Entity

Time filter

Source Type


Ye S.-T.,Hunan University | Ye S.-T.,Hunan Key Laboratory of Dependable System and Networks | Lin Y.-P.,Hunan University | Lin Y.-P.,Hunan Key Laboratory of Dependable System and Networks | And 2 more authors.
Tongxin Xuebao/Journal on Communications | Year: 2011

Utilizing the feature of cooperation in visual sensor networks, an image compression algorithm based on divergence model was proposed. Analysis and experimental results demonstrate that the compression scheme proposed can reduce the amount of image data effectively. And, due to the information represented by one byte is shared by several cluster nodes' bi-level pixels after compression, the degradation of received images is controlled. Comparing with the traditional image compression algorithms, the quality of received image measured by PSNR is higher, as the average packet loss rate increases. Source


Li J.-G.,Hunan University | Li J.-G.,Hunan Key Laboratory of Dependable System and Networks | Lin Y.-P.,Hunan University | Lin Y.-P.,Hunan Key Laboratory of Dependable System and Networks | And 4 more authors.
Tongxin Xuebao/Journal on Communications | Year: 2013

A secure anonymous authentication scheme was proposed based on elliptic curve and zero-knowledge proof, which adopts a bidirectional anonymous authentication algorithm to preserve users' privacy during the certification process. In the case of a high density traffic scenario, a message aggregation technology was proposed to realize fast authentication by the assistant of RSU, and to avoid the loss of massive messages unauthenticated promptly. The simulation and analytical results show that the proposed scheme yields a much better performance than previously reported counterparts with lower communication overhead, message loss rate and message delay. Source


Li J.,Hunan University | Li J.,Hunan Key Laboratory of Dependable System and Networks | Lin Y.,Hunan University | Lin Y.,Hunan Key Laboratory of Dependable System and Networks | And 6 more authors.
Security and Communication Networks | Year: 2014

Storage nodes in two-tiered sensor networks are responsible for storing sensor-collected data and processing the sink-issued queries. Therefore, storage nodes are vulnerable to attack because of their importance. In this paper, we propose a privacy and integrity preserving protocol called SSQ, which is able to prevent compromised storage nodes from leaking sensitive data and allows the sink to detect the misbehaviors of compromised storage nodes. For privacy preserving, a size-limited bucketing technique is proposed to mix the data in a range, and a prefix membership verification technique based on Bloom filters is developed to perform skyline queries on encrypted data items. For integrity preserving, a Merkle hash tree-based technique is investigated to prevent compromised storage nodes from tampering and dropping data. Detailed performance evaluations confirm the high efficacy and efficiency of SSQ. © 2013 John Wiley & Sons, Ltd. Source

Discover hidden collaborations