Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks

Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks Mobile Computing Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless ad hoc network. In this paper, while observing a sequence of packet losses in the network, we are interested in determining whether the losses are caused by link errors only, or by the combined effect of link errors and malicious drop. We are especially interested in the insider-attack case, whereby malicious nodes that are part of the route exploit their…

Read More

Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation

Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation JAVA Technology Information Forensics and Security Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation In many practical scenarios, image encryption has to be conducted prior to image compression. This has led to the problem of how to design a pair of image encryption and compression algorithms such that compressing the encrypted images can still be efficiently performed. In this paper, we design a highly efficient image encryption-then-compression (ETC) system, where both lossless…

Read More

Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks

Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks Disruption tolerant networks (DTNs) are characterized by low node density, unpredictable node mobility, and lack of global network information. Most of current research efforts in DTNs focus on data forwarding, but only limited work has been done on providing efficient data access to mobile users. A novel approach is proposed to support cooperative caching in DTNs, which enables the sharing and coordination of cached data among multiple nodes and reduces data access delay. The basic idea is to intentionally cache…

Read More

Traffic pattern-based content leakage detection for trusted content delivery networks

Traffic pattern-based content leakage detection for trusted content delivery networks Due to the increasing popularity of multimedia streaming applications and services in recent years, the issue of trusted video delivery to prevent undesirable content-leakage has, indeed, become critical. While preserving user privacy, conventional systems have addressed this issue by proposing methods based on the observation of streamed traffic throughout the network. These conventional systems maintain a high detection accuracy while coping with some of the traffic variation in the network (e.g., network delay and packet loss), however, their detection performance…

Read More

Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption

Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption The provisioning of basic security mechanisms such as authentication and confidentiality is highly challenging in a content based publish/subscribe system. Authentication of publishers and subscribers is difficult to achieve due to the loose coupling of publishers and subscribers. Likewise, confidentiality of events and subscriptions conflicts with content-based routing. This paper presents a novel approach to provide confidentiality and authentication in a broker-less content-based publish/subscribe system. The authentication of publishers and subscribers as well as confidentiality of events is ensured, by adapting the pairing-based…

Read More

Energy-optimum Throughput and Carrier Sensing Rate in CSMA-based Wireless Networks

Energy-optimum Throughput and Carrier Sensing Rate in CSMA-based Wireless Networks A model for the energy consumption of a node as a function of its throughput in a wireless CSMA network is proposed. A single-hop network is modeled, and then a multi-hop network. The operating the CSMA network at a high throughput is energy inefficient since unsuccessful carrier sensing attempts increase the energy consumption per transmitted bit. Operating the network at a low throughput also causes energy inefficiency because of increased sleeping duration. Achieving a balance between these two opposite operating…

Read More

Video Dissemination over Hybrid Cellular and Ad Hoc Networks

Video Dissemination over Hybrid Cellular and Ad Hoc Networks We study the problem of disseminating videos to mobile users by using a hybrid cellular and ad hoc network. In particular, we formulate the problem of optimally choosing the mobile devices that will serve as gateways from the cellular to the ad hoc network, the ad hoc routes from the gateways to individual devices, and the layers to deliver on these ad hoc routes. We develop a Mixed Integer Linear Program (MILP)-based algorithm, called POPT, to solve this optimization problem. We…

Read More

Hiding in the Mobile Crowd: Location Privacy through Collaboration

Hiding in the Mobile Crowd: Location Privacy through Collaboration Location-aware smartphones support various location-based services (LBSs): users query the LBS server and learn on the fly about their surroundings. However, such queries give away private information, enabling the LBS to track users. A user-collaborative privacy-preserving approach is proposed for LBSs. This solution does not require changing the LBS server architecture and does not assume third party servers; yet, it significantly improves users’ location privacy. The gain stems from the collaboration of mobile devices: they keep their context information in a…

Read More

Incentive Based Data Sharing in Delay Tolerant Mobile Networks

Incentive Based Data Sharing in Delay Tolerant Mobile Networks Mobile wireless devices play important roles in our daily life, e.g., users often use such devices to take pictures and share with friends via opportunistic peer-to-peer links, which however are intermittent in nature, and hence require the store and- forward feature proposed in Delay Tolerant Networks to provide useful data sharing opportunities. Moreover, mobile devices may not be willing to forward data items to other devices due to the limited resources. Hence, effective data dissemination schemes need to be designed to…

Read More

Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage

Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage Remote data integrity checking is of crucial importance in cloud storage. It can make the clients verify whether their outsourced data is kept intact without downloading the whole data. In some application scenarios, the clients have to store their data on multi-cloud servers. At the same time, the integrity checking protocol must be efficient in order to save the verifier’s cost. From the two points, we propose a novel remote data integrity checking model: ID-DPDP (identity-based distributed provable data possession) in multi-cloud…

Read More