In this paper we propose a novel approach, namely Cloud Information Accountability (CIA) framework, based on the notion of information accountability. Our proposed CIA framework provides end-to-end accountability in a highly distributed fashion. One of the main innovative features of the CIA framework lies in its ability of maintaining lightweight and powerful accountability that combines […]
D-AdaptOR : Distributed Adaptive Opportunistic Routing
In this paper propose a distributed adaptive opportunistic routing algorithm (d-AdaptOR) that minimizes the expected average per-packet cost for routing a packet from a source node to a destination. This is achieved by both sufficiently exploring the network using data packets and exploiting the best routing opportunities. This reinforcement learning framework allows for a low-complexity, […]
Source and Sink Location Hiding for Privacy Preservation
While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such contextual information can be exploited by an adversary to derive sensitive information such as the locations of monitored objects and data sinks in the field. Attacks on these components can significantly undermine any network application. […]