scispace - formally typeset
X

Xiaodong Lin

Researcher at University of Guelph

Publications -  337
Citations -  18654

Xiaodong Lin is an academic researcher from University of Guelph. The author has contributed to research in topics: Information privacy & Authentication. The author has an hindex of 61, co-authored 315 publications receiving 15199 citations. Previous affiliations of Xiaodong Lin include University of Ontario Institute of Technology & University of Waterloo.

Papers
More filters
Journal ArticleDOI

Privacy-Preserving Traffic Monitoring with False Report Filtering via Fog-assisted Vehicular Crowdsensing

TL;DR: A new security model is defined and a privacy preserving traffic monitoring scheme is proposed that uses short group signature to authenticate drivers in a conditionally anonymous way, adopt a range query technique to acquire driving information in a privacy-preserving way, and integrate it to the construction of a weighted proximity graph at each fog node through a WiFi challenge handshake to filter out false reports.
Proceedings ArticleDOI

CAT: Building Couples to Early Detect Node Compromise Attack in Wireless Sensor Networks

TL;DR: This paper presents a new couple-based scheme to detect the node compromise attack in early stage, where after sensor nodes are deployed, they first build couples in ad hoc pattern, and the nodes within the same couple can monitor each other to detect any node compromise attempt.
Journal ArticleDOI

A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks

TL;DR: Numerical results are given to demonstrate the superiority of the proposed scheme in terms of the resultant signalling overhead, power consumption, and authentication latency, compared with the legacy authentication schemes without losing the capability of preserving the system security.
Journal ArticleDOI

LSR: Mitigating Zero-Day Sybil Vulnerability in Privacy-Preserving Vehicular Peer-to-Peer Networks

TL;DR: Detailed security analysis demonstrates that the proposed LSR scheme can enhance the security of a privacy-preserving VPNET, such as locally detecting sybil attack, preventing a sybil attacker's future attacks before its being revoked by TA, et al.
Journal ArticleDOI

Public key distribution scheme for delay tolerant networks based on two-channel cryptography

TL;DR: By distinguishing between owners and carriers, public key exchange and authentication issues in the decentralized pocket DTN environment can be solved by a two-channel cryptography process and the simulation results have proven it.