The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Online Social Networks (OSNs) have become a rewarding target for attackers. One particularly popular attack is the Sybil attack, in which the adversary creates many fake accounts called Sybils in order to, for instance, distribute spam or manipulate voting results. A first generation of defense systems tried to detect these Sybils by analyzing changes in the structure of the OSN graph---unfortunately...
We propose AccountTrade, a set of accountable protocols, for big data trading among dishonest consumers. To secure the big data trading environment, our protocols achieve book-keeping ability and accountability against dishonest consumers who may misbehave throughout the dataset transactions. Specifically, we study the responsibilities of the consumers in the dataset trading and design AccountTrade...
In a software defined network (SDN), the control plane needs to frequently collect flow statistics measured at the data plane switches for different applications, such as traffic engineering, flow re-routing, and attack detection. However, existing solutions for flow statistics collection may result in large bandwidth cost in the control channel and long processing delay on switches, which significantly...
Auction based participant selection has been widely used for mobile crowd sensing (MCS) to achieve user incentive and assignment optimization. However, mobile crowd sensing problems solved with auction-based approaches usually involve participants' privacy concerns because a participant's bids may contain her private information (such as location visiting patterns), and disclosure participants' bids...
Side-channel attacks and fault attacks use the physical interactions with cryptographic devices to achieve the shortcuts of recovering the secret key. For side-channel attacks, physical information leakage during the cryptographic calculation is measured and statistically analyzed to reveal the intermediate values. For fault attacks, computational faults are intentionally triggered to obtain faulty...
Most electricity bills are paid by the post-paid method, which corresponds to the real electricity consumed by electrical appliances. Demand Response (DR) programs are based on showing the consumer the current floating electricity price. Users do not realize the impact of the consumption cost as it changes for each mode of individual electricity consumption behaviors. An Electricity Forecasting Service...
In Delay Tolerant Networks (DTNs), the connections between mobile nodes are intermittent and constant end-to-end paths rarely exist. In recent years, social-based approaches, which attempt to exploit social behaviors of DTN nodes to make better routing decision, have drawn tremendous interests in DTN routing design. However, most of these algorithms always select the same next hop as relay under the...
Accurate maps are increasingly important with the growth of smart phones and the development of location-based services. Several crowdsourcing based map generation protocols have been proposed that rely on volunteers to provide their traces. Being creative, however, those methods pose a significant threat to user privacy as the traces can easily imply user behavior patterns. On the flip side, crowdsourcing-based...
Mobile crowdsourced sensing (MCS) is a new paradigm which takes advantage of pervasive smartphones to efficiently collect data, enabling numerous novel applications. To achieve good service quality for a MCS application, incentive mechanisms are necessary to attract more user participation. Most of existing mechanisms apply only for the offline scenario where all users' information are known a priori...
As the network infrastructure has been consuming more and more power, various schemes have been proposed to improve power efficiency of network devices. Many schemes put links to sleep when idle and wake them up when needed. A presumption in these schemes, though, is that router's line cards can be waken up quickly. However, through systematic measurement of a major vender's high-end router, we find...
Crowd counting, which count or accurately estimate the number of human beings within a region, is critical in many applications, such as guided tour, crowd control and marketing research and analysis. A crowd counting solution should be scalable and be minimally intrusive (i.e., device-free) to users. Image-based solutions are device-free, but cannot work well in a dim or dark environment. Non-image...
This paper proposed an optimized strategy of the incentive mechanism for participatory sensing network on the basis of Sense Util which is our previous research work. For optimizing, the strategy considered the possibility of that some users actually cannot participate the current sensing task, so in order to avoid unnecessary energy and bandwidth consumption on server end, users were classified into...
Multi-channel multi-radio technology is considered as an efficient method to improve the performance of wireless networks, and routing protocol is always the key issue of wireless networks. In this paper, a multi-channel routing protocol for dual radio wireless networks is proposed, which is extended from the classical DSR routing protocol and named as Multi-Channel Dual Radio protocol (MCDR). A new...
We investigated the adaptive power allocation in an point-to-point orthogonal frequency Division multiplexing (OFDM) cooperative system subject to the individual power constraint with an objective of maximize the sum transmission rate, and derived the optimal power allocation by assuming independent and identically distributed (i.i.d.) sub-channels in each Decode-and-Forward (DF) relay. To improve...
Agent-based modeling is a paradigm that simulates the simultaneous operations and interactions of multiple agents, in an attempt to re-create and predict the appearance of complex phenomena. Its key advantages are that a) it provides the most natural way to model real-world systems and b) it has much more modeling power than traditional mathematical methods such as differential equations as the latter...
In today's Internet, many peer-to-peer (P2P) applications deploy their distributed networks based on Kademlia, a robust distributed hash table (DHT) protocol. Since Kademlia has no mechanism to defend ID fraud, Sybil attack becomes a great threat on these P2P networks. However, to our best knowledge, Sybil attacks in real Kademlia-based networks has never been measured. In this paper, based on our...
In this paper, a QoS provisioning spectrum decision algorithm based on predictions is proposed in cognitive radio networks. By recording and analyzing the historical information, the algorithm can learn intelligently the rule of occupied spectrum by licensed users, and can predict the length of a spectrum hole, with the combination of the use's QoS request to provide a basis for spectrum decision...
Relevance feedback has been developed to improve retrieval performance effectively in Content Based Image Retrieval (CBIR). This paper introduces a relevance feedback system for CBIR with both short-term relevance feedback and long-term learning. In short-term relevance feedback, query reweighting algorithm, support vector machines (SVM), and genetic algorithm are adopted. In long-term learning, the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.