- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Vehicular Ad Hoc Networks (VANETs)
- Cloud Data Security Solutions
- Advanced Authentication Protocols Security
- Blockchain Technology Applications and Security
- Chaos-based Image/Signal Encryption
- Cryptographic Implementations and Security
- Mobile Crowdsensing and Crowdsourcing
- Complexity and Algorithms in Graphs
- Evacuation and Crowd Dynamics
- Traffic Prediction and Management Techniques
- Transportation and Mobility Innovations
- Human Mobility and Location-Based Analysis
- Advanced Image and Video Retrieval Techniques
- Advanced Malware Detection Techniques
- Software Testing and Debugging Techniques
- Advanced Neural Network Applications
- Software Reliability and Analysis Research
- Data Management and Algorithms
- Security in Wireless Sensor Networks
- Privacy, Security, and Data Protection
- Traffic control and management
- Geochemistry and Geologic Mapping
- Educational Research and Pedagogy
Beihang University
2020-2025
China Academy of Transportation Sciences
2023
Hunan University of Science and Technology
2023
Beijing Transportation Research Center
2023
University of Electronic Science and Technology of China
2019-2020
With the continuous development of industrial Internet Things (IIoT), many organizations opt for storing data collected by smart devices on a cloud server saving costs. Considering untrusted nature communication channel, how to ensure authenticity is an urgent matter be solved. Certificateless signatures that can provide authentication mechanism seem viable option this problem. Nevertheless, certificateless signature scheme proposed so far either easy broken or inefficient. In paper,...
The existing signcryption schemes with equality testing are aimed at a sole cryptosystem and not suitable for the sophisticated heterogeneous network of Industrial Internet Things (IIoT). To deal this challenge, we propose scheme test (HSC-ET) in article. This enables sensor public key infrastructure (PKI) to execute data encryption deliver it semitrusted entity (cloud server). When user an identity-based (IBC) intends search some stored on cloud server. delegated server executes tests...
As an emerging paradigm for urban sensing, vehicular crowd sensing (VCS) has received increasing attention in recent years. Unlike traditional paradigms, VCS leverages ubiquitous connected vehicles (CVs) and diverse onboard sensors to efficiently collect city-scale data. Despite the considerable benefits of CVs, fast-changing traffic environment attendant human social factors bring significant complexity system make it a typical cyber-physical-social (CPSS), followed by challenge robust...
Existing conditional anonymous authentication protocols to secure the group communication in VANETs (Vehicular Ad hoc Networks) render challenges such as dynamically updating membership a domain and achieving vehicle user's privacy preservation. This article elegantly addresses these by proposing novel privacy-preserving with dynamic for depending on chinese remainder theorem (CRT). Specifically, CRT is utilized trusted authority securely disseminate key authorized vehicles same domain,...
Abstract In recent years, the research of Internet vehicles (IoV) has received extensive attention. IoV, can make intelligent decisions by exchanging real‐time traffic information between other and IoV infrastructures, thereby reducing probability jams accidents. Although many advantages, it is necessary to ensure that data are not edited, forged, or disclosed during transmission. Also, certificateless signature (CLS) seems be solution this problem. While in high‐intensity transmission...
The signcryption protocols supporting the equality test are only for a single system rather than flexible heterogeneous environment of wireless body area networks (WBANs). In this article, problem is efficiently addressed through proposed scheme from identity-based cryptosystem (IBC) to public key infrastructure (PKI) with an (HSCIP-ET) WBANs. Our allows sensors planted or worn by user in IBC signcrypt sensitive data using management center PKI system, and then uploading it cloud server....
As a promising technology, the Internet of Vehicle (IoV) enables vehicles to be connected network and sends announcements roadside units (RSUs) or other vehicles. Nevertheless, because open nature IoV, trust privacy are confronted with challenges from cyber attacks. Motivated by addressing above-mentioned problems, privacy-preserving announcement protocol is constructed in this article, which an identity-based group signature used achieve anonymity In addition, novel blockchain-based...
Vehicular platooning is emerging as a promising method that can enhance road utilization, alleviate traffic congestion, and even decrease energy expenditure by shortening the distance between vehicles in platoon. In platooning, platoon leader (PL) required to communicate with members (PMs) issue instructions. this way, PMs are simply expected follow command enjoy their free time. However, when same instruction sent different form of single-hop unicast, ciphertext will go up quantity...
Cyber attacks pose significant threats to connected autonomous vehicles in intelligent transportation systems. threat intelligence (CTI), which involves collecting and analyzing cyber information, offers a promising approach addressing emerging vehicle enabling proactive security defenses. Obtaining valuable information from enormous cybersecurity data using knowledge extraction technologies achieve CTI modeling is an effective means ensure automotive cybersecurity. However, the lack of...
The fast progression of the Internet Vehicles (IoV) has resulted in a large number vehicles connecting to networks. This leads massive growth data collected from via IoV. Fortunately, cloud computing provides vast range services such as operating systems, hardware, software, and resources. Therefore, amount cumulated through IoV can be outsourced cloud. However, considering untrusted nature cloud, must encrypted before it is server. Unfortunately, this ensures difficulty while searching...
By virtue of intelligent data processing and vehicular network, Internet Vehicle (IoV) provides the transport system with real-time traffic information, which greatly improves conditions city. Moreover, to ease computing storage burden increasing number vehicle, edge is introduced offload tasks on local low latency. But it still suffers from integrity privacy concerns. To meet these challenges, this paper proposes an efficient conditional privacy-preserving authentication protocol using...
Autonomous Vehicle Platoon (AVP) is conceived as a promising solution to enhance the traffic capacity and reduce energy consumption in intelligent transportation system. Nevertheless, AVP without security guarantees are prone various attacks, which probably lead life-threatening accidents. Motivated by solving this issue, an outsourced attribute-based access control mechanism with direct revocation for (RFAP) introduced paper. Among them, encryption utilized implement fine-grained during...
As increasingly prevalent technologies in autonomous driving, 5G and the Internet of Things (IoT), vehicle (IoAV) technology is recognized as a technique that capable disruptively changing way people travel greatly improving experience. In IoAV scenarios, information dissemination inseparable from interaction between vehicles smart infrastructure. However, existing efforts rarely focus on secrecy, authenticity interactive data flexible one-to-many communication vehicles. this paper, we...
To ensure the normal work of whole system in context Internet Things (IoT), remote attestation for each smart device should be guaranteed. However, considering huge number devices, traditional individual schemes cannot meet requirements terms efficiency. In addition, protecting sensitive identity information related to devices also needs supported. Furthermore, avoiding security risks caused by secret key exposures is very important IoT, where compromise terminal frequently occurs. solve...
As an emerging field of communication, Vehicular Social Networks (VSNs) can reduce traffic congestion while enhancing road safety by sharing data among groups commuters. In VSNs, Cloud Server (VCS) based technology with encrypted primitives allows local users to outsource for reducing the storage burden on user side and without location restrictions. However, existing encryption solutions that have been applied in VSNs environments still encounter weaknesses efficiency, security, or privacy...
Autonomous Vehicle Platooning (AVP) presents a promising approach to reducing energy expenses, improving traffic safety, and enhancing capacity. In multi-platoon vehicular networks, platoons can collaborate ensure better data transfer reliability. However, the existing secure information-sharing methods between face efficiency security challenges. These challenges arise from (1) lack of an efficient method simultaneously confidentiality, authenticity, non-repudiation transmitted information;...
Abstract With the rapid development of Internet Vehicles, a great amount vehicles are connected to Vehicles environment. These can exchange data each other and upload cloud server for backup. Since contains some sensitive information, it is necessary encrypt before uploading server. However, this method severely hampers utilization because tremendous difficulty in search encrypted data. For addressing above issue, we propose novel certificateless public key encryption supporting equality...
As a promising technology, connected and autonomous vehicle (CAV) can reduce energy consumption improve transportation safety. Nevertheless, as more enabling technologies are embedded in vehicles, the CAV is becoming vulnerable to cybersecurity threats. Priority must be given highly sensitive, life-threatening vulnerabilities. Therefore, an improved vulnerability assessment method for CAVs proposed this article, which common scoring system (CVSS) Bayes theory adopted. Compared classical CVSS...