B
Bo Sheng
Researcher at University of Massachusetts Boston
Publications - 85
Citations - 3144
Bo Sheng is an academic researcher from University of Massachusetts Boston. The author has contributed to research in topics: Wireless sensor network & Scheduling (computing). The author has an hindex of 28, co-authored 83 publications receiving 2987 citations. Previous affiliations of Bo Sheng include Northeastern University & University of Massachusetts Amherst.
Papers
More filters
Proceedings ArticleDOI
Outlier detection in sensor networks
TL;DR: A histogram-based method for outlier detection to reduce communication cost by collecting hints (in the form of a histogram) about the data distribution, and using the hints to filter out unnecessary data and identify potential outliers.
Journal ArticleDOI
Secure and Serverless RFID Authentication and Search Protocols
Chiu C. Tan,Bo Sheng,Qun Li +2 more
TL;DR: A more flexible authentication protocol that provides comparable protection without the need for a central database is proposed and a protocol for secure search for RFID tags is suggested.
Journal ArticleDOI
Elliptic curve cryptography-based access control in sensor networks
Haodong Wang,Bo Sheng,Qun Li +2 more
TL;DR: Against the popular belief that a public key scheme is not practical for sensor networks, this paper describes a public-key implementation of access control in a sensor network and details the implementation of Elliptic Curve Cryptography over primary field on TelosB, which is the latest sensor network platform.
Proceedings ArticleDOI
Counting RFID Tags Efficiently and Anonymously
TL;DR: This paper presents an efficient and anonymous scheme for tag population estimation that leverages the position of the first reply from a group of tags in a frame and outperforms other protocols proposed in the previous work.
Proceedings ArticleDOI
How to Monitor for Missing RFID tags
Chiu C. Tan,Bo Sheng,Qun Li +2 more
TL;DR: This paper considers the problem of how to accurately and efficiently monitor a set of RFID tags for missing tags and presents two monitoring protocols, one designed for a trusted reader and another for an untrusted reader.