scispace - formally typeset
H

Helen Tang

Researcher at Defence Research and Development Canada

Publications -  25
Citations -  1086

Helen Tang is an academic researcher from Defence Research and Development Canada. The author has contributed to research in topics: Mobile ad hoc network & Authentication. The author has an hindex of 11, co-authored 25 publications receiving 727 citations.

Papers
More filters
Journal ArticleDOI

A Survey of Blockchain Technology Applied to Smart Cities: Research Issues and Challenges

TL;DR: A comprehensive survey on the literature involving blockchain technology applied to smart cities, from the perspectives of smart citizen, smart healthcare, smart grid, smart transportation, supply chain management, and others is provided.
Proceedings ArticleDOI

Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios

TL;DR: This paper presents a consensus-based cooperative spectrum sensing scheme to counter SSDF attacks in CR-MANETs, based on recent advances in consensus algorithms that have taken inspiration from self-organizing behavior of animal groups such as fish.
Journal ArticleDOI

Security and Privacy of Smart Cities: A Survey, Research Issues and Challenges

TL;DR: A comprehensive survey of security and privacy issues of smart cities is delineated, and a basis for categorizing the present and future developments within this area is presented, to highlight the security requirements for designing a secure smart city.
Journal ArticleDOI

Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks

TL;DR: In this article, a distributed combined authentication and intrusion detection with data fusion in high-security mobile ad hoc networks (MANETs) is proposed. But the proposed scheme is not suitable for continuous user-to-device authentication in MANETs.
Journal ArticleDOI

Security and quality of service (QoS) co-design in cooperative mobile ad hoc networks

TL;DR: A game-theoretic approach to quantitatively analyze the attack strategies of the attacker so as to make a rational decision on relay selection and the authentication parameter adaptation to reach a trade-off between security and QoS in CO-MANETs.