To protect WSNs from the harmful attacks exploiting the replay of routing information, we have designed and implemented a robust trust-aware routing framework, TARF, to secure routing solutions in wireless sensor networks. The design of TARF centers on trustworthiness and energy efficiency. EnergyWatcher is responsible for recording the energy cost for each known neighbor, based […]
Dynamic Cluster based Energy efficient protocol for wireless sensor networks
Wireless sensor networks (WSNs) are considered as energy constrained network because it contains sensor nodes with limited battery capacity and transmission range. In WSNs there is one mechanism used to enlarge the lifespan of network and provide more efficient functioning procedures that is clustering. Clustering is a process to subdivide the sensing field of sensor […]
Selfish node detection in MANET
In this paper, we address the problem of selfishness in the context of replica allocation in a MANET, i.e., a selfish node may not share its own memory space to store replica for the benefit of other nodes. In this paper, we shall refer to such a problem as the selfish replica allocation. Simply, selfish […]
SPOT – Compromised machine detection
In this paper, we focus on the detection of the compromised machines in a network that are used for sending spam messages, which are commonly referred to as spam zombies. We develop the SPOT detection system to assist system administrators in automatically identifying the compromised machines in their networks. SPOT is designed based on a […]
Secure Cloud Storage System with Secure Data Forwarding
In this paper, we address the problem of forwarding data to another user by storage servers directly under the command of the data owner. We consider the system model that consists of distributed storage servers and key servers. We propose a new threshold proxy re-encryption scheme and integrate it with a secure decentralized code to […]
Compromised machine detection using Spam Zombie System
Abstract Compromised machines are one of the key security threats on the Internet; they are often used to launch various security attacks such as spamming and spreading malware, DDoS, and identity theft. We focus on the detection of the compromised machines in a network that are used for sending spam messages, which are commonly referred […]
Detecting and Tracking Vehicle in Aerial Surveillance
In this paper we present automatic vehicle detection and tracking system for aerial surveillance. In the existing frameworks they apply either region based or sliding window based of vehicle detection in aerial surveillance. These method have highly depends on the color segmentation, a lot of miss detections on rotated vehicles and high computational complexity. So […]
A Distributed Access Control Architecture for Cloud Computing
The large-scale, dynamic, and heterogeneous nature of cloud computing poses numerous security challenges. But the cloud’s main challenge is to provide a robust authorization mechanism that incorporates multitenancy and virtualization aspects of resources. The authors present a distributed architecture that incorporates principles from security management and software engineering and propose key requirements and a design […]
User-Aware Image Tag Refinement via Ternary Semantic Analysis
Large-scale user contributed images with tags are easily available on photo sharing websites. However, the noisy or incomplete correspondence between the images and tags prohibits them from being leveraged for precise image retrieval and effective management. To tackle the problem of tag refinement, we propose a method of Ranking based Multi-correlation Tensor Factorization (RMTF), to […]
Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations
Cloud computing economically enables customers with limited computational resources to outsource large-scale computations to the cloud. However, how to protect customers’ confidential data involved in the computations then becomes a major security concern. In this paper, we present a secure outsourcing mechanism for solving large-scale systems of linear equations (LE) in cloud. Because applying traditional […]