Maode Ma
YOU?
Author Swipe
View article: A robust and efficient authentication and key agreement for UAV-assisted AGS communication in internet of vessels
A robust and efficient authentication and key agreement for UAV-assisted AGS communication in internet of vessels Open
The UAV-assisted Air-Ground-Sea (AGS) communication, due to its flexibility and extensive coverage, provides robust support for maritime trade and rescue services. However, in the complex network environment of the Internet of Vessels, AGS…
View article: GDM-DTM: A Group Decision-Making-Enabled Dynamic Trust Management Method for Malicious Node Detection in Low-Altitude UAV Networks
GDM-DTM: A Group Decision-Making-Enabled Dynamic Trust Management Method for Malicious Node Detection in Low-Altitude UAV Networks Open
As a core enabler of the emerging low-altitude economy, UAV networks face significant security risks during operation, including malicious node infiltration and data tampering. Existing trust management schemes suffer from deficiencies suc…
View article: ECAE: An Efficient Certificateless Aggregate Signature Scheme Based on Elliptic Curves for NDN-IoT Environments
ECAE: An Efficient Certificateless Aggregate Signature Scheme Based on Elliptic Curves for NDN-IoT Environments Open
As a data-centric next-generation network architecture, Named Data Networking (NDN) exhibits inherent compatibility with the distributed nature of the Internet of Things (IoT) through its name-based routing mechanism. However, existing sig…
View article: UAP: A System Authentication Protocol for UAV Relay Communication by UAV-Assisted
UAP: A System Authentication Protocol for UAV Relay Communication by UAV-Assisted Open
In recent years, advancements in Unmanned Aerial Vehicle (UAV) technology have led to the emergence of the Internet of Drones (IoD), further enhanced by the capabilities of 5th generation mobile network (5G). UAVs are widely used in variou…
View article: Routing protocols strategies for flying Ad-Hoc network (FANET): Review, taxonomy, and open research issues
Routing protocols strategies for flying Ad-Hoc network (FANET): Review, taxonomy, and open research issues Open
A Flying Ad Hoc Network (FANET) is a self-organizing wireless network comprised of clusters of Unmanned Aerial Vehicles (UAVs) or drones that communicate while nearby. FANETs are increasingly used in a variety of applications, including sm…
View article: EAIA: An Efficient and Anonymous Identity-Authentication Scheme in 5G-V2V
EAIA: An Efficient and Anonymous Identity-Authentication Scheme in 5G-V2V Open
Vehicle Ad-hoc Networks (VANETs) have experienced significant development in recent years, playing a crucial role in enhancing the driving experience by enabling safer and more efficient inter-vehicle interactions through information excha…
View article: Application of Deep Reinforcement Learning in Heterogeneous Sensor Networks
Application of Deep Reinforcement Learning in Heterogeneous Sensor Networks Open
With the wide and rapid development of wireless sensor networks (WSNs), current WSNs have become more and more complex with lager capacity, which need emerging technologies to support. For example, artificial intelligence (AI) technology i…
View article: A literature review on V2X communications security: Foundation, solutions, status, and future
A literature review on V2X communications security: Foundation, solutions, status, and future Open
With the refinement and development of the Vehicle to Everything (V2X) concept, its security issues have gradually come to the fore, revealing many security risks and increasing security requirements for V2X, and many protective measures h…
View article: EAIA: An Efficient and Anonymous Identity Authentication Scheme in 5G-V2V
EAIA: An Efficient and Anonymous Identity Authentication Scheme in 5G-V2V Open
Vehicle Ad-hoc Networks (VANETs) have experienced significant development in recent years, playing a crucial role in enhancing the driving experience by enabling safer and more efficient inter-vehicle interactions through information excha…
View article: A Blockchain-Assisted Security Protocol for Group Handover of MTC Devices in 5G Wireless Networks
A Blockchain-Assisted Security Protocol for Group Handover of MTC Devices in 5G Wireless Networks Open
In the realm of the fifth-generation (5G) wireless cellular networks, renowned for their dense connectivity, there lies a substantial facilitation of a myriad of Internet of Things (IoT) applications, which can be supported by the massive …
View article: Risk Assessment Edge Contract for Efficient Resource Allocation
Risk Assessment Edge Contract for Efficient Resource Allocation Open
The rapid growth of edge devices and mobile applications has driven the adoption of edge computing to handle computing tasks closer to end-users. However, the heterogeneity of edge devices and their limited computing resources raise challe…
View article: Federated Learning with Efficient Aggregation via Markov Decision Process in Edge Networks
Federated Learning with Efficient Aggregation via Markov Decision Process in Edge Networks Open
Federated Learning (FL), as an emerging paradigm in distributed machine learning, has received extensive research attention. However, few works consider the impact of device mobility on the learning efficiency of FL. In fact, it is detrime…
View article: ASAP-IIOT: An Anonymous Secure Authentication Protocol for Industrial Internet of Things
ASAP-IIOT: An Anonymous Secure Authentication Protocol for Industrial Internet of Things Open
With the increasing demand for a digital world, the Industrial Internet of Things (IIoT) is growing rapidly across various industries. In manufacturing, particularly in Industry 4.0, the IIoT assumes a vital role. It encompasses many devic…
View article: A Noval and Efficient Three-Party Identity Authentication and Key Negotiation Protocol Based on Elliptic Curve Cryptography in VANETs
A Noval and Efficient Three-Party Identity Authentication and Key Negotiation Protocol Based on Elliptic Curve Cryptography in VANETs Open
In the process of vehicles transitioning from conventional means of transportation to mobile computing platforms, ensuring secure communication and data exchange is of paramount importance. Consequently, identity authentication has emerged…
View article: A Novel Security Scheme Supported by Certificateless Digital Signature and Blockchain in Named Data Networking
A Novel Security Scheme Supported by Certificateless Digital Signature and Blockchain in Named Data Networking Open
Named Data Networking (NDN) is a promising network architecture that differs from the traditional TCP/IP network, as it focuses on data rather than the host. A new secure model is required to provide the data‐oriented trust instead of the …
View article: Minimizing energy consumption of IoT devices for O-RAN based IoT systems
Minimizing energy consumption of IoT devices for O-RAN based IoT systems Open
The implementation of Open Radio Access Network (O-RAN) architecture in Internet of Things (IoT) systems has garnered significant attention as a means to fulfill the stringent requirements of ultra-low latency and ultra-low energy consumpt…
View article: AI for Anomaly Detection in IoT
AI for Anomaly Detection in IoT Open
The Internet of Things (IoT) is today’s rapidly growing technology that consists of a massive number of smart devices. The advent of IoT has brought about huge prospects of innovation and opportunities on the domestic as well as industry l…
View article: AI for Anomaly Detection in IoT
AI for Anomaly Detection in IoT Open
The Internet of Things (IoT) is today’s rapidly growing technology that consists of a massive number of smart devices. The advent of IoT has brought about huge prospects of innovation and opportunities on the domestic as well as industry l…
View article: An Adaptive Deep Learning Neural Network Model to Enhance Machine-Learning-Based Classifiers for Intrusion Detection in Smart Grids
An Adaptive Deep Learning Neural Network Model to Enhance Machine-Learning-Based Classifiers for Intrusion Detection in Smart Grids Open
Modern smart grids are built based on top of advanced computing and networking technologies, where condition monitoring relies on secure cyberphysical connectivity. Over the network infrastructure, transported data containing confidential …
View article: Effective Authentication to Prevent Sybil Attacks in Vehicular Platoons
Effective Authentication to Prevent Sybil Attacks in Vehicular Platoons Open
The potential ability to increase the capacity and safety on roads, as well as fuel economy gains has made vehicle platooning an appealing prospect. However, its use is yet to be widespread, partially due to the security concerns on it. On…
View article: Secure Vehicular Platoon Management against Sybil Attacks
Secure Vehicular Platoon Management against Sybil Attacks Open
The capacity of highways has been an ever-present constraint in the 21st century, bringing about the issue of safety with greater likelihoods of traffic accidents occurring. Furthermore, recent global oil prices have inflated to record lev…
View article: Efficient Group Handover Authentication for Secure 5G-Based Communications in Platoons
Efficient Group Handover Authentication for Secure 5G-Based Communications in Platoons Open
In recent years, the world of vehicular communication is in full progress. With the emergence of the fifth-generation (5G) technology, the high bandwidth and low latency features in the 5G vehicle to everything (5G-V2X) network become poss…
View article: An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking
An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking Open
Named data networking (NDN) has been viewed as a promising future Internet architecture due to its data-centric design. It requires a new security model that is orienting data but not devices. In this paper, an advanced hierarchical identi…
View article: Edge intelligence‐enabled cyber‐physical systems
Edge intelligence‐enabled cyber‐physical systems Open
With the advent of the Internet of everything era, people's demand for intelligent Internet of Things (IoT) devices is steadily increasing. A more intelligent cyber-physical system (CPS) is needed to meet the diverse business requirements …
View article: A Noval and Efficient ECC-Based Authenticated Key Agreement Scheme for Smart Metering in the Smart Grid
A Noval and Efficient ECC-Based Authenticated Key Agreement Scheme for Smart Metering in the Smart Grid Open
With the gradual maturity of the smart grid (SG), security challenges have become one of the important issues that needs to be addressed urgently. In SG, the identity authentication and key agreement protocol between a smart meter (SMSM) a…
View article: Certrust: An SDN-Based Framework for the Trust of Certificates against Crossfire Attacks in IoT Scenarios
Certrust: An SDN-Based Framework for the Trust of Certificates against Crossfire Attacks in IoT Scenarios Open
The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate flows. Traditional methods to identify the malicious flows in Crossfire attacks are rerouting, which is based on statistics. In these existing…
View article: A Robust Vertical Handover Authentication Scheme for SDN Based 5G HetNets
A Robust Vertical Handover Authentication Scheme for SDN Based 5G HetNets Open
The fifth-generation mobile network is the next paradigm that is expected to bring solutions to the problem of the 4G technology. Also, the expectation is to have the fastest, most reliable network access to support huge data traffic and m…
View article: A FeedForward–Convolutional Neural Network to Detect Low-Rate DoS in IoT
A FeedForward–Convolutional Neural Network to Detect Low-Rate DoS in IoT Open
The lack of standardization and the heterogeneous nature of the Internet of Things (IoT) has exacerbated the issue of security and privacy. In literature, to improve security at the network layer of the IoT architecture, the possibility of…