The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the research area of vehicular ad-hoc networks (VANETs), a novel notion named data-centric trust establishment is introduced recently, which means the trustworthiness of data is evaluated according to the data's intrinsic properties instead of the reputation of providing entities. In this paper, we propose a Roadside-unit Aided Trust Establishment scheme (RATE) that aims to execute data-centric...
The task of finding authoritative people within an organization has received increased interest over the past few years. To identify an expert in a specific field, expertise evidence of candidates should be collected in the enterprise corpora to represent one's knowledge and skills. Though there have been various methods proposed for evidence collecting and expertise modeling, little work has been...
Conditional Random Fields (CRFs) are widely used in machine learning and natural language processing fields. A number of methods have been developed for CRF training. However, even with state-of-the-art algorithms, the training of CRF is still very time and space consuming. This make it infeasible to use CRFs in large-scale data analysis tasks. This paper proposes an efficient algorithm, HOCT, for...
The issue of expert finding within an organization has received increased attention in past few years due to its significant importance in knowledge management. Till now, various solutions have been proposed to solve this problem. Among these solutions,generative probabilistic language modeling techniques are most frequently adopted. In this work, we propose a novel model to find experts in enterprise...
An expert finding system enables individuals within a large organization to search for authoritative people in a certain area. Various approaches have been proposed to solve the problem of expert finding and most of them can be classified as either document model or candidate model. In this paper, we propose a novel strategy based on the document model to improve the performance of expert finding...
Mobile ad hoc networks will often be deployed in environments where the nodes of the networks are unattended and have little or no physical protection against tampering. The nodes of mobile ad hoc networks are thus susceptible to compromise. The networks are particularly vulnerable to denial of service (DoS) attacks launched through compromised nodes or intruders. In this paper, we investigated the...
Wireless Mesh Network (WMN) is an emerging technology that has developed a lot these years. WMN has the feather of self-organization, distributed structure. The main topological characteristic of WMN is that there are only one or several node connecting to the infrastructure network as gateway and all other nodes connect to the gateway through the relay of the neighboring nodes, and then connect with...
Unique characteristics of wireless sensor networks have made node compromise a great security challenge. An adversary can use compromised nodes to inject false data to the network, thus deceiving the sink to make false decisions. Moreover, the false data will deplete precious energy resources of en-route nodes which forward the false data to the sink. To fight against such false data injection attacks,...
Self-healing key distribution enables users in a large and dynamic group to establish session keys for secure group communication over an unreliable network. The main property of self-healing key distribution is that the users are capable of recovering lost session keys on their own, without requesting additional transmissions from the group manager. In this paper, we propose an efficient self-healing...
Self-healing key distribution enables users in a large and dynamic group to establish session keys for secure group communication over an unreliable network. The main property of self-healing key distribution is that the users are capable of recovering lost session keys on their own, without requesting additional transmissions from the group manager. In this paper, we propose a self-healing key distribution...
Self-healing key distribution enables users in a large and dynamic group to establish session keys for secure group communication over an unreliable network (e.g., wireless sensor networks). The main property of self-healing key distribution is that the users are capable of recovering lost session keys on their own, without requesting additional transmissions from the group manager. In this paper,...
Dynamics of sensor networks make security one of the top issues we should pay attention to. Sensor networks can be deployed in hostile environments where their nodes are easy to be captured or re-programmed for deleterious use by an adversary. Therefore, it is necessary to protect communications between sensor nodes through cryptographic methods. To address this, symmetric key management in wireless...
The need for efficient and secure localization is an important issue in a scalable self-organizing network. However, exiting secure solutions are not well suitable or effective for wireless sensor and actor networks (WSANs) because of the features of WSANs (e.g. node heterogeneity). In this paper, we propose a novel approach (SeLoc) to secure localization for WSAN based on DV-Hop and hidden actors...
Wireless sensor networks (WSNs) have wide applications both in military and civil fields. However, when deployed in untended/hostile area, WSNs may suffer all kinds of attacks like flooding, sinkhole, etc. To apply WSNs more practically and wildly, some secure countermeasures must be deployed in WSNs. In this paper, we design a kind of firewall scheme, which is based on mobile agent, to isolate the...
The Public Key Cryptography (PKC) has been proved to be able to be applied in memory-constrained sensor nodes and have nice properties for secure Wireless Sensor and Actor Network (WSAN). In order to prevent the man-in-the-middle attack, the public keys of nodes in WSAN must be authenticated with each other before communication. In this paper, we propose the PEAN scheme for public key authentication...
Frequency-hopping is a kind of secure solution in wireless communication field. We propose two novel mechanisms based on differential frequency-hopping to prevent those attacks like jamming, eavesdropping, tampering, etc. in wireless sensor networks (WSN). We also present the deployment scheme of our secure solutions. The analysis in this paper indicates that these two solutions have a number of good...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.