Decentralized Hypothesis Testing in Wireless Sensor Networks in the Presence of Misbehaving Nodes

Decentralized Hypothesis Testing in Wireless Sensor Networks in the Presence of Misbehaving Nodes INFORMATION FORENSICS AND SECURITY, JANUARY 2013 Technology Used: Java Wireless sensor networks are prone to node misbehavior arising from tampering by an adversary (Byzantine attack), or due to other factors such as node failure resulting from hardware or software degradation. In this paper, we consider the problem of decentralized detection in wireless sensor networks in the presence of one or more classes of misbehaving nodes. Binary hypothesis testing is considered where the honest nodes transmit their binary…

Read More

Extracting spread-spectrum hidden data from digital media

Extracting spread-spectrum hidden data from digital media Technology Used: Dot Net The problem of extracting blindly data embedded over a wide band in a spectrum (transform) domain of a digital medium image is considered. To develop a novel multicarrier/ signature iterative generalized least-squares (M-IGLS) core procedure to seek unknown data hidden in hosts via multicarrier spread-spectrum embedding. Neither the original host nor the embedding carriers are assumed available. Experimental studies on images show that the developed algorithm can achieve recovery probability of error close to what may be attained with…

Read More

A Novel Privacy Preserving Location-Based Service Protocol With Secret Circular Shift for K-NN Search

A Novel Privacy Preserving Location-Based Service Protocol With Secret Circular Shift for K-NN Search Technology Used: Java/J2EE Location-based service (LBS) is booming up in recent years with the rapid growth of mobile devices and the emerging of cloud computing paradigm. Among the challenges to establish LBS, the user privacy issue becomes the most important concern. A successful privacy-preserving LBS must be secure and provide accurate query [e.g., -nearest neighbor (NN)] results. In this work, we propose a private circular query protocol (PCQP) to deal with the privacy and the accuracy…

Read More

Redundancy Management of Multipath Routing forIntrusion Tolerance in Heterogeneous Wireless Sensor Networks

In this paper we propose redundancy management of heterogeneous wireless sensor networks (HWSNs), utilizing multipath routing to answer user queries in the presence of unreliable and malicious nodes. The key concept of our redundancy management is to exploit the tradeoff between energy consumption vs. the gain in reliability, timeliness, and security to maximize the system useful lifetime. We formulate the tradeoff as an optimization problem for dynamically determining the best redundancy level to apply to multipath routing for intrusion tolerance so that the query response success probability is maximized while…

Read More

NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems Jul/Aug 2013 Cloud security is one of most important issues that has attracted a lot of research and development effort in past few years. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further large-scale Distributed Denial-of-Service (DDoS). DDoS attacks usually involve early stage actions such as multistep exploitation, low-frequency vulnerability scanning, and compromising identified vulnerable virtual machines as zombies, and finally DDoS attacks through the compromised zombies. Within the cloud system, especially…

Read More

Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data

Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data Jul / Aug 2013 Cloud computing has emerging as a promising pattern for data outsourcing and high-quality data services. However, concerns of sensitive information on cloud potentially causes privacy problems. Data encryption protects data security to some extent, but at the cost of compromised efficiency. Searchable symmetric encryption (SSE) allows retrieval of encrypted data over cloud. In this paper, we focus on addressing data privacy issues using SSE. For the first time, we formulate the privacy issue from the aspect of…

Read More