Wormhole Attack Detection Algorithms in Wireless Network Coding Systems

Wormhole Attack Detection Algorithms in Wireless Network Coding Systems Network coding has been shown to be an effective approach to improve the wireless system performance. However, many security issues impede its wide deployment in practice. Besides the well-studied pollution attacks, there is another severe threat, that of wormhole attacks, which undermines the performance gain of network coding. Since the underlying characteristics of network coding systems are distinctly different from traditional wireless networks, the impact of wormhole attacks and countermeasures are generally unknown. It is quantified Wormholes’ devastating harmful impact on…

Read More

Towards Large-Scale Histopathological Image Analysis: Hashing-Based Image Retrieval

Towards Large-Scale Histopathological Image Analysis: Hashing-Based Image Retrieval Automatic analysis of histopathological images has been widely utilized leveraging computational image-processing methods and modern machine learning techniques. Both computer- aided diagnosis (CAD) and content-based image-retrieval (CBIR) systems have been successfully developed for diagnosis, disease detection, and decision support in this area. Large-scale and data-driven methods have emerged to offer a promise of bridging the semantic gap between images and diagnostic information. Scalable image-retrieval technique is developed to cope intelligently with massive histopathological images. Specifically, a supervised kernel hashing technique is proposed,…

Read More

Vmbuddies: coordinating live migration of multi-tier applications in cloud environments

Enabled by virtualization technologies, various multi-tier applications are hosted by virtual machines (VMs) in cloud data centers. Live migration of multi-tier applications across geographically distributed data centers is important for load management, power saving, routine server maintenance and quality-of-service. Different from a single-VM migration, VMs in a multi-tier application are closely correlated, which results in a correlated VM migrations problem. Current live migration algorithms for single-VM cause significant application performance degradation because intermediate data exchange between different VMs suffers relatively low bandwidth and high latency across distributed data centers. A…

Read More

Neighbor Discovery in Wireless Networks with Multipacket Reception

Neighbor Discovery in Wireless Networks with Multipacket Reception Neighbor discovery is one of the first steps in configuring and managing a wireless network. Most existing studies on neighbor discovery assume a single-packet reception model where only a single packet can be received successfully at a receiver. Neighbor discovery in MPR networks is studied that allow packets from multiple simultaneous transmitters to be received successfully at a receiver. Starting with a clique of n nodes, a simple Aloha-like algorithm is analyzed and show that it takes time to discover all neighbors…

Read More

VGDRA: A virtual grid-based dynamic routes adjustment scheme for mobile sink-based WSN

VGDRA: A virtual grid-based dynamic routes adjustment scheme for mobile sink-based wsn Exploiting the sink mobility in wireless sensor networks has been considered as a good strategy to balance the nodes energy dissipation. Despite its numerous advantages, the data dissemination to the mobile sink is a challenging task for the resource constrained sensor nodes due to the dynamic network topology caused by the sink mobility. For efficient data delivery, nodes need to reconstruct their routes toward the latest location of the mobile sink, which undermines the energy conservation goal. A…

Read More