H
Hao Chi Wong
Researcher at PARC
Publications - 23
Citations - 1946
Hao Chi Wong is an academic researcher from PARC. The author has contributed to research in topics: Wireless sensor network & Key distribution in wireless sensor networks. The author has an hindex of 13, co-authored 23 publications receiving 1903 citations. Previous affiliations of Hao Chi Wong include Universidade Federal de Minas Gerais.
Papers
More filters
Proceedings ArticleDOI
Decentralized intrusion detection in wireless sensor networks
Ana Paula Ribeiro da Silva,Marcelo H. T. Martins,Bruno P. S. Rocha,Antonio A. F. Loureiro,Linnyer B. Ruiz,Hao Chi Wong +5 more
TL;DR: This work proposes an IDS that fits the demands and restrictions of WSNs and results reveal that the proposed IDS is efficient and accurate in detecting different kinds of simulated attacks.
Proceedings ArticleDOI
Secret handshakes from pairing-based key agreements
TL;DR: A formal definition for secure secret handshakes is proposed, and it is proved that the pairing-based schemes are secure under the Bilinear Diffie-Hellman assumption.
Proceedings ArticleDOI
SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks
TL;DR: This work shows how random key predistribution, widely studied in the context of flat networks, can be used to secure communication in hierarchical (cluster-based) protocols such as LEACH.
Proceedings ArticleDOI
Fault management in event-driven wireless sensor networks
Linnyer B. Ruiz,Isabela G. Siqueira,Leonardo B. Oliveira,Hao Chi Wong,José Marcos S. Nogueira,Antonio A. F. Loureiro +5 more
TL;DR: This work proposes and evaluates a failure detection scheme using a management architecture for WSNs, called MANNA, and takes a deep look at its fault management capabilities supposing the existence of an event-driven WSN.
Proceedings ArticleDOI
Malicious node detection in wireless sensor networks
TL;DR: This work provides a solution to identify malicious nodes in wireless sensor networks through detection of malicious message transmissions in a network and protocols for detecting suspicious transmissions and the consequent identification of malicious nodes and for disseminating this information in the network.