ActiveTrust Secure and Trustable Routing in Wireless Sensor Networks

ActiveTrust Secure and Trustable Routing in Wireless Sensor Networks ActiveTrust Secure and Trustable Routing in Wireless Sensor Networks PROJECT SYNOPSIS Wireless sensor networks (WSNs) are increasingly being deployed in security-critical applications. Because of their inherent resource-constrained characteristics, they are prone to various security attacks, and a black hole attack is a type of attack that seriously affects data collection. To conquer that challenge, an active detection-based security and trust routing scheme named ActiveTrust is proposed for WSNs. The most important innovation of ActiveTrust is that it avoids black holes through…

Read More

Dictionary Based Secure Provenance Compression for Wireless Sensor Networks

Dictionary Based Secure Provenance Compression for Wireless Sensor Networks Download project Synopsis Due to energy and bandwidth limitations of wireless sensor networks (WSNs), it is crucial that data provenance for these networks be as compact as possible. Even if lossy compression techniques are used for encoding provenance information, the size of the provenance increases with the number of nodes traversed by the network packets. To address such issues, we propose a dictionary based provenance scheme. In our approach, each sensor node in the network stores a packet path dictionary. With…

Read More

A Provably Secure, Efficient and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks

A Provably Secure, Efficient and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks Smart card-based authentication scheme for heterogeneous ad hoc wireless sensor network. This scheme is very efficient since it employs only hash function and XOR operation. However, we found that Turkanovic et al.’s scheme is vulnerable to impersonation attack with node capture, stolen smart card attack, sensor node spoofing attack, stolen verifier attack, and fails to ensure backward secrecy. We propose an efficient scheme to overcome all those weaknesses. Moreover, an advanced scheme is proposed, which provides…

Read More

RMER: Reliable and Energy-efficient Data Collection for Large-scale Wireless Sensor Networks

RMER: Reliable and Energy-efficient Data Collection for Large-scale Wireless Sensor Networks Download project synopsis A novel event data collection approach named RMER (Reliability and Multi-path Encounter Routing) is proposed for meeting reliability and energy efficiency requirements. The contributions of the RMER approach are the following: (a) Fewer monitor nodes are selected in hotspot areas that are close to the Sink, and more monitor nodes are selected in non-hotspot areas, which can lead to increased network lifetime and event detection reliability. (b) The RMER approach sends data to the Sink by…

Read More

Cloud-Assisted Data Fusion and Sensor Selection for Internet-of-Things

Cloud-Assisted Data Fusion and Sensor Selection for Internet-of-Things The Internet of Things (IoT) is connecting people and smart devices on a scale that was once unimaginable. One major challenge for the IoT is to handle vast amount of sensing data generated from the smart devices that are resource-limited and subject to missing data due to link or node failures. By exploring cloud computing with the IoT, we present a cloud-based solution that takes into account the link quality and spatio-temporal correlation of data to minimize energy consumption by selecting sensors…

Read More

Energy and Memory Efficient Clone Detection in Wireless Sensor Networks

Energy and Memory Efficient Clone Detection in Wireless Sensor Networks Download Project Synopsis An energy-efficient location-aware clone detection protocol is proposed in densely deployed WSNs, which can guarantee successful clone attack detection and maintain satisfactory network lifetime. Specifically, we exploit the location information of sensors and randomly select witnesses located in a ring area to verify the legitimacy of sensors and to report detected clone attacks. The ring structure facilitates energy-efficient data forwarding along the path towards the witnesses and the sink. Proposed protocol can achieve 100 percent clone detection…

Read More

Detecting Colluding Blackhole and Greyhole Attacks in Delay Tolerant Networks

Detecting Colluding Blackhole and Greyhole Attacks in Delay Tolerant Networks DOWNLOAD PROJECT SYNOPSIS Delay Tolerant Network (DTN) is developed to cope with intermittent connectivity and long delay in wireless networks. Due to the limited connectivity, DTN is vulnerable to blackhole and greyhole attacks in which malicious nodes intentionally drop all or part of the received messages. Although existing proposals could accurately detect the attack launched by individuals, they fail to tackle the case that malicious nodes cooperate with each other to cheat the defense system. A scheme is proposed called…

Read More

A Privacy-Preserving Data Sharing Framework for Smart Grid

A Privacy-Preserving Data Sharing Framework for Smart Grid Distributed energy resources, featured with small scale power generation technologies and renewable energy sources, are considered as necessary supplements for smart grid. To ensure that merged resources contribute effectively to the grid, data generated by consumer side should be shared among the energy resources. However, it also introduces challenges of the protection of consumer privacy. To address these difficulties, a new framework is proposed to share data in smart grid by leveraging new advances in homomorphic encryption and proxy re-encryption. Proposed framework…

Read More

Privacy-preserving Verifiable Set Operation in Big Data for Cloud-assisted Mobile Crowdsourcing

Privacy-preserving Verifiable Set Operation in Big Data for Cloud-assisted Mobile Crowdsourcing The ubiquity of smartphones makes the mobile crowdsourcing possible, where the requester can crowdsource data from the workers by using their sensor-rich mobile devices. However, data collection, data aggregation, and data analysis have become challenging problems for a resource constrained requester when data volume is extremely large, i.e., big data. In particular to data analysis, set operations, including intersection, union, and complementation, exist in most big data analysis for filtering redundant data and preprocessing raw data. Facing challenges in…

Read More

Reversible Data Hiding in Encrypted Images With Distributed Source Encoding

Reversible Data Hiding in Encrypted Images With Distributed Source Encoding DOWNLOAD PROJECT SYNOPSIS A novel scheme of reversible data hiding in encrypted images using distributed source coding. After the original image is encrypted by the content owner using a stream cipher, the data-hider compresses a series of selected bits taken from the encrypted image to make room for the secret data. The selected bit series is Slepian-Wolf encoded using low-density parity check codes. On the receiver side, the secret bits can be extracted if the image receiver has the embedding…

Read More