Restricted Epidemic Routing in Multi-Community Delay Tolerant Networks

Restricted Epidemic Routing in Multi-Community Delay Tolerant Networks In some specific applicable scenarios, nodes are placed in some geographical areas and limited to move in their own community. The tradeoff between the delivery delay and the number of transmissions is studied in the above multi-community delay tolerant networks by propagating a data packet in a carefully chosen segment of community. First, three restricted epidemic routing are proposed: the shortest community-hop path scheme, the rectangle scheme, and the parallelogram scheme. Second, the ratios of the average number of communities that can…

Read More

t-Closeness through Microaggregation: Strict Privacy with Enhanced Utility Preservation

t-Closeness through Microaggregation: Strict Privacy with Enhanced Utility Preservation Microaggregation is a technique for disclosure limitation aimed at protecting the privacy of data subjects in microdata releases. It has been used as an alternative to generalization and suppression to generate k-anonymous data sets, where the identity of each subject is hidden within a group of k subjects. Unlike generalization, microaggregation perturbs the data and this additional masking freedom allows improving data utility in several ways, such as increasing data granularity, reducing the impact of outliers and avoiding discretization of numerical…

Read More

Path Reconstruction in Dynamic Wireless Sensor Networks Using Compressive Sensing

Path Reconstruction in Dynamic Wireless Sensor Networks Using Compressive Sensing CSPR, a compressive-sensing based approach is proposed for path reconstruction in wireless sensor networks. By viewing the whole network as a path representation space, an arbitrary routing path can be represented by a path vector in the space. As path length is usually much smaller than the network size, such path vectors are sparse, i.e., the majority of elements are zeros. By encoding sparse path representation into packets, the path vector can be recovered from a small amount of packets…

Read More

A Hybrid Cloud Approach for Secure Authorized Deduplication

A Hybrid Cloud Approach for Secure Authorized Deduplication Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the confidentiality of sensitive data while supporting deduplication, the convergent encryption technique has been proposed to encrypt the data before outsourcing. To better protect data security, this work makes the first attempt to formally address the problem of authorized data deduplication. Different from traditional deduplication systems,…

Read More

Opportunistic Routing Algorithm for Relay Node Selection in WSN

Opportunistic Routing Algorithm for Relay Node Selection in Wireless Sensor Networks Energy savings optimization becomes one of the major concerns in the wireless sensor network (WSN) routing protocol design, due to the fact that most sensor nodes are equipped with the limited non rechargeable battery power. Minimizing energy consumption and maximizing network lifetime is focused for data relay in one-dimensional queue network. Following the principle of opportunistic routing theory, multihop relay decision to optimize the network energy efficiency is made based on the differences among sensor nodes, in terms of…

Read More

E2R2: Energy-Efficient and Reliable Routing for Mobile Wireless Sensor Networks

E2R2: Energy-Efficient and Reliable Routing for Mobile Wireless Sensor Networks DOWNLOAD PROJECT SYNOPSIS -JAVA DOWNLOAD PROJECT SYNOPSIS -NS2 Wireless sensor networks (WSNs) are resource constrained. Energy is one of the most important resources in such networks. Therefore, optimal use of energy is necessary. A novel energy-efficient routing protocol is proposed for WSNs. The protocol is reliable in terms of data delivery at the base station (BS). Mobility in sensor nodes and in the BS is considered. The proposed protocol is hierarchical and cluster based. Each cluster consists of one cluster…

Read More

Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds

Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds A major challenging problem for cloud providers is designing efficient mechanisms for virtual machine (VM) provisioning and allocation. Such mechanisms enable the cloud providers to effectively utilize their available resources and obtain higher profits. Recently, cloud providers have introduced auction-based models for VM provisioning and allocation which allow users to submit bids for their requested VMs. Dynamic VM provisioning and allocation problem is studied for the auction-based model as an integer program considering multiple types of resources. Truthful…

Read More

A Lightweight Scheme for Detecting Provenance Forgery and Packet Drop Attacks

A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks Large-scale sensor networks are deployed in numerous application domains, and the data they collect are used in decision-making for critical infrastructures. Data are streamed from multiple sources through intermediate processing nodes that aggregate information. A malicious adversary may introduce additional nodes in the network or compromise existing ones. Therefore, assuring high data trustworthiness is crucial for correct decision-making. Data provenance represents a key factor in evaluating the trustworthiness of sensor data. Provenance management for…

Read More

Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud

Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud Due to the high volume and velocity of big data, it is an effective option to store big data in the cloud, as the cloud has capabilities of storing big data and processing high volume of user access requests. Attribute-Based Encryption (ABE) is a promising technique to ensure the end-to-end security of big data in the cloud. However, the policy updating has always been a challenging issue when ABE is used to construct access control schemes.…

Read More

Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment

Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment Despite two decades of intensive research, it remains a challenge to design a practical anonymous two-factor authentication scheme, for the designers are confronted with an impressive list of security requirements and desirable attributes. Numerous solutions have been proposed, yet most of them are shortly found either unable to satisfy some critical security requirements or short of a few important features. To overcome this unsatisfactory situation, researchers often work around it in hopes of a new proposal, while paying little…

Read More