ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing

projects 2012 ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing- projects 2012 – Dependable and Secure computing Due to the unattended nature of wireless sensor networks, an adversary can physically capture and compromise sensor nodes and then mount a variety of attacks with the compromised nodes. To minimize the damage incurred by the compromised nodes, the system should detect and revoke them as soon as possible. To meet this need, researchers have recently proposed a variety of node compromise detection schemes in…

Read More

Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs

projects 2012 Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs – projects 2012 Abstract:Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs – projects 2012 The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts…

Read More

Detecting and Resolving Firewall Policy Anomalies

projects 2012 Detecting and Resolving Firewall Policy Anomalies – projects 2012 projects 2012, Dependable and Secure Computing, May-June 2012 The advent of emerging computing technologies such as service-oriented architecture and cloud computing has enabled us to perform business services more efficiently and effectively. However, we still suffer from unintended security leakages by unauthorized actions in business services. Firewalls are the most widely deployed security mechanism to ensure the security of private networks in most businesses and institutions. The effectiveness of security protection provided by a firewall mainly depends on the…

Read More

Risk-Aware Mitigation for MANET Routing Attacks

projects 2012 Risk-Aware Mitigation for MANET Routing Attacks– projects 2012 projects 2012, Dependable and Secure Computing, March – April 2012 Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exists several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to isolate malicious nodes based on binary or naïve fuzzy response decisions. However, binary…

Read More

Packet-Hiding Methods for Preventing Selective Jamming Attacks

Packet-Hiding Methods for Preventing Selective Jamming Attacks Dependable and Secure Computing 2012- January- February 2012 Technology Used: JAVA The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional interference with wireless transmissions can be used as a launchpad for mounting Denial-of-Service attacks on wireless networks. Typically, jamming has been addressed under an external threat model. However, adversaries with internal knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are difficult to detect and counter. In…

Read More

pCloud: A Distributed System for Practical PIR

pCloud: A Distributed System for Practical PIR –  projects 2012 Dependable and Secure Computing – projects 2012 projects 2012 – January- February 2012 Technology Used: Java/J2EE Computational Private Information Retrieval (cPIR) protocols allow a client to retrieve one bit from a database, without the server inferring any information about the queried bit. These protocols are too costly in practice because they invoke complex arithmetic operations for every bit of the database. In this paper, we present pCloud, a distributed system that constitutes the first attempt toward practical cPIR. Our approach assumes…

Read More

Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks

Technology Used: Java Dependable and Secure Computing  July-August 2011 Download Projects 2011 Basepaper ABSTRACT In this paper, we formulate an analytical model to characterize the spread of malware in decentralized, Gnutella type peer-to-peer (P2P) networks and study the dynamics associated with the spread of malware. Using a compartmental model, we derive the system parameters or network conditions under which the P2P network may reach a malware free equilibrium. The model also evaluates the effect of control strategies like node quarantine on stifling the spread of malware. The model is then…

Read More

Privacy-Preserving Updates to Anonymous and Confidential Databases

Technology Used: Java Dependable and Secure Computing, 2011 Download Projects 2011 Basepaper ABSTRACT Suppose Alice owns a k-anonymous database and needs to determine whether her database, when inserted with a tuple owned by Bob, is still k-anonymous. Also, suppose that access to the database is strictly controlled, because for example data are used for certain experiments that need to be maintained confidential. Clearly, allowing Alice to directly read the contents of the tuple breaks the privacy of Bob (e.g., a patient medical record); on the other hand, the confidentiality of…

Read More

Nymble: Blocking Misbehaving Users in Anonymizing Networks

Technology Used: Java / J2EE Dependable Secure Computing, 2011 Download Project 2011 Basepaper Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client’s IP address from the server. The success of such networks, however, has been limited by users employing this anonymity for abusive purposes such as defacing popular Web sites. Web site administrators routinely rely on IP-address blocking for disabling access to misbehaving users, but blocking IP addresses is not practical if the abuser routes through an…

Read More