In this paper, we propose CDL, a Combined and Differentiated Localization approach for localization that exploits the strength of range-free approaches and range-based approaches using received signal strength indicator (RSSI). A critical observation is that ranging quality greatly impacts the overall localization accuracy. To achieve a better ranging quality, our method CDL incorporates virtual-hop localization, […]
EOLSR for defense against DOS attack in the network
In this paper we analyze the vulnerabilities of a pro-active routing protocol called optimized link state routing (OLSR) against a specific type of denial-of-service (DOS) attack called node isolation attack. Analyzing the attack, we propose a mechanism called enhanced OLSR (EOLSR) protocol which is a trust based technique to secure the OLSR nodes against the […]
DISTRIBUTED AND SELF-MANAGED ADDRESSING PROTOCOL FOR DYNAMIC AD HOC NETWORKS
We proposed a distributed and self-managed addressing protocol, called Filter-based Addressing protocol, which fits well for dynamic ad hoc networks with fading channels, frequent partitions, and joining/leaving nodes. Address assignment is a key challenge in ad hoc networks due to the lack of infrastructure. Autonomous addressing protocols require a distributed and self-managed mechanism to avoid […]
SECURE COVERAGE OF LARGE SCALE WIRELESS SENSOR NETWORK
We proposed, in this work, a scalable key management scheme which ensures a good secure coverage of large scale WSN with a low key storage overhead and a good network resiliency.One of the main concerns when designing a key management scheme is the network scalability. Indeed, the protocol should support a large number of nodes […]
To detect and mitigate collaborative attacks in the cloud Virtual networking environment
NICE utilizes the attack graph model to conduct attack detection and prediction. The proposed solution investigates how to use the programmability of software switches based solutions to improve the detection accuracy and defeat victim exploitation phases of collaborative attacksCloud security is one of most important issues that has attracted a lot of research and development […]
Enhanced Adaptive ACKnowledgment to detect Secure Intrusion in for MANETs
In this paper, we propose and implement a new intrusion-detection system named Enhanced Adaptive ACKnowledgment (EAACK) specially designed for MANETs. Compared to contemporary approaches, EAACK demonstrates higher malicious- behavior-detection rates in certain circumstances while does not greatly affect the network performances. The migration to wireless network from wired network has been a global trend in […]
ONLINE SOCIAL NETWORK USER CONTROL OVER THE UNWANTED MESSAGE
In this paper, we have presented a system to filter undesired messages from OSN walls .One fundamental issue in today’s Online Social Networks (OSNs) is to give users the ability to control the messages posted on their own private space to avoid that unwanted content is displayed. Up to now, OSNs provide little support to […]
Real-time nature of Twitter for event detection
Twitter has received much attention recently. In this paper, we investigated the real-time nature of Twitter, devoting particular attention to event detection. An important characteristic of Twitter is its real-time nature. We investigate the real-time interaction of events such as earthquakes in Twitter and propose an algorithm to monitor tweets and to detect a target […]
A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
DDoS presents a serious threat to the Internet since its inception, where lots of controlled hosts flood the victim site with massive packets. Moreover, in Distributed Reflection DoS (DRDoS), attackers fool innocent servers (reflectors) into flushing packets to the victim. But most of current DRDoS detection mechanisms are associated with specific protocols and cannot be […]
Design and development of trusted Database with full data confidentiality
Traditionally, as soon as confidentiality becomes a concern, data is encrypted before outsourcing to a service provider. Any software-based cryptographic constructs then deployed, for server-side query processing on the encrypted data, inherently limit query expressiveness. Here, we introduce TrustedDB, an outsourced database prototype that allows clients to execute SQL queries with privacy and under regulatory […]
- « Previous Page
- 1
- …
- 53
- 54
- 55
- 56
- 57
- …
- 108
- Next Page »