In this abstract, we propose E-STAR, a secure protocol for Establishing Stable and reliable Routes in HMWNs. E-STAR integrates trust and payment systems with a trust based and energy aware routing protocol. E-STAR aims to identify the good nodes and select them in routing. The payment system uses credits (or micro payment) to charge the […]
A Novel Errors Detection Approach For Time Efficient In Big Sensor Data On Cloud
Big data set from sensors is often subject to corruption and losses due to wireless medium of communication and presence of hardware inaccuracies in the nodes. For a WSN application to deduce an appropriate result, it is necessary that the data received is clean, accurate, and loss-less. However, effective detection and cleaning of sensor big […]
E-STAR – SECURE AND RELIABLE ROUTING PROTOCOLS FOR HETEROGENEOUS MULTIHOP WIRELESS NETWORKS
ESTAR integrates payment and trust systems with the routing protocol with the goal of enhancing route reliability and stability. We propose a multidimensional trust system based on processing the payment receipts. ESTAR stimulates the nodes not only to relay others’ packets even if they have many credits, but also to stabilize the routes and report […]
DIDRIP – A NOVEL SECURE AND DISTRIBUTED DATA DISCOVERY AND DISSEMINATION IN WIRELESS SENSOR NETWORKS
This paper proposes the first secure and distributed data discovery and dissemination protocol named DiDrip. It allows the network owners to authorize multiple network users with different privileges to simultaneously and directly disseminate data items to the sensor nodes. Moreover, as demonstrated by our theoretical analysis, it addresses a number of possible security vulnerabilities that […]
A NOVEL SECURE AND DISTRIBUTED DATA DISCOVERY AND DISSEMINATION PROTOCOL IN WSN
The need of distributed data discovery and dissemination protocols is not completely new, but previous work did not address this need. We study the functional requirements of such protocols, and set their design objectives. Also, we identify the security vulnerabilities in previously proposed protocols. Based on the design objectives, we propose DiDrip. It is the […]
Heuristic indistinguishable group Anonymization scheme
Our work is on outsourcing privacy-preserving social networks to a cloud environment. Research in this area is still in its infancy. To the best of our knowledge, the work is the first to address this problem. The work that is closest to our work can be found in publishing privacy-preserving social networks. As a pioneering […]
Social Privacy Perspectives Emphasizing the Narratives
The problems that arise in OSNs, and proposed a diverse range of “privacy solutions”. These include software tools and design principles to address OSN privacy issues. Each of these solutions is developed with a specific type of user, use, and privacy problem in mind. This has had some positive effects: we now have a broad […]
CPDP Publicly Verifiable Information To Prove A Structure
Many trends are opening up the era of Cloud Computing, which is an Internet-based development and use of computer technology. Consider the large size of the outsourced electronic data and the client’s constrained resource capability, the core of the problem can be generalized as how can the client find an efficient way to perform periodical […]
The Method is applied to correction of spelling errors in queries Reformulation
This paper addresses string transformation, which is an essential problem, in many applications. In natural language processing, pronunciation generation, spelling error correction, word transliteration, and word stemming can all be formalized as string transformation. String transformation can also be used in query reformulation and query suggestion in search. In data mining, string transformation can be […]
Trust information is dependent to the Structure of p2p network
A trust model for P2P networks is presented, in which a peer can develop a trust network in its proximity. A peer can isolate malicious peers around itself as it develops trust relationships with good peers. Two context of trust, service and recommendation contexts, are defined to measure capabilities of peers in providing services and […]
- « Previous Page
- 1
- 2
- 3
- 4
- 5
- …
- 13
- Next Page »