A survey of edge computing-based designs for IoT security K Sha, TA Yang, W Wei, S Davari
Digital Communications and Networks 6 (2), 195-202, 2020
275 2020 On security challenges and open issues in Internet of Things K Sha, W Wei, TA Yang, Z Wang, W Shi
Future generation computer systems 83, 326-337, 2018
272 2018 Using wireless sensor networks for fire rescue applications: Requirements and challenges K Sha, W Shi, O Watkins
2006 IEEE International Conference on Electro/Information Technology, 239-244, 2006
229 2006 Multipath routing techniques in wireless sensor networks: A survey K Sha, J Gehlot, R Greve
Wireless personal communications 70, 807-829, 2013
211 2013 Modeling the lifetime of wireless sensor networks K Sha, W Shi
Sensor Letters 3 (2), 126-135, 2005
150 2005 Enforcing privacy using symmetric random key-set in vehicular networks Y Xi, K Sha, W Shi, L Schwiebert, T Zhang
Eighth International Symposium on Autonomous Decentralized Systems (ISADS'07 …, 2007
130 2007 Adaptive privacy-preserving authentication in vehicular networks K Sha, Y Xi, W Shi, L Schwiebert, T Zhang
2006 First International Conference on Communications and Networking in …, 2006
109 2006 A secure and efficient framework to read isolated smart grid devices K Sha, N Alatrash, Z Wang
IEEE Transactions on Smart Grid 8 (6), 2519-2531, 2016
93 2016 On sweep coverage with minimum mobile sensors J Du, Y Li, H Liu, K Sha
2010 IEEE 16th International Conference on Parallel and Distributed Systems …, 2010
64 2010 WEAR: a balanced, fault-tolerant, energy-aware routing protocol in WSNs K Sha, J Du, W Shi
International Journal of Sensor Networks 1 (3-4), 156-168, 2006
59 2006 EdgeSec: Design of an edge layer security service to enhance IoT security K Sha, R Errabelly, W Wei, TA Yang, Z Wang
2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC), 81-88, 2017
58 2017 SPA: A smart phone assisted chronic illness self-management system with participatory sensing K Sha, G Zhan, W Shi, M Lumley, C Wiholm, B Arnetz
Proceedings of the 2nd International Workshop on Systems and Networking …, 2008
54 2008 Security in internet of things: Opportunities and challenges W Wei, AT Yang, W Shi, K Sha
2016 International Conference on Identification, Information and Knowledge …, 2016
47 2016 An overview of access control mechanisms for internet of things M Alramadhan, K Sha
2017 26th International Conference on Computer Communication and Networks …, 2017
44 2017 Data quality challenges in cyber-physical systems K Sha, S Zeadally
Journal of Data and Information Quality (JDIQ) 6 (2-3), 1-4, 2015
39 2015 Consistency-driven data quality management of networked sensor systems K Sha, W Shi
Journal of parallel and Distributed Computing 68 (9), 1207-1221, 2008
37 2008 Probabilistic adaptive anonymous authentication in vehicular networks Y Xi, KW Sha, WS Shi, L Schwiebert, T Zhang
Journal of Computer Science and Technology 23, 916-928, 2008
34 2008 : Role-Differentiated Cooperative Deceptive Data Detection and Filtering in VANETsK Sha, S Wang, W Shi
IEEE Transactions on Vehicular Technology 59 (3), 1183-1190, 2010
33 2010 mVideo: Edge computing based mobile video processing systems H Sun, Y Yu, K Sha, B Lou
IEEE Access 8, 11615-11623, 2019
31 2019 Revisiting the lifetime of wireless sensor networks K Sha, W Shi
Proceedings of the 2nd international conference on Embedded networked sensor …, 2004
27 2004