- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Vehicular Ad Hoc Networks (VANETs)
- Internet Traffic Analysis and Secure E-voting
- Cloud Data Security Solutions
- Advanced Authentication Protocols Security
- Smart Grid Security and Resilience
- Blockchain Technology Applications and Security
- Opportunistic and Delay-Tolerant Networks
- Network Security and Intrusion Detection
- Security in Wireless Sensor Networks
- IoT and Edge/Fog Computing
- User Authentication and Security Systems
- Mobile Ad Hoc Networks
- Complexity and Algorithms in Graphs
- Mobile Crowdsensing and Crowdsourcing
- Satellite Communication Systems
- IoT Networks and Protocols
- Advanced Malware Detection Techniques
- Data Management and Algorithms
- Privacy, Security, and Data Protection
- Age of Information Optimization
- Wireless Communication Security Techniques
- Cryptography and Residue Arithmetic
- Stochastic Gradient Optimization Techniques
University of New Brunswick
2016-2025
Queen's University
2025
Xi'an Jiaotong University
2024
Shanghai University
2024
Mastercard (United Kingdom)
2024
Tongji University
2024
Nanyang Technological University
2013-2021
Tokyo Institute of Technology
2021
Bank of Canada
2020-2021
Monash University
2021
Mobile users typically have high demand on localized and location-based information services. To always retrieve the data from remote cloud, however, tends to be inefficient, which motivates fog computing. The computing, also known as edge extends cloud computing by deploying facilities at premise of users, prestores distributes mobile with fast-rate local connections. As such, introduces an intermediate layer between complements toward low-latency high-rate services users. In this...
In this article, we introduce an Internet of Things application, smart community, which refers to a paradigmatic class cyber-physical systems with cooperating objects (i.e., networked homes). We then define the community architecture, and describe how realize secure robust networking among individual homes. present two applications, Neighborhood Watch Pervasive Healthcare, supporting techniques associated challenges, envision few valueadded services.
The accurately estimated state is of great importance for maintaining a stable running condition power systems. To maintain the accuracy state, bad data detection (BDD) utilized by systems to get rid erroneous measurements due meter failures or outside attacks. However, false injection (FDI) attacks, as recently revealed, can circumvent BDD and insert any bias into value state. Continuous works on constructing and/or protecting from such attacks have been done in recent years. This survey...
As a prime target of the quality privacy in vehicular ad hoc networks (VANETs), location is imperative for VANETs to fully flourish. Although frequent pseudonym changing provides promising solution VANETs, if pseudonyms are changed an improper time or location, such may become invalid. To cope with issue, this paper, we present effective at social spots (PCS) strategy achieve provable privacy. In particular, first introduce where several vehicles gather, e.g., road intersection when traffic...
Fog computing-enhanced Internet of Things (IoT) has recently received considerable attention, as the fog devices deployed at network edge can not only provide low latency, location awareness but also improve real-time and quality services in IoT application scenarios. Privacy-preserving data aggregation is one typical computing applications IoT, many privacy-preserving schemes have been proposed past years. However, most them support for homogeneous devices, cannot aggregate hybrid devices'...
Smart grid (SG) communication has recently received significant attentions to facilitate intelligent and distributed electric power transmission systems. However, trust security issues still present practical concerns the deployment of SG. In this paper, cope with these challenging concerns, we propose a lightweight message authentication scheme features as basic yet crucial component for secure SG framework. Specifically, in proposed scheme, smart meters which are at different hierarchical...
The rapid convergence of legacy industrial infrastructures with intelligent networking and computing technologies (e.g., 5G, software-defined networking, artificial intelligence), have dramatically increased the attack surface cyber-physical systems (CPSs). However, withstanding cyber threats to such large-scale, complex, heterogeneous CPSs has been extremely challenging, due insufficiency high-quality examples. In this article, we propose a novel federated deep learning scheme, named...
Smart grid has emerged as the next-generation power via convergence of system engineering and information communication technology. In this article, we describe smart goals tactics, present a threelayer network architecture. Following brief discussion about major challenges in development, elaborate on cyber security issues. We define taxonomy basic attacks, upon which sophisticated attack behaviors may be built. then introduce fundamental techniques, whose integration is essential for...
The emerging Internet-of-Things (IoT) are vulnerable to Sybil attacks where attackers can manipulate fake identities or abuse pseudoidentities compromise the effectiveness of IoT and even disseminate spam. In this paper, we survey defense schemes in IoT. Specifically, first define three types attacks: SA-1, SA-2, SA-3 according attacker's capabilities. We then present some schemes, including social graph-based detection (SGSD), behavior classification-based (BCSD), mobile with comprehensive...
Vehicular communication networking is a promising approach to facilitating road safety, traffic management, and infotainment dissemination for drivers passengers. One of the ultimate goals in design such resist various malicious abuses security attacks. In this article we first review current standardization process, which covers methods providing services preserving driver privacy wireless access vehicular environments (WAVE) applications. We then address two fundamental issues, certificate...
In this paper, we propose an efficient pseudonymous authentication scheme with strong privacy preservation (PASS), for vehicular communications. Unlike traditional schemes, the size of certificate revocation list (CRL) in PASS is linear number revoked vehicles and unrelated to how many certificates are held by vehicles. supports roadside unit (RSU)-aided distributed service that allows update on road, but overhead almost updated certificates. Furthermore, provides so adversaries cannot trace...
Big data, because it can mine new knowledge for economic growth and technical innovation, has recently received considerable attention, many research efforts have been directed to big data processing due its high volume, velocity, variety (referred as "3V") challenges. However, in addition the 3V challenges, flourishing of also hinges on fully understanding managing newly arising security privacy If are not authentic, mined will be unconvincing; while if is well addressed, people may...
Smart grid has recently emerged as the next generation of power due to its distinguished features, such distributed energy control, robust load fluctuations, and close user-grid interactions. As a vital component smart grid, demand response can maintain supply-demand balance reduce users' electricity bills. Furthermore, it is also critical preserve user privacy cyber security in grid. In this paper, we propose an efficient privacy-preserving (EPPDR) scheme which employs homomorphic...
With the proliferation of smart grid research, Advanced Metering Infrastructure (AMI) has become first ubiquitous and fixed computing platform. However, due to unique characteristics AMI, such as complex network structure, resource-constrained meter, privacy-sensitive data, it is an especially challenging issue make AMI secure. Energy theft one most important concerns related implementation. It estimated that utility companies lose more than $25 billion every year energy around world. To...
This paper investigates the problem of defending against false data injection (FDI) attacks on power system state estimation. Although many research works have been previously reported addressing same problem, most them made a very strong assumption that some meter measurements can be absolutely protected. To address practically, reasonable approach is to assume whether or not measurement could compromised by an adversary does depend defense budget deployed defender meter. From this...
Vehicular fog computing extends the paradigm to conventional vehicular networks. This allows us support more ubiquitous vehicles, achieve better communication efficiency, and address limitations in networks terms of latency, location awareness, real-time response (typically required smart traffic control, driving safety applications, entertainment services, other applications). Such requirements are particularly important adversarial environments (e.g., urban warfare battlefields Internet...
Addressing security and privacy issues is a prerequisite for market-ready vehicular communication network. Although recent related studies have already addressed most of these issues, few them taken scalability into consideration. When the traffic density becomes larger, vehicle cannot verify all signatures messages sent by its neighbors in timely manner, which results message loss. Communication overhead as another issue has also not been well previously reported studies. To deal with this...
Vehicular ad hoc networks (VANETs) have recently received significant attention in improving traffic safety and efficiency. However, communication trust user privacy still present practical concerns to the deployment of VANETs, as many existing authentication protocols for VANETs either suffer from heavy workload downloading latest revocation list a remote authority or cannot allow drivers on road decide trustworthiness message when messages is anonymous. In this paper, cope with these...
<para xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> Delay-tolerant networks (DTNs) provide a promising solution to support wide-ranging applications in the regions where end-to-end network connectivity is not available. In DTNs, intermediate nodes on communication path are expected store, carry, and forward in-transit messages (or bundles) an opportunistic way, which called data forwarding. Such forwarding method depends hypothesis that each...
Searching for a vacant parking space in congested area or large lot and preventing auto theft are major concerns to our daily lives. In this paper, we propose new smart scheme lots through vehicular communication. The proposed can provide the drivers with real-time navigation service, intelligent anti-theft protection, friendly information dissemination. Performance analysis via extensive simulations demonstrates its efficiency practicality.
Smart grid has emerged as the next generation of power grid, due to its reliability, flexibility, and efficiency. However, smart faces some critical security challenges such message injection attack replay attack. If these cannot be properly addressed, an adversary can maliciously launch injected or replayed attacks degrade performance grid. To cope with challenging issues, in this paper, we propose efficient authentication scheme that employs Merkle hash tree technique secure gird...
With the pervasiveness of smart phones and advance wireless body sensor networks (BSNs), mobile Healthcare (m-Healthcare), which extends operation provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, flourish m-Healthcare still faces many challenges including information security privacy preservation. In this paper, we propose secure privacy-preserving opportunistic computing framework, called SPOC, emergency. phone...
Clinical decision support system, which uses advanced data mining techniques to help clinician make proper decisions, has received considerable attention recently. The advantages of clinical system include not only improving diagnosis accuracy but also reducing time. Specifically, with large amounts generated everyday, naïve Bayesian classification can be utilized excavate valuable information improve a system. Although the is quite promising, flourish still faces many challenges including...
Nowadays, the Internet of Things (IoT) concept plays a pivotal role in society and brings new capabilities to different industries. The number IoT solutions areas such as transportation healthcare is increasing services are under development. In last decade, has experienced drastic increase connections. fact, connections will next few years across areas. Conversely, several challenges still need be faced enable efficient secure operations (e.g., interoperability, security, standards)....