H
Helen Tang
Researcher at Defence Research and Development Canada
Publications - 25
Citations - 1086
Helen Tang is an academic researcher from Defence Research and Development Canada. The author has contributed to research in topics: Mobile ad hoc network & Authentication. The author has an hindex of 11, co-authored 25 publications receiving 727 citations.
Papers
More filters
Journal ArticleDOI
A Survey of Blockchain Technology Applied to Smart Cities: Research Issues and Challenges
TL;DR: A comprehensive survey on the literature involving blockchain technology applied to smart cities, from the perspectives of smart citizen, smart healthcare, smart grid, smart transportation, supply chain management, and others is provided.
Proceedings ArticleDOI
Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios
TL;DR: This paper presents a consensus-based cooperative spectrum sensing scheme to counter SSDF attacks in CR-MANETs, based on recent advances in consensus algorithms that have taken inspiration from self-organizing behavior of animal groups such as fish.
Journal ArticleDOI
Security and Privacy of Smart Cities: A Survey, Research Issues and Challenges
TL;DR: A comprehensive survey of security and privacy issues of smart cities is delineated, and a basis for categorizing the present and future developments within this area is presented, to highlight the security requirements for designing a secure smart city.
Journal ArticleDOI
Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks
TL;DR: In this article, a distributed combined authentication and intrusion detection with data fusion in high-security mobile ad hoc networks (MANETs) is proposed. But the proposed scheme is not suitable for continuous user-to-device authentication in MANETs.
Journal ArticleDOI
Security and quality of service (QoS) co-design in cooperative mobile ad hoc networks
TL;DR: A game-theoretic approach to quantitatively analyze the attack strategies of the attacker so as to make a rational decision on relay selection and the authentication parameter adaptation to reach a trade-off between security and QoS in CO-MANETs.