A navigator in this case aims to control the mobile sensor to get close to the moving target from any initial position. Since the target maneuvers are not known a priori to the controller, solving the problem requires a real-time strategy. The joint problem of mobile sensor navigation and mobile target tracking based on a […]
Network Traffic Characterization Using Triangle area-based Multivariate Correlation Analysis
DENIAL-OF-SERVICE (DoS) attacks are one type of aggressive and menacing intrusive behavior to online servers. DoS attacks severely degrade the availability of a victim a host, a router, or an entire network. They impose intensive computation tasks to the victim by exploiting its system vulnerability or flooding it with huge amount of useless packets. The […]
Node localization in mobile sensor networks in Noisy Environments
WIRELESS sensor networks (WSNs) are increasingly a part of the modern landscape. Disciplines as diverse as volcanic eruption prediction and disaster response benefit from the addition of sensing and networking. A common requirement of many wireless sensor network systems is localization, where deployed nodes in a network discover their positions. smaller networks covering small areas, […]
VMISO links for multihop wireless network
SPACE-TIME communication is a technique that leverages the spatial and temporal variations of the channel to significantly enhance the performance of wireless networks. This communication paradigm can be realized using multiple antenna element arrays where the antenna elements are separated sufficiently (of the order of the wavelength of the carrier used) such that the channel […]
Secure Routing Protocol Using MANET’S
RAPID development of Mobile Ad Hoc Networks (MANETs) has stimulated numerous wireless applications that can be used in a wide number of areas such as commerce, emergency services, military, education, and entertainment. MANETs feature self-organizing and independent infrastructures. Through traffic analysis, enemies may intercept transmitted packets, track our soldiers (i.e., nodes), attack the commander nodes, […]
VM Resource Allocation Isolation Technology in Cloud System
CLOUD computing has emerged as a compelling paradigm for the deployment of ease-of-use virtual environment on the Internet. One typical feature of clouds is its pool of easily accessible virtualized resources (such as hardware, platform or services) that can be dynamically reconfigured to adjust to a variable load (scale). Cloud systems usually do not provision […]
To protect the Patient’s privacy for mobile health monitoring system
In this paper, we design a cloud-assisted privacy preserving mobile health monitoring system, called CAM, which can effectively protect the privacy of clients and the intellectual proerty of m Health service providers. To protect the clients’privacy, we apply the anonymous Boneh-Franklin identity based encryption (IBE) in medical diagnostic branching programs. To reduce clients’ decryption complexity, […]
Discovery and Resolution of Anomalies in Web Access Control Policies
Emerging computing technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effectively. However, we still suffer from unintended security leakages by unauthorized actions in business services while providing more convenient services to Internet users through such a cutting-edge technological growth. Furthermore, designing and managing […]
Detecting Distributed Reflection DoS Attacks based on Rank Correlation
DDoS presents a serious threat to the Internet since its inception, where lots of controlled hosts flood the victim site with massive packets. Moreover, in Distributed Reflection DoS (DRDoS), attackers fool innocent servers (reflectors) into flushing packets to the victim. But most of current DRDoS detection mechanisms are associated with specific protocols and cannot be […]
Cloud oriented Content Delivery Network paradigm within a multi-provider Networked Cloud Environment
In this paper is placed on the introduction, design and assessment of a complete model and framework aiming specifically at the deployment of a Cloud oriented Content Delivery Network paradigm within a multi-provider Networked Cloud Environment. A hierarchical framework is proposed and evaluated towards an efficient and scalable solution of content distribution over a multi-provider […]