Optimal Power Allocation and Scheduling Under Jamming Attacks

Optimal Power Allocation and Scheduling Under Jamming Attacks A jammed wireless scenario is considered where a network operator aims to schedule users to maximize network performance while guaranteeing a minimum performance level to each user. We consider the case where no information about the position and the triggering threshold of the jammer is available. it is shown that the network performance maximization problem can be modeled as a finite-horizon joint power control and user scheduling problem, which is NP-hard. To find the optimal solution of the problem, we exploit dynamic…

Read More

Secure and Private Data Aggregation for Energy Consumption Scheduling in Smart Grids

Secure and Private Data Aggregation for Energy Consumption Scheduling in Smart Grids The recent proposed solutions for demand side energy management leverage the two-way communication infrastructure provided by modern smart-meters and sharing the usage information with the other users. In this paper, we first highlight the privacy and security issues involved in the distributed demand management protocols. We propose a novel protocol to share required information among users providing privacy, confidentiality, and integrity. We also propose a new clustering-based, distributed multi-party computation (MPC) protocol. Through simulation experiments we demonstrate the…

Read More

Light-weight and Robust Security-Aware D2D-assist Data Transmission Protocol for Mobile-Health Systems

Light-weight and Robust Security-Aware D2D-assist Data Transmission Protocol for Mobile-Health Systems With the rapid advancement of technology, healthcare systems have been quickly transformed into a pervasive environment, where both challenges and opportunities abound. On the one hand, the proliferation of smart phones and advances in medical sensors and devices have driven the emergence of wireless body area networks for remote patient monitoring, also known as mobile-health (M-health), thereby providing a reliable and cost effective way to improving efficiency and quality of health care. On the other hand, the advances of…

Read More

ActiveTrust Secure and Trustable Routing in Wireless Sensor Networks

ActiveTrust Secure and Trustable Routing in Wireless Sensor Networks ActiveTrust Secure and Trustable Routing in Wireless Sensor Networks PROJECT SYNOPSIS Wireless sensor networks (WSNs) are increasingly being deployed in security-critical applications. Because of their inherent resource-constrained characteristics, they are prone to various security attacks, and a black hole attack is a type of attack that seriously affects data collection. To conquer that challenge, an active detection-based security and trust routing scheme named ActiveTrust is proposed for WSNs. The most important innovation of ActiveTrust is that it avoids black holes through…

Read More

GeTrust: A guarantee-based trust model in Chord-based P2P networks

GeTrust: A guarantee-based trust model in Chord-based P2P networks DOWNLOAD PROJECT SYNOPSIS – JAVA DOWNLOAD PROJECT SYNOPSIS – NS2 More and more users are attracted by P2P networks characterized by decentralization, autonomy and anonymity. However, users unconstrained behavior makes it necessary to use a trust model when establishing trust relationships between peers. Most existing trust models are based on recommendations, which, however, suffer from the shortcomings of slow convergence and high complexity of trust computations, as well as huge overhead of network traffic. Inspired by the establishment of trust relationships…

Read More

PROVEST: Provenance-based Trust Model for Delay Tolerant Networks

PROVEST: Provenance-based Trust Model for Delay Tolerant Networks DOWNLOAD PROJECT SYNOPSIS – JAVA DOWNLOAD PROJECT SYNOPSIS – NS2 Delay tolerant networks (DTNs) are often encountered in military network environments where end-to-end connectivity is not guaranteed due to frequent disconnection or delay. A provenance-based trust framework is proposed, namely PROVEST (PROVEnance-baSed Trust model) that aims to achieve accurate peer-to-peer trust assessment and maximize the delivery of correct messages received by destination nodes while minimizing message delay and communication cost under resource-constrained network environments. Provenance refers to the history of ownership of…

Read More

E2R2: Energy-Efficient and Reliable Routing for Mobile Wireless Sensor Networks

E2R2: Energy-Efficient and Reliable Routing for Mobile Wireless Sensor Networks DOWNLOAD PROJECT SYNOPSIS -JAVA DOWNLOAD PROJECT SYNOPSIS -NS2 Wireless sensor networks (WSNs) are resource constrained. Energy is one of the most important resources in such networks. Therefore, optimal use of energy is necessary. A novel energy-efficient routing protocol is proposed for WSNs. The protocol is reliable in terms of data delivery at the base station (BS). Mobility in sensor nodes and in the BS is considered. The proposed protocol is hierarchical and cluster based. Each cluster consists of one cluster…

Read More

A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis

A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis Interconnected systems, such as Web servers, database servers, cloud computing servers etc, are now under threads from network attackers. As one of most common and aggressive means, Denial-of-Service (DoS) attacks cause serious impact on these computing systems. A DoS attack detection system is proposed that uses Multivariate Correlation Analysis (MCA) for accurate network traffic characterization by extracting the geometrical correlations between network traffic features. MCA-based DoS attack detection system employs the principle of anomaly-based detection in attack recognition. This…

Read More

Hiding in the Mobile Crowd: Location Privacy through Collaboration

Hiding in the Mobile Crowd: Location Privacy through Collaboration Location-aware smartphones support various location-based services (LBSs): users query the LBS server and learn on the fly about their surroundings. However, such queries give away private information, enabling the LBS to track users. A user-collaborative privacy-preserving approach is proposed for LBSs. This solution does not require changing the LBS server architecture and does not assume third party servers; yet, it significantly improves users’ location privacy. The gain stems from the collaboration of mobile devices: they keep their context information in a…

Read More

Incentive Based Data Sharing in Delay Tolerant Mobile Networks

Incentive Based Data Sharing in Delay Tolerant Mobile Networks Mobile wireless devices play important roles in our daily life, e.g., users often use such devices to take pictures and share with friends via opportunistic peer-to-peer links, which however are intermittent in nature, and hence require the store and- forward feature proposed in Delay Tolerant Networks to provide useful data sharing opportunities. Moreover, mobile devices may not be willing to forward data items to other devices due to the limited resources. Hence, effective data dissemination schemes need to be designed to…

Read More