Tracking Message Spread in Mobile Delay Tolerant Networks

Tracking Message Spread in Mobile Delay Tolerant Networks Delay Tolerant Network is considered under two message forwarding schemes – a non-replicative direct delivery scheme and a replicative epidemic routing scheme. The objective is to track the degree of spread of a message in the network. Such estimation can be used for on-line control of message dissemination. With a homogeneous mobility model with pairwise i.i.d. exponential intermeeting times, we rigorously derive the system dynamic and measurement equations for optimal tracking by a Kalman filter. Moreover, we provide a framework for tracking…

Read More

A Privacy-Preserving Framework for Managing Mobile Ad Requests and Billing Information

A Privacy-Preserving Framework for Managing Mobile Ad Requests and Billing Information Organizations are starting to realize the significant value of advertising on mobile devices, and a number of systems have been developed to exploit this opportunity. From a privacy perspective, practically all systems developed so far are based either on a trusted third-party model or on a generalized architecture. A system proposed for delivering context, location, time, and preference-aware advertisements to mobiles with a novel architecture to preserve privacy. The main adversary in this model is the server distributing the…

Read More

Maximizing P2P File Access Availability in Mobile Ad hoc Networks Though Replication for Efficient File Sharing

Maximizing P2P File Access Availability in Mobile Ad hoc Networks Though Replication for Efficient File Sharing File sharing applications in mobile ad hoc networks (MANETs) have attracted more and more attention in recent years. The efficiency of file querying suffers from the distinctive properties of such networks including node mobility and limited communication range and resource. An intuitive method to alleviate this problem is to create file replicas in the network. However, despite the efforts on file replication, no research has focused on the global optimal replica creation with minimum…

Read More

Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption

Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from it. Various schemes based on the attribute-based encryption have been proposed to secure the cloud storage. However, most work focuses on the data contents privacy and the access control, while less attention is paid to the privilege control and the identity privacy. A semi-anonymous privilege control…

Read More

Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks

Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks Due to limited computational power and energy resources, aggregation of data from multiple sensor nodes done at the aggregating node is usually accomplished by simple methods such as averaging. However such aggregation is known to be highly vulnerable to node compromising attacks. Since WSN are usually unattended and without tamper resistant hardware, they are highly susceptible to such attacks. Thus, ascertaining trustworthiness of data and reputation of sensor nodes is crucial for WSN. As the performance of very low…

Read More

Effective Authentic and Anonymous Data Sharing with Forward Security

Effective Authentic and Anonymous Data Sharing with Forward Security Data sharing has never been easier with the advances of cloud computing, and an accurate analysis on the shared data provides an array of benefits to both the society and individuals. Data sharing with a large number of participants must take into account several issues, including efficiency, data integrity and privacy of data owner. Ring signature is a promising candidate to construct an anonymous and authentic data sharing system. It allows a data owner to anonymously authenticate his data which can…

Read More

Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System

Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System Most anomaly detection systems rely on machine learning algorithms to derive a model of normality that is later used to detect suspicious events. Some works conducted over the last years have pointed out that such algorithms are generally susceptible to deception, notably in the form of attacks carefully constructed to evade detection. Various learning schemes have been proposed to overcome this weakness. Core idea is akin to the functioning of some cryptographic primitives, namely to introduce a secret element (the key)…

Read More

Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage

Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage The need of secure big data storage service is more desirable than ever to date. The basic requirement of the service is to guarantee the confidentiality of the data. However, the anonymity of the service clients, one of the most essential aspects of privacy, should be considered simultaneously. Moreover, the service also should provide practical and fine-grained encrypted data sharing such that a data owner is allowed to share a ciphertext of data among others under some specified conditions. A privacy-preserving ciphertext…

Read More

Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers

Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers Collaborative location-based information generation and sharing is considered, which become increasingly popular due to the explosive growth of Internet-capable and location-aware mobile devices. The system consists of a data collector, data contributors, location-based service providers (LBSPs), and system users. The data collector gathers reviews about points-of-interest (POIs) from data contributors, while LBSPs purchase POI data sets from the data collector and allow users to perform spatial top-k queries which ask for the POIs in a certain region and with the…

Read More

Effective Key Management in Dynamic Wireless Sensor Networks

Effective Key Management in Dynamic Wireless Sensor Networks Recently, wireless sensor networks (WSNs) have been deployed for a wide variety of applications, including military sensing and tracking, patient status monitoring, traffic flow monitoring, where sensory devices often move between different locations. Securing data and communications requires suitable encryption key protocols. A certificateless-effective key management (CL-EKM) protocol is proposed for secure communication in dynamic WSNs characterized by node mobility. The CL-EKM supports efficient key updates when a node leaves or joins a cluster and ensures forward and backward key secrecy. The…

Read More