Rongxing Lu

ORCID: 0000-0001-5720-0941
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Vehicular Ad Hoc Networks (VANETs)
  • Internet Traffic Analysis and Secure E-voting
  • Cloud Data Security Solutions
  • Advanced Authentication Protocols Security
  • Smart Grid Security and Resilience
  • Blockchain Technology Applications and Security
  • Opportunistic and Delay-Tolerant Networks
  • Network Security and Intrusion Detection
  • Security in Wireless Sensor Networks
  • IoT and Edge/Fog Computing
  • User Authentication and Security Systems
  • Mobile Ad Hoc Networks
  • Complexity and Algorithms in Graphs
  • Mobile Crowdsensing and Crowdsourcing
  • Satellite Communication Systems
  • IoT Networks and Protocols
  • Advanced Malware Detection Techniques
  • Data Management and Algorithms
  • Privacy, Security, and Data Protection
  • Age of Information Optimization
  • Wireless Communication Security Techniques
  • Cryptography and Residue Arithmetic
  • Stochastic Gradient Optimization Techniques

University of New Brunswick
2016-2025

Queen's University
2025

Xi'an Jiaotong University
2024

Shanghai University
2024

Mastercard (United Kingdom)
2024

Tongji University
2024

Nanyang Technological University
2013-2021

Tokyo Institute of Technology
2021

Bank of Canada
2020-2021

Monash University
2021

Mobile users typically have high demand on localized and location-based information services. To always retrieve the data from remote cloud, however, tends to be inefficient, which motivates fog computing. The computing, also known as edge extends cloud computing by deploying facilities at premise of users, prestores distributes mobile with fast-rate local connections. As such, introduces an intermediate layer between complements toward low-latency high-rate services users. In this...

10.1109/jiot.2016.2565516 article EN IEEE Internet of Things Journal 2016-01-01

In this article, we introduce an Internet of Things application, smart community, which refers to a paradigmatic class cyber-physical systems with cooperating objects (i.e., networked homes). We then define the community architecture, and describe how realize secure robust networking among individual homes. present two applications, Neighborhood Watch Pervasive Healthcare, supporting techniques associated challenges, envision few valueadded services.

10.1109/mcom.2011.6069711 article EN IEEE Communications Magazine 2011-11-01

The accurately estimated state is of great importance for maintaining a stable running condition power systems. To maintain the accuracy state, bad data detection (BDD) utilized by systems to get rid erroneous measurements due meter failures or outside attacks. However, false injection (FDI) attacks, as recently revealed, can circumvent BDD and insert any bias into value state. Continuous works on constructing and/or protecting from such attacks have been done in recent years. This survey...

10.1109/tii.2016.2614396 article EN IEEE Transactions on Industrial Informatics 2016-09-28

As a prime target of the quality privacy in vehicular ad hoc networks (VANETs), location is imperative for VANETs to fully flourish. Although frequent pseudonym changing provides promising solution VANETs, if pseudonyms are changed an improper time or location, such may become invalid. To cope with issue, this paper, we present effective at social spots (PCS) strategy achieve provable privacy. In particular, first introduce where several vehicles gather, e.g., road intersection when traffic...

10.1109/tvt.2011.2162864 article EN IEEE Transactions on Vehicular Technology 2011-08-03

Fog computing-enhanced Internet of Things (IoT) has recently received considerable attention, as the fog devices deployed at network edge can not only provide low latency, location awareness but also improve real-time and quality services in IoT application scenarios. Privacy-preserving data aggregation is one typical computing applications IoT, many privacy-preserving schemes have been proposed past years. However, most them support for homogeneous devices, cannot aggregate hybrid devices'...

10.1109/access.2017.2677520 article EN cc-by-nc-nd IEEE Access 2017-01-01

Smart grid (SG) communication has recently received significant attentions to facilitate intelligent and distributed electric power transmission systems. However, trust security issues still present practical concerns the deployment of SG. In this paper, cope with these challenging concerns, we propose a lightweight message authentication scheme features as basic yet crucial component for secure SG framework. Specifically, in proposed scheme, smart meters which are at different hierarchical...

10.1109/tsg.2011.2160661 article EN IEEE Transactions on Smart Grid 2011-08-16

The rapid convergence of legacy industrial infrastructures with intelligent networking and computing technologies (e.g., 5G, software-defined networking, artificial intelligence), have dramatically increased the attack surface cyber-physical systems (CPSs). However, withstanding cyber threats to such large-scale, complex, heterogeneous CPSs has been extremely challenging, due insufficiency high-quality examples. In this article, we propose a novel federated deep learning scheme, named...

10.1109/tii.2020.3023430 article EN IEEE Transactions on Industrial Informatics 2020-09-11

Smart grid has emerged as the next-generation power via convergence of system engineering and information communication technology. In this article, we describe smart goals tactics, present a threelayer network architecture. Following brief discussion about major challenges in development, elaborate on cyber security issues. We define taxonomy basic attacks, upon which sophisticated attack behaviors may be built. then introduce fundamental techniques, whose integration is essential for...

10.1109/mcom.2012.6257525 article EN IEEE Communications Magazine 2012-08-01

The emerging Internet-of-Things (IoT) are vulnerable to Sybil attacks where attackers can manipulate fake identities or abuse pseudoidentities compromise the effectiveness of IoT and even disseminate spam. In this paper, we survey defense schemes in IoT. Specifically, first define three types attacks: SA-1, SA-2, SA-3 according attacker's capabilities. We then present some schemes, including social graph-based detection (SGSD), behavior classification-based (BCSD), mobile with comprehensive...

10.1109/jiot.2014.2344013 article EN IEEE Internet of Things Journal 2014-07-30

Vehicular communication networking is a promising approach to facilitating road safety, traffic management, and infotainment dissemination for drivers passengers. One of the ultimate goals in design such resist various malicious abuses security attacks. In this article we first review current standardization process, which covers methods providing services preserving driver privacy wireless access vehicular environments (WAVE) applications. We then address two fundamental issues, certificate...

10.1109/mcom.2008.4481346 article EN IEEE Communications Magazine 2008-04-01

In this paper, we propose an efficient pseudonymous authentication scheme with strong privacy preservation (PASS), for vehicular communications. Unlike traditional schemes, the size of certificate revocation list (CRL) in PASS is linear number revoked vehicles and unrelated to how many certificates are held by vehicles. supports roadside unit (RSU)-aided distributed service that allows update on road, but overhead almost updated certificates. Furthermore, provides so adversaries cannot trace...

10.1109/tvt.2010.2051468 article EN IEEE Transactions on Vehicular Technology 2010-06-14

Big data, because it can mine new knowledge for economic growth and technical innovation, has recently received considerable attention, many research efforts have been directed to big data processing due its high volume, velocity, variety (referred as "3V") challenges. However, in addition the 3V challenges, flourishing of also hinges on fully understanding managing newly arising security privacy If are not authentic, mined will be unconvincing; while if is well addressed, people may...

10.1109/mnet.2014.6863131 article EN IEEE Network 2014-07-01

Smart grid has recently emerged as the next generation of power due to its distinguished features, such distributed energy control, robust load fluctuations, and close user-grid interactions. As a vital component smart grid, demand response can maintain supply-demand balance reduce users' electricity bills. Furthermore, it is also critical preserve user privacy cyber security in grid. In this paper, we propose an efficient privacy-preserving (EPPDR) scheme which employs homomorphic...

10.1109/tpds.2013.124 article EN IEEE Transactions on Parallel and Distributed Systems 2013-04-19

With the proliferation of smart grid research, Advanced Metering Infrastructure (AMI) has become first ubiquitous and fixed computing platform. However, due to unique characteristics AMI, such as complex network structure, resource-constrained meter, privacy-sensitive data, it is an especially challenging issue make AMI secure. Energy theft one most important concerns related implementation. It estimated that utility companies lose more than $25 billion every year energy around world. To...

10.1109/tst.2014.6787363 article EN Tsinghua Science & Technology 2014-04-01

This paper investigates the problem of defending against false data injection (FDI) attacks on power system state estimation. Although many research works have been previously reported addressing same problem, most them made a very strong assumption that some meter measurements can be absolutely protected. To address practically, reasonable approach is to assume whether or not measurement could compromised by an adversary does depend defense budget deployed defender meter. From this...

10.1109/tii.2015.2470218 article EN IEEE Transactions on Industrial Informatics 2015-08-19

Vehicular fog computing extends the paradigm to conventional vehicular networks. This allows us support more ubiquitous vehicles, achieve better communication efficiency, and address limitations in networks terms of latency, location awareness, real-time response (typically required smart traffic control, driving safety applications, entertainment services, other applications). Such requirements are particularly important adversarial environments (e.g., urban warfare battlefields Internet...

10.1109/mcom.2017.1700322 article EN IEEE Communications Magazine 2017-11-01

Addressing security and privacy issues is a prerequisite for market-ready vehicular communication network. Although recent related studies have already addressed most of these issues, few them taken scalability into consideration. When the traffic density becomes larger, vehicle cannot verify all signatures messages sent by its neighbors in timely manner, which results message loss. Communication overhead as another issue has also not been well previously reported studies. To deal with this...

10.1109/icc.2008.281 article EN IEEE International Conference on Communications 2008-01-01

Vehicular ad hoc networks (VANETs) have recently received significant attention in improving traffic safety and efficiency. However, communication trust user privacy still present practical concerns to the deployment of VANETs, as many existing authentication protocols for VANETs either suffer from heavy workload downloading latest revocation list a remote authority or cannot allow drivers on road decide trustworthiness message when messages is anonymous. In this paper, cope with these...

10.1109/tvt.2015.2405853 article EN IEEE Transactions on Vehicular Technology 2015-02-24

<para xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> Delay-tolerant networks (DTNs) provide a promising solution to support wide-ranging applications in the regions where end-to-end network connectivity is not available. In DTNs, intermediate nodes on communication path are expected store, carry, and forward in-transit messages (or bundles) an opportunistic way, which called data forwarding. Such forwarding method depends hypothesis that each...

10.1109/tvt.2009.2020105 article EN IEEE Transactions on Vehicular Technology 2009-04-03

Searching for a vacant parking space in congested area or large lot and preventing auto theft are major concerns to our daily lives. In this paper, we propose new smart scheme lots through vehicular communication. The proposed can provide the drivers with real-time navigation service, intelligent anti-theft protection, friendly information dissemination. Performance analysis via extensive simulations demonstrates its efficiency practicality.

10.1109/infcom.2009.5062057 article EN 2009-04-01

Smart grid has emerged as the next generation of power grid, due to its reliability, flexibility, and efficiency. However, smart faces some critical security challenges such message injection attack replay attack. If these cannot be properly addressed, an adversary can maliciously launch injected or replayed attacks degrade performance grid. To cope with challenging issues, in this paper, we propose efficient authentication scheme that employs Merkle hash tree technique secure gird...

10.1109/jsyst.2013.2271537 article EN IEEE Systems Journal 2013-07-18

With the pervasiveness of smart phones and advance wireless body sensor networks (BSNs), mobile Healthcare (m-Healthcare), which extends operation provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, flourish m-Healthcare still faces many challenges including information security privacy preservation. In this paper, we propose secure privacy-preserving opportunistic computing framework, called SPOC, emergency. phone...

10.1109/tpds.2012.146 article EN IEEE Transactions on Parallel and Distributed Systems 2013-01-30

Clinical decision support system, which uses advanced data mining techniques to help clinician make proper decisions, has received considerable attention recently. The advantages of clinical system include not only improving diagnosis accuracy but also reducing time. Specifically, with large amounts generated everyday, naïve Bayesian classification can be utilized excavate valuable information improve a system. Although the is quite promising, flourish still faces many challenges including...

10.1109/jbhi.2015.2407157 article EN IEEE Journal of Biomedical and Health Informatics 2015-02-24

Nowadays, the Internet of Things (IoT) concept plays a pivotal role in society and brings new capabilities to different industries. The number IoT solutions areas such as transportation healthcare is increasing services are under development. In last decade, has experienced drastic increase connections. fact, connections will next few years across areas. Conversely, several challenges still need be faced enable efficient secure operations (e.g., interoperability, security, standards)....

10.3390/s23135941 article EN cc-by Sensors 2023-06-26
Coming Soon ...