In this abstract, we propose E-STAR, a secure protocol for Establishing Stable and reliable Routes in HMWNs. E-STAR integrates trust and payment systems with a trust based and energy aware routing protocol. E-STAR aims to identify the good nodes and select them in routing. The payment system uses credits (or micro payment) to charge the […]
A Novel Errors Detection Approach For Time Efficient In Big Sensor Data On Cloud
Big data set from sensors is often subject to corruption and losses due to wireless medium of communication and presence of hardware inaccuracies in the nodes. For a WSN application to deduce an appropriate result, it is necessary that the data received is clean, accurate, and loss-less. However, effective detection and cleaning of sensor big […]
E-STAR – SECURE AND RELIABLE ROUTING PROTOCOLS FOR HETEROGENEOUS MULTIHOP WIRELESS NETWORKS
ESTAR integrates payment and trust systems with the routing protocol with the goal of enhancing route reliability and stability. We propose a multidimensional trust system based on processing the payment receipts. ESTAR stimulates the nodes not only to relay others’ packets even if they have many credits, but also to stabilize the routes and report […]
DIDRIP – A NOVEL SECURE AND DISTRIBUTED DATA DISCOVERY AND DISSEMINATION IN WIRELESS SENSOR NETWORKS
This paper proposes the first secure and distributed data discovery and dissemination protocol named DiDrip. It allows the network owners to authorize multiple network users with different privileges to simultaneously and directly disseminate data items to the sensor nodes. Moreover, as demonstrated by our theoretical analysis, it addresses a number of possible security vulnerabilities that […]
A NOVEL SECURE AND DISTRIBUTED DATA DISCOVERY AND DISSEMINATION PROTOCOL IN WSN
The need of distributed data discovery and dissemination protocols is not completely new, but previous work did not address this need. We study the functional requirements of such protocols, and set their design objectives. Also, we identify the security vulnerabilities in previously proposed protocols. Based on the design objectives, we propose DiDrip. It is the […]
Performance evaluation of Cloud computing infrastructures using SRN (Stochastic Reward Nets)
In order to integrate business requirements and application level needs, in terms of Quality of Service (QoS), cloud service provisioning is regulated by Service Level Agreements. In this paper, we present a stochastic model, based on Stochastic Reward Nets (SRNs), that exhibits features allowing capturing the key concepts of an IaaS cloud system. The proposed […]
Reserving room before encryption using Reversible Data Hiding
Reversible data hiding (RDH) in images is a technique, by which the original cover can be losslessly recovered after the embedded message is extracted. In the proposed method, we first empty out room by embedding LSBs of some pixels into other pixels with a traditional RDH method and then encrypt the image, so the positions […]
EOLSR for defense against DOS attack in the network
In this paper we analyze the vulnerabilities of a pro-active routing protocol called optimized link state routing (OLSR) against a specific type of denial-of-service (DOS) attack called node isolation attack. Analyzing the attack, we propose a mechanism called enhanced OLSR (EOLSR) protocol which is a trust based technique to secure the OLSR nodes against the […]
SECURE COVERAGE OF LARGE SCALE WIRELESS SENSOR NETWORK
We proposed, in this work, a scalable key management scheme which ensures a good secure coverage of large scale WSN with a low key storage overhead and a good network resiliency.One of the main concerns when designing a key management scheme is the network scalability. Indeed, the protocol should support a large number of nodes […]
Secure Two-Party Differentially Private Data Release for Vertically-Partitioned Data
Privacy-preserving data publishing addresses the problem of disclosing sensitive data when mining for useful information. Among the existing privacy models, ε-differential privacy provides one of the strongest privacy guarantees. In this paper, we address the problem of private data publishing, where different attributes for the same set of individuals are held by two parties. In […]