates in smart meter networks.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017
Preventing collusion between SDN defenders anc attackers using a game theoretical approach.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017
An Attribute & Network Coding-Based Secure Multicast Protocol for Firmware Updates in Smart Grid AMI Networks.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017
Efficient Certificate Verification for Vehicle-to-Grid Communications.
Proceedings of the Future Network Systems and Security - Third International Conference, 2017
An efficient MQTT framework for control and protection of networked cyber-physical systems.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
2016
Secure Data Obfuscation Scheme to Enable Privacy-Preserving State Estimation in Smart Grid AMI Networks.
IEEE Internet Things J., 2016
Towards realistic connectivity restoration in partitioned mobile sensor networks.
Int. J. Commun. Syst., 2016
Efficient active rule processing in wireless multimedia sensor networks.
Int. J. Ad Hoc Ubiquitous Comput., 2016
Privacy-aware power charging coordination in future smart grid.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016
Addressing Network Interoperability in Hybrid IEEE 802.11s/LTE Smart Grid Communications.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016
Testbed and Simulation-Based Evaluation of Privacy-Preserving Algorithms for Smart Grid AMI Networks.
Proceedings of the 41st IEEE Conference on Local Computer Networks Workshops, 2016
Mitigating Crossfire Attacks Using SDN-Based Moving Target Defense.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016
Drones for smart cities: Issues in cybersecurity, privacy, and public safety.
Proceedings of the 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016
Comparative evaluation of Smart Grid AMI networks: Performance under privacy.
Proceedings of the IEEE Symposium on Computers and Communication, 2016
Indoor occupancy tracking in smart buildings using passive sniffing of probe requests.
Proceedings of the IEEE International Conference on Communication, 2016
Software defined networking for resilient communications in Smart Grid active distribution networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Efficient Privacy-Preserving Data Collection Scheme for Smart Grid AMI Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Inducing data loss in Zigbee networks via join/association handshake spoofing.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
A reliable data aggregation mechanism with Homomorphic Encryption in Smart Grid AMI networks.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016
A novel storage covert channel on wearable devices using status bar notifications.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016
2015
Customized Certificate Revocation Lists for IEEE 802.11s-Based Smart Grid AMI Networks.
IEEE Trans. Smart Grid, 2015
Investigating Public-Key Certificate Revocation in Smart Grid.
IEEE Internet Things J., 2015
Performance Comparison of Data Reduction Techniques for Wireless Multimedia Sensor Network Applications.
Int. J. Distributed Sens. Networks, 2015
PARP-S: A secure piggybacking-based ARP for IEEE 802.11s-based Smart Grid AMI networks.
Comput. Commun., 2015
Self-deployment of mobile underwater acoustic sensor networks for maximized coverage and guaranteed connectivity.
Ad Hoc Networks, 2015
IoT-based occupancy monitoring techniques for energy-efficient smart buildings.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference Workshops, 2015
Path error-aware RTO design for smart meter data traffic in IEEE 802.11s-based AMI networks.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015
Hybrid Wi-Fi/LTE aggregation architecture for smart meter communications.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015
Privacy-preserving and secure communication scheme for power injection in smart grid.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015
An Attribute-Based Signcryption Scheme to Secure Attribute-Defined Multicast Communications.
Proceedings of the Security and Privacy in Communication Networks, 2015
SDN-based resilience for smart grid communications.
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2015
Efficient Privacy-Preserving Fingerprint-Based Indoor Localization Using Crowdsourcing.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015
Privacy-aware communication protocol for hybrid IEEE 802.11s/LTE Smart Grid architectures.
Proceedings of the 40th IEEE Local Computer Networks Conference Workshops, 2015
Efficient camera selection for maximized target coverage in underwater acoustic sensor networks.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015
Software defined networking for wireless local networks in Smart Grid.
Proceedings of the 40th IEEE Local Computer Networks Conference Workshops, 2015
Assessing the feasibility of fully homomorphic encryption for Smart Grid AMI networks.
Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015
Implementation and Analysis of Dutch-style Sealed-bid Auctions - Computational vs Unconditional Security.
Proceedings of the ICISSP 2015, 2015
Distributed connectivity restoration in Underwater Acoustic Sensor Networks via depth adjustment.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
2014
Optimal Camera Placement for Providing Angular Coverage in Wireless Video Sensor Networks.
IEEE Trans. Computers, 2014
On preserving user privacy in Smart Grid advanced metering infrastructure applications.
Secur. Commun. Networks, 2014
Topology management techniques for tolerating node failures in wireless sensor networks: A survey.
Comput. Networks, 2014
Relay placement for restoring connectivity in partitioned wireless sensor networks under limited information.
Ad Hoc Networks, 2014
Editorial for the special issue on routing in smart grid communication networks.
Ad Hoc Networks, 2014
Periodic data reporting strategies for IEEE 802.11s-based Smart Grid AMI networks.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014
Efficient generation and distribution of CRLs for IEEE 802.11s-based Smart Grid AMI networks.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014
Connectivity restoration in disjoint Wireless Sensor Networks using centrality measures.
Proceedings of the IEEE 39th Conference on Local Computer Networks, Edmonton, AB, Canada, 8-11 September, 2014, 2014
Performance evaluation of background subtraction algorithms for Android devices deployed in Wireless Multimedia Sensor Networks.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014
An efficient certificate revocation scheme for large-scale AMI networks.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014
Preserving consumer privacy on IEEE 802.11s-based smart grid AMI networks using data obfuscation.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014
Communication-constrained p-center problem for event coverage in theme parks.
Proceedings of the IEEE Global Communications Conference, 2014
An Improved TCP for Reduced Packet Delay in IEEE 802.11s-Based Smart Grid AMI Networks.
Proceedings of the Ad Hoc Networks - 6th International ICST Conference, 2014
2013
Handling large-scale node failures in mobile sensor/robot networks.
J. Netw. Comput. Appl., 2013
Efficient Tracking of Multiple Objects in Wireless Multimedia Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2013
Autonomous deployment of sensors for maximized coverage and guaranteed connectivity in Underwater Acoustic Sensor Networks.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013
An efficient ARP for large-scale IEEE 802.11s-based Smart Grid networks.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013
Rethinking connectivity restoration in WSNs using feedback from a low-cost mobile sensor network testbed.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013, 2013
Message from the demonstrations chair.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013
Connectivity restoration in disjoint wireless sensor networks using limited number of mobile relays.
Proceedings of IEEE International Conference on Communications, 2013
Energy and coverage trade-offs in deploying a mix of mobile and stationary relays for disjoint Wireless Sensor Networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Mobile Data Collector Assignment and Scheduling for Minimizing Data Delay in Partitioned Wireless Sensor Networks.
Proceedings of the Ad Hoc Networks - 5th International ICST Conference, 2013
An Efficient and Secure ARP for Large-Scale IEEE 802.11s-based Smart Grid Networks.
Proceedings of the Ad Hoc Networks - 5th International ICST Conference, 2013
2012
A taxonomy and evaluation for developing 802.11-based wireless mesh network testbeds.
Int. J. Commun. Syst., 2012
Connectivity restoration in delay-tolerant sensor networks using game theory.
Int. J. Ad Hoc Ubiquitous Comput., 2012
A survey of routing protocols for smart grid communications.
Comput. Networks, 2012
Performance evaluation of Smart Grid data aggregation via homomorphic encryption.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012
Energy and terrain aware connectivity restoration in disjoint Mobile Sensor Networks.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012
On the performance of sensor node repositioning under realistic terrain constraints.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012
Distributed relay node positioning for connectivity restoration in partitioned Wireless Sensor Networks.
Proceedings of the 2012 IEEE Symposium on Computers and Communications, 2012
Efficient and Accurate Object Classification in Wireless Multimedia Sensor Networks.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012
A Game-Theoretic approach to connectivity restoration in Wireless Sensor and Actor Networks.
Proceedings of IEEE International Conference on Communications, 2012
Performance evaluation of wireless mesh networks using IEEE 802.11s and IEEE 802.11n.
Proceedings of IEEE International Conference on Communications, 2012
An effective and scalable connectivity restoration heuristic for Mobile Sensor/Actor Networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012
2011
Bio-Inspired Relay Node Placement Heuristics for Repairing Damaged Wireless Sensor Networks.
IEEE Trans. Veh. Technol., 2011
Group-based hybrid authentication scheme for cooperative collision warnings in VANETs.
Secur. Commun. Networks, 2011
A survey of authentication schemes for vehicular <i>ad hoc</i> networks.
Secur. Commun. Networks, 2011
Distributed collaborative camera actuation for redundant data elimination in wireless multimedia sensor networks.
Ad Hoc Networks, 2011
An exact algorithm for providing multi-perspective event coverage in Wireless Multimedia Sensor Networks.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011
Camera Deployment for Video Panorama Generation in Wireless Visual Sensor Networks.
Proceedings of the 2011 IEEE International Symposium on Multimedia, 2011
Providing Automated Actions in Wireless Multimedia Sensor Networks via Active Rules.
Proceedings of the Computer and Information Sciences II, 2011
2010
Distributed Recovery from Network Partitioning in Movable Sensor/Actor Networks via Controlled Mobility.
IEEE Trans. Computers, 2010
A conceptual model for data management and distribution in peer-to-peer systems.
Peer-to-Peer Netw. Appl., 2010
Autonomous actor positioning in wireless sensor and actor networks using stable-matching.
Int. J. Parallel Emergent Distributed Syst., 2010
Static Worst-Case Energy and Lifetime Estimation of Wireless Sensor Networks.
J. Comput. Sci. Eng., 2010
Mobility-based self route recovery from multiple node failures in mobile sensor networks.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010
Delay-efficient geodynamic group-based authentication in VANETs.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010
Providing multi-perspective event coverage in wireless multimedia sensor networks.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010
2009
Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor Networks.
IEEE Trans. Parallel Distributed Syst., 2009
Clustering of wireless sensor and actor networks based on sensor distribution and connectivity.
J. Parallel Distributed Comput., 2009
Self-deployment of sensors for maximized coverage in underwater acoustic sensor networks.
Comput. Commun., 2009
Detecting and connecting disjoint sub-networks in wireless sensor and actor networks.
Ad Hoc Networks, 2009
A robust relay node placement heuristic for structurally damaged wireless sensor networks.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009
C<sup>2</sup>AM: an algorithm for application-aware movement-assisted recovery in wireless sensor and actor networks.
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009
Actor Positioning in Wireless Sensor and Actor Networks Using Matching Theory.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 2009
Self-Actuation of Camera Sensors for Redundant Data Elimination in Wireless Multimedia Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2009
Lightweight Object Localization with a Single Camera in Wireless Multimedia Sensor Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
2008
The impact of data aggregation on the performance of wireless sensor networks.
Wirel. Commun. Mob. Comput., 2008
Coverage and latency aware actor placement mechanisms in WSANs.
Int. J. Sens. Networks, 2008
Maximizing connected coverage via controlled actor relocation in wireless sensor and actor networks.
Comput. Networks, 2008
Strategies and techniques for node placement in wireless sensor networks: A survey.
Ad Hoc Networks, 2008
Distributed Recovery of Actor Failures in Wireless Sensor and Actor Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008
Distributed channel assignment in Wireless Mesh Networks with guaranteed connectivity.
Proceedings of the LCN 2008, 2008
Real-time routing for mobile sensor/actor networks.
Proceedings of the LCN 2008, 2008
Node Positioning for Increased Dependability of Wireless Sensor Networks.
Proceedings of the Algorithms and Protocols for Wireless Sensor Networks, 2008
2007
Improving gateway safety in wireless sensor networks using cognitive techniques.
Int. J. Sens. Networks, 2007
Positioning of Base Stations in Wireless Sensor Networks.
IEEE Commun. Mag., 2007
Quality-of-service provisioning via stochastic path selection under Weibullian link delays.
Proceedings of the 4th International ICST Conference on Heterogeneous Networking for Quality, 2007
A Distributed Connectivity Restoration Algorithm in Wireless Sensor and Actor Networks.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007
C2AP: Coverage-aware and Connectivity-constrained Actor Positioning in Wireless Sensor and Actor Networks.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007
Coverage-based Clustering of Wireless Sensor and Actor Networks.
Proceedings of the IEEE International Conference on Pervasive Services, 2007
An Efficient Mechanism for Establishing Connectivity in Wireless Sensor and Actor Networks.
Proceedings of the Global Communications Conference, 2007
2006
COLA: A Coverage and Latency Aware Actor Placement for Wireless Sensor and Actor Networks.
Proceedings of the 64th IEEE Vehicular Technology Conference, 2006
An Intelligent Safety-Aware Gateway Relocation Scheme for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2006
2005
Energy and QOS aware routing protocols for wireless sensor networks ()
PhD thesis, 2005
Sink repositioning for enhanced performance in wireless sensor networks.
Comput. Networks, 2005
Energy and QoS Aware Routing in Wireless Sensor Networks.
Clust. Comput., 2005
A survey on routing protocols for wireless sensor networks.
Ad Hoc Networks, 2005
Efficient aggregation of delay-constrained data in wireless sensor networks.
Proceedings of the 2005 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2005), 2005
2004
Energy-aware delay-constrained routing in wireless sensor networks.
Int. J. Commun. Syst., 2004
Relocation of gateway for enhanced timeliness in wireless sensor networks.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004
On Handling QoS Traffic in Wireless Sensor Networks.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004
2003
Optimization of Task Allocation in a Cluster-Based Sensor Network.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003
An Energy-Aware QoS Routing Protocol for Wireless Sensor Networks.
Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 2003