Energy and Memory Efficient Clone Detection in Wireless Sensor Networks

Energy and Memory Efficient Clone Detection in Wireless Sensor Networks Download Project Synopsis An energy-efficient location-aware clone detection protocol is proposed in densely deployed WSNs, which can guarantee successful clone attack detection and maintain satisfactory network lifetime. Specifically, we exploit the location information of sensors and randomly select witnesses located in a ring area to verify the legitimacy of sensors and to report detected clone attacks. The ring structure facilitates energy-efficient data forwarding along the path towards the witnesses and the sink. Proposed protocol can achieve 100 percent clone detection…

Read More

Detecting Colluding Blackhole and Greyhole Attacks in Delay Tolerant Networks

Detecting Colluding Blackhole and Greyhole Attacks in Delay Tolerant Networks DOWNLOAD PROJECT SYNOPSIS Delay Tolerant Network (DTN) is developed to cope with intermittent connectivity and long delay in wireless networks. Due to the limited connectivity, DTN is vulnerable to blackhole and greyhole attacks in which malicious nodes intentionally drop all or part of the received messages. Although existing proposals could accurately detect the attack launched by individuals, they fail to tackle the case that malicious nodes cooperate with each other to cheat the defense system. A scheme is proposed called…

Read More

Optimizing Video Request Routing in Mobile Networks with Built-in Content Caching

Optimizing Video Request Routing in Mobile Networks with Built-in Content Caching DOWNLOAD PROJECT SYNOPSIS Built-in content caching in mobile core networks can help improve quality of service, reduce operation expenses, simplify inter-network cooperation, and thus is a promising approach for more efficient networking architectures. In addition to the complexity of content placement as revealed in the literature, routing video requests remains a challenging issue. Two problems must be addressed: (i) how to distribute video requests among multiple internal servers (i.e., server selection); and (ii) how to route so-generated video flows…

Read More

Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes

Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes DOWNLOAD PROJECT SYNOPSIS With the main focus of research in routing protocols for Mobile Ad-Hoc Networks (MANET) geared towards routing efficiency, the resulting protocols tend to be vulnerable to various attacks. Over the years, emphasis has also been placed on improving the security of these networks. Different solutions have been proposed for different types of attacks, however, these solutions often compromise routing efficiency or network overload. One major DOS attack against the Optimized Link State Routing protocol (OLSR) known…

Read More

Shared Relay Assignment (SRA) for Many-to-One Traffic in Cooperative Networks

Shared Relay Assignment (SRA) for Many-to-One Traffic in Cooperative Networks DOWNLOAD PROJECT SYNOPSIS Relay assignment significantly affects the performance of the cooperative communication, which is an emerging technology for the future mobile system. Previous studies in this area have mostly focused on assigning a dedicated relay to each source destination pair for one-to-one (121) traffic. However, many-to-one (M21) traffic, which is also common in many situations (for example, several users associate with one access point in a wireless access network such as a WLAN), hasn’t been well studied. This paper…

Read More

A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks

A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks Hybrid wireless networks combining the advantages of both mobile ad-hoc networks and infrastructure wireless networks have been receiving increased attention due to their ultra-high performance. An efficient data routing protocol is important in such networks for high network capacity and scalability. However, most routing protocols for these networks simply combine the ad-hoc transmission mode with the cellular transmission mode, which inherits the drawbacks of…

Read More

Tracking Message Spread in Mobile Delay Tolerant Networks

Tracking Message Spread in Mobile Delay Tolerant Networks Delay Tolerant Network is considered under two message forwarding schemes – a non-replicative direct delivery scheme and a replicative epidemic routing scheme. The objective is to track the degree of spread of a message in the network. Such estimation can be used for on-line control of message dissemination. With a homogeneous mobility model with pairwise i.i.d. exponential intermeeting times, we rigorously derive the system dynamic and measurement equations for optimal tracking by a Kalman filter. Moreover, we provide a framework for tracking…

Read More

A Privacy-Preserving Framework for Managing Mobile Ad Requests and Billing Information

A Privacy-Preserving Framework for Managing Mobile Ad Requests and Billing Information Organizations are starting to realize the significant value of advertising on mobile devices, and a number of systems have been developed to exploit this opportunity. From a privacy perspective, practically all systems developed so far are based either on a trusted third-party model or on a generalized architecture. A system proposed for delivering context, location, time, and preference-aware advertisements to mobiles with a novel architecture to preserve privacy. The main adversary in this model is the server distributing the…

Read More

Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks

Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks Mobile Computing Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless ad hoc network. In this paper, while observing a sequence of packet losses in the network, we are interested in determining whether the losses are caused by link errors only, or by the combined effect of link errors and malicious drop. We are especially interested in the insider-attack case, whereby malicious nodes that are part of the route exploit their…

Read More

Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks

Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks Disruption tolerant networks (DTNs) are characterized by low node density, unpredictable node mobility, and lack of global network information. Most of current research efforts in DTNs focus on data forwarding, but only limited work has been done on providing efficient data access to mobile users. A novel approach is proposed to support cooperative caching in DTNs, which enables the sharing and coordination of cached data among multiple nodes and reduces data access delay. The basic idea is to intentionally cache…

Read More