Burong Kang

ORCID: 0000-0003-2431-236X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Security in Wireless Sensor Networks
  • Vehicular Ad Hoc Networks (VANETs)
  • Privacy-Preserving Technologies in Data
  • Advanced Authentication Protocols Security
  • Chaos-based Image/Signal Encryption
  • Mobile Crowdsensing and Crowdsourcing
  • Cloud Data Security Solutions
  • Smart Parking Systems Research
  • Mobile Ad Hoc Networks
  • Complexity and Algorithms in Graphs
  • Network Security and Intrusion Detection
  • Internet Traffic Analysis and Secure E-voting
  • Privacy, Security, and Data Protection
  • Human Mobility and Location-Based Analysis
  • Cellular Automata and Applications
  • Cryptographic Implementations and Security
  • Blockchain Technology Applications and Security
  • Advanced Steganography and Watermarking Techniques

China Telecom
2023-2024

China Telecom (China)
2023-2024

East China Normal University
2018-2023

Shanghai Key Laboratory of Trustworthy Computing
2018-2022

State Key Laboratory of Cryptology
2020-2021

Northwest Normal University
2016

To deal with the security and privacy issues in vehicular ad hoc network (VANET), digital signature based on public key infrastructure (PKI) is recognized as being most mature popular approach. However, existing secure privacy-preserving schemes for communications face some challenges, e.g., fast verification of signatures certificates, reducing storage/transmission overheads, avoiding dependence ideal tamper-proof devices. In this paper, we propose a hybrid hierarchical...

10.1109/tvt.2022.3189540 article EN IEEE Transactions on Vehicular Technology 2022-07-11

Industrial wireless networks (IWNs) have applications in areas such as critical infrastructure sectors and manufacturing industries car manufacturing. In manufacturing, IWNs can facilitate manufacturers to improve the design of vehicles by collecting vehicular status other related data (such an IWN is also known ad hoc networks—VANETs). Vehicle positioning a key functionality VANETs. Most existing vehicle systems are capable providing accurate 2D positioning, but demand for 3D has increased...

10.1186/s13638-018-1289-9 article EN cc-by EURASIP Journal on Wireless Communications and Networking 2018-11-29

In cloud computing, resources are usually in service provider's network and typically accessed remotely by the users via public channels. Key agreement enables secure channel establishment over a for communications between user provider. Existing key protocols computing suffer from some challenges, e.g., realizing low connection delay, eliminating certificate management problem, enhancing privacy avoiding bad randomness. To tackle these we propose certificateless 0-RTT anonymous AKA protocol...

10.1109/tcc.2020.3008795 article EN IEEE Transactions on Cloud Computing 2020-07-13

The increasing popularity of smart vehicles and vehicular ad hoc networks (VANETs) has reinforced the importance Internet connectivity. However, existing solutions (e.g., those based on cooperative downloading via drive-thru Internet) have a number limitations, partly due to challenges in selecting reliable proxy fast moving driving situation, balancing between flexible data achieving strong security. Therefore, this paper we propose secure, robust scheme our reputation selection mechanism...

10.1109/access.2020.3048273 article EN cc-by IEEE Access 2020-12-30

With the development of vehicular ad hoc network (VANET) technology, more and smart parking systems in VANETs are presented. However, existing solutions suffer from challenges dishonest lots that may claim there empty spots than they actually have, malicious occupation multi-reservation attack, etc. To address these challenges, we propose a secure reliable protocol based on blockchain linkable group signatures. For security our scheme, it not only realizes traditional authentication, privacy...

10.1109/wcnc49053.2021.9417281 article EN 2022 IEEE Wireless Communications and Networking Conference (WCNC) 2021-03-29

With the rocketing progress of fifth generation (5G) mobile communication technology, identity-based authenticated key agreement (ID-AKA) protocol performs an increasingly significant part in secure communication. The majority current efficient and ID-AKA protocols need to transmit each participant's identity public information clear. Moreover, long-term secret keys participants are fully handled by generate center, which may give rise new security concerns. To protect privacy user's ensure...

10.1109/access.2024.3428547 article EN cc-by-nc-nd IEEE Access 2024-01-01

Most of the existing cryptographic schemes, e.g., key agreement protocol, call for good randomness. Otherwise, security these schemes cannot be fully guaranteed. Nonce-based cryptosystem is recently introduced to improve public encryption and digital signature by ensuring when randomness fails. In this paper, we first investigate protocols Then define model nonce-based propose a protocol that protects against bad The new proven secure in our proposed model.

10.1142/s0129054119400161 article EN International Journal of Foundations of Computer Science 2019-06-01

Task allocation is a significant research issue in Mobile Crowd Sensing, and on Crowd-Sensing has indicated that it can be applied Vehicle Ad Hoc Networks. However, few of the works pay attention to task issues Crowd-Sensing. In our paper, we propose scheme order make applicable Networks, introduce Markov location prediction scheme, which perform before allocation, differential privacy mechanism protect vehicles. Besides, design calculation method completion rate ensure probability...

10.1109/auteee50969.2020.9315595 article EN 2020 IEEE 3rd International Conference on Automation, Electronics and Electrical Engineering (AUTEEE) 2020-11-20

In public-key encryption (PKE), ciphertexts received by a receiver may be possibly correlated and the security of PKE relies on honestly generated system parameters. Security against selective opening attacks (SOA) for guarantees that even when an attacker has broken into subset opened them (i.e., seeing plaintexts random bits), unopened remain secure. While parameter subversion (PSA) requires public parameters are maliciously generated, scheme should this paper, we initiate study secure...

10.1155/2021/5895809 article EN cc-by Security and Communication Networks 2021-10-23

Recently, the chaotic public-key cryptography attracts much attention of researchers, due to great characters maps. With security superiorities and computation efficiencies map over other cryptosystems, in this paper, a novel Identity-based signcryption scheme is proposed using extended The difficulty chaos-based discrete logarithm (CDL) problem lies foundation ECM-IBSC scheme.

10.1109/is3c.2016.198 article EN 2016-07-01

Fog computing (FC) is introduced as an extended technique of cloud computing. FC makes it possible to compute straightly on the brim network. In application systems, authentication important security requirement when fog nodes communicate with other devices. Digital signature (DS) has been widely used in systems provide non-repudiation, authenticity along data integrity. However, some latest research results demonstate that DS schemes may confront algorithm substitution attack (ASA). That...

10.1109/csecs60003.2023.10428227 article EN 2023-12-22

Crowd sensing, an important research direction in wireless communication, realizes the allocation and collection of tasks through smart devices carried by users. However, task process, how to protect user privacy from being leaked select high-quality users guarantee quality completion are two major challenges. Particularly, individual service (QoS) affects completion. In this paper, we propose a differentially private scheme. During process allocation, differential is utilized for location...

10.1109/icaiis49377.2020.9194848 article EN 2020-03-01
Coming Soon ...