SecureMAC: Securing Wireless Medium Access Control Against Insider Denial-of-Service Attacks Abstract-Wireless network dynamically allocates channel resources to improve spectral efficiency and, to avoid collisions, has its users cooperate with each other using a medium access control (MAC) protocol. However, MAC assumes user compliance and can be detrimental when a user misbehaves. An attacker who compromised…
Securing Cloud Data under Key Exposure Abstract-Recent news reveal a powerful attacker which breaks data confidentiality by acquiring cryptographic keys, by means of coercion or backdoors in cryptographic software. Once the encryption key is exposed, the only viable measure to preserve data confidentiality is to limit the attacker?s access to the ciphertext. This may be…
Securing Services in Networked Cloud Infrastructures Abstract?we propose techniques and architecture for securing services that are hosted in a multi-tenant networked cloud infrastructures. Our architecture is based on trusted virtual domains and takes into account both security policies of the tenant domains. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source…
Securing the Backpressure Algorithm for Wireless Networks Abstract-In the first place, the backpressure algorithm is known to provide throughput optimality in routing and scheduling decisions for multi-hop networks with dynamic traffic. The essential assumption in the backpressure algorithm is that all nodes are benign and obey the algorithm rules governing the information exchange and underlying…
Security Management System Abstract-In the first place, earlier days security guards used to store the data in the form of files, registers etc., which includes entirely manual operations. Due to this there were chances of misplacement or corruption of data and it is very hard to track thedata .Suppose crime or theft accrue means all…
Security-Aware Resource Allocation for Mobile Social Big Data: A Matching-Coalitional Game Solution Abstract-In the first place, As both the scale of mobile networks and the population of mobile users keep increasing equally important, the applications of mobile social big data have emerged where mobile social users can use their mobile devices to exchange and share…
Security, Privacy, and Access Control in Information-Centric Networking: A Survey Abstract-Information-Centric Networking (ICN) replaces the widely used host-centric networking paradigm in communication networks (e.g., Internet and mobile ad hoc networks) with an information-centric paradigm, which prioritizes the delivery of named content, oblivious of the contents? origin. Content and client security, provenance, and identity privacy are…
SEDEX: Scalable Entity Preserving Data Exchange Abstract? Data exchange is the process of generating an instance of a target schema from an instance of a source schema such that source data is reflected in the target. Generally, data exchange is performed using schema mapping, representing high level relations between source and target schemas. < final...
SEDEX: Scalable Entity Preserving Data Exchange Abstract? Data exchange is the process of generating an instance of a target schema from an instance of a source schema such that source data is reflected in the target. Generally, data exchnge is performed using schema mapping, representing high level relations between source and target schemas. In this…
Self Security Through GPS Based Protection System Abstract? Self-security through GPS based protection system is a security application which is specially designed for mobile users especially for women. This application offers a helping hand with the help of GPS based location tracing. At the time of emergency there may not be any possibility to attempt…
Self-Deployment of Mobile Sensors to Achieve Target Coverage in the Presence of Obstacles Abstract? Target coverage is one of the major requirements in wireless sensor network applications, the purpose of which is to monitor a set of known targets in the region of interest. In this paper, we propose a localized self-deployment scheme, named as…
Self-Deployment of Randomly Scattered Mobile Sensors to Achieve Barrier Coverage Abstract? Constructing sensor barrier is a critical issue in wireless sensor networks for military and homeland security applications, which aims to detect intruders crossing into a protected area. In this letter, we propose two distributed, localized deployment schemes for self-adjustment of randomly deployed mobile sensor…