The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional interference with wireless transmissions can be used as a launchpad for mounting Denial-of-Service attacks on wireless networks. Typically, jamming has been addressed under an external threat model. However, adversaries with internal knowledge of protocol […]
Archives for December 2012
e-ARAN: Enhanced Authenticated Routing for ad hoc networks to handle selfish nodes
Mobile ad hoc network requires lots of attention towards secure reputed routing. This paper proposed a novel reputed e-ARAN scheme to detect and handle authenticated selfish nodes, based on reputed OCEAN scheme. With description of all four phases of reputed e-ARAN it also proves that the proposed scheme gives better end-to-end delay and throughput as […]
Optimizing throughput with reduction in power consumption and performance comparison of DSR and AODV routing protocols
The main objective of the paper is to increase the throughput thereby reducing the Network Load and end to end delay between nodes. To achieve this, it is proposed to go for reactive routing protocols. Proactive routing protocols use table-driven strategy that is the routing tables are exchanged periodically between nodes which lead to more […]
Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over Wireless Networks
For real-time video broadcast where multiple users are interested in the same content, mobile-to-mobile cooperation can be utilized to improve delivery efficiency and reduce network utilization. Under such cooperation, however, real-time video transmission requires end-to-end delay bounds. Due to the inherently stochastic nature of wireless fading channels, deterministic delay bounds are prohibitively difficult to guarantee. […]
Adaptive Opportunistic Routing for Wireless Ad Hoc Networks
A distributed adaptive opportunistic routing scheme for multihop wireless ad hoc networks is proposed. The proposed scheme utilizes a reinforcement learning framework to opportunistically route the packets even in the absence of reliable knowledge about channel statistics and network model. This scheme is shown to be optimal with respect to an expected average per-packet reward […]
Privacy- and Integrity-Preserving Range Queries in Sensor Networks
The architecture of two-tiered sensor networks, where storage nodes serve as an intermediate tier between sensors and a sink for storing data and processing queries, has been widely adopted because of the benefits of power and storage saving for sensors as well as the efficiency of query processing. However, the importance of storage nodes also […]
Design, Implementation, and Performance of a Load Balancer for SIP Server Clusters
This paper introduces several novel load-balancing algorithms for distributing Session Initiation Protocol (SIP) requests to a cluster of SIP servers. Our load balancer improves both throughput and response time versus a single node while exposing a single interface to external clients. We present the design, implementation, and evaluation of our system using a cluster of […]
Router Support for Fine-Grained Latency Measurements
An increasing number of datacenter network applications, including automated trading and high-performance computing, have stringent end-to-end latency requirements where even microsecond variations may be intolerable. The resulting fine-grained measurement demands cannot be met effectively by existing technologies, such as SNMP, NetFlow, or active probing. We propose instrumenting routers with a hash-based primitive that we call […]
Independent Directed Acyclic Graphs for Resilient Multipath Routing
In order to achieve resilient multipath routing, we introduce the concept of independent directed acyclic graphs (IDAGs) in this paper. Link-independent (node-independent) DAGs satisfy the property that any path from a source to the root on one DAG is link-disjoint (node-disjoint) with any path from the source to the root on the other DAG. Given […]
Enhanced data security model for cloud computing
Cloud Computing becomes the next generation architecture of IT Enterprise. In contrast to traditional solutions, Cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique feature, however, raises many new security challenges which have not been well […]
- 1
- 2
- 3
- 4
- Next Page »