Hop-by-hop message authentication and source privacy in wireless sensor networks

hop-by-hop message authentication and source privacy in wireless sensor networks Hop-By-Hop Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being forwarded in wireless sensor networks (WSNs). For this reason, many message authentication schemes have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. Most of them, however, have the limitations of high computational and communication overhead in addition to lack of scalability and resilience to node compromise attacks. To address these issues, a polynomial-based scheme was recently introduced. However, this scheme…

Read More

Cross-Layer Approach for Minimizing Routing Disruption in IP Networks

Backup paths are widely used in IP networks to protect IP links from failures. However, existing solutions such as the commonly used independent model and Shared Risk Link Group (SRLG) model do not accurately reflect the correlation between IP link failures, and thus may not choose reliable backup paths. We propose a cross-layer approach for minimizing routing disruption caused by IP link failures. We develop a probabilistically correlated failure (PCF) model to quantify the impact of IP link failure on the reliability of backup paths. With the PCF model, we…

Read More

A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis

A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis Interconnected systems, such as Web servers, database servers, cloud computing servers etc, are now under threads from network attackers. As one of most common and aggressive means, Denial-of-Service (DoS) attacks cause serious impact on these computing systems. A DoS attack detection system is proposed that uses Multivariate Correlation Analysis (MCA) for accurate network traffic characterization by extracting the geometrical correlations between network traffic features. MCA-based DoS attack detection system employs the principle of anomaly-based detection in attack recognition. This…

Read More

TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality

Traditionally, as soon as confidentiality becomes a concern, data are encrypted before outsourcing to a service provider. Any software-based cryptographic constructs then deployed, for server-side query processing on the encrypted data, inherently limit query expressiveness. Here, we introduce TrustedDB, an outsourced database prototype that allows clients to execute SQL queries with privacy and under regulatory compliance constraints by leveraging server-hosted, tamper-proof trusted hardware in critical query processing stages, thereby removing any limitations on the type of supported queries. Despite the cost overhead and performance limitations of trusted hardware, we show…

Read More

Secure Mining of Association Rules in Horizontally Distributed Databases

Secure Mining of Association Rules in Horizontally Distributed Databases We propose a protocol for secure mining of association rules in horizontally distributed databases. The current leading protocol is that of Kantarcioglu and Clifton . Our protocol, like theirs, is based on the Fast Distributed Mining (FDM)algorithm of Cheung et al. , which is an unsecured distributed version of the Apriori algorithm. The main ingredients in our protocol are two novel secure multi-party algorithms-one that computes the union of private subsets that each of the interacting players hold, and another that…

Read More

SocialTube: P2P-Assisted Video Sharing in Online Social Networks

SocialTube: P2P-Assisted Video Sharing in Online Social Networks   Video sharing has been an increasingly popular application in online social networks (OSNs). However, its sustainable development is severely hindered by the intrinsic limit of the client/server architecture deployed in current OSN video systems, which is not only costly in terms of server bandwidth and storage but also not scalable with the soaring amount of users and video content. The peer-assisted Video-on-Demand (VoD) technique, in which participating peers assist the server in delivering video content has been proposed recently. Unfortunately, videos…

Read More

Outdoor Image Enhancement: Increasing Visibility Under Extreme Haze and Lighting Condition

Outdoor Image Enhancement: Increasing Visibility Under Extreme Haze and Lighting Condition   The problem of image enhancement thereby enhancement of scene visibility in outdoor images is handled. Visibility is a very important issue in case of computer based surveillance, crime analysis, driver assistance system design etc. The most important challenge related to visibility is the atmospheric haze and poor lighting. The problem becomes more challenging if haze is too dense and lighting during night is extremely poor. An automatic degradation detection and restoration algorithm has been proposed, which detects the…

Read More

Chaotic Map Based Steganography of Gray Scale Images in Wavelet Domain

Chaotic Map Based Steganography of Gray Scale Images in Wavelet Domain Matlab Project A method of hiding the stego image in cover image by using a technique called fractional fourier transform with wavelet coefficients is proposed. Application of steganography is internet/web security. To maintain higher security Arnold transform is performed on host image with key, key is only known to a receiver/sender. For embedding, perform a fractional Fourier transform of cover image and secret image. Then apply DWT on both images. Cover image and secret image will added by using…

Read More

A new lossless method of image compression and decompression using huffman coding techniques

Technology Used: JAVA The need for an efficient technique for compression of Images ever increasing because the raw images need large amounts of disk space seems to be a big disadvantage during transmission & storage. Even though there are so many compression technique already present a better technique which is faster, memory efficient and simple surely suits the requirements of the user. In this paper we proposed the Lossless method of image compression and decompression using a simple coding technique called Huffman coding. This technique is simple in implementation and…

Read More