X
Xiaodong Lin
Researcher at University of Guelph
Publications - 337
Citations - 18654
Xiaodong Lin is an academic researcher from University of Guelph. The author has contributed to research in topics: Information privacy & Authentication. The author has an hindex of 61, co-authored 315 publications receiving 15199 citations. Previous affiliations of Xiaodong Lin include University of Ontario Institute of Technology & University of Waterloo.
Papers
More filters
Journal ArticleDOI
Privacy-Preserving Traffic Monitoring with False Report Filtering via Fog-assisted Vehicular Crowdsensing
TL;DR: A new security model is defined and a privacy preserving traffic monitoring scheme is proposed that uses short group signature to authenticate drivers in a conditionally anonymous way, adopt a range query technique to acquire driving information in a privacy-preserving way, and integrate it to the construction of a weighted proximity graph at each fog node through a WiFi challenge handshake to filter out false reports.
Proceedings ArticleDOI
CAT: Building Couples to Early Detect Node Compromise Attack in Wireless Sensor Networks
TL;DR: This paper presents a new couple-based scheme to detect the node compromise attack in early stage, where after sensor nodes are deployed, they first build couples in ad hoc pattern, and the nodes within the same couple can monitor each other to detect any node compromise attempt.
Journal ArticleDOI
A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks
TL;DR: Numerical results are given to demonstrate the superiority of the proposed scheme in terms of the resultant signalling overhead, power consumption, and authentication latency, compared with the legacy authentication schemes without losing the capability of preserving the system security.
Journal ArticleDOI
LSR: Mitigating Zero-Day Sybil Vulnerability in Privacy-Preserving Vehicular Peer-to-Peer Networks
TL;DR: Detailed security analysis demonstrates that the proposed LSR scheme can enhance the security of a privacy-preserving VPNET, such as locally detecting sybil attack, preventing a sybil attacker's future attacks before its being revoked by TA, et al.
Journal ArticleDOI
Public key distribution scheme for delay tolerant networks based on two-channel cryptography
TL;DR: By distinguishing between owners and carriers, public key exchange and authentication issues in the decentralized pocket DTN environment can be solved by a two-channel cryptography process and the simulation results have proven it.