The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to cater for a growing user base that requires varied functionalities and owns multiple devices, software providers are using cloud solutions as the preferred technical means. In fact, all major operating systems come with a tight integration to cloud services. Software solutions that have such integration with cloud services should disclose (transparency) this to the consumer. Furthermore,...
Advances in embedded RF devices and sensor nodes have witnessed major expansion of end user services such as Internet of Things (IoT) and Cloud Computing. These prospective smart embedded and sensor devices normally interconnect to the internet using wireless technology (e.g. radio frequency, Wi-Fi) and run on top of CoAP and TFTP protocols. In this paper, we present a RF Simulator v1.1 which simulates...
Distributed wireless networks have become popular due to the evolution of the Internet-of-Things. These networks utilize ad-hoc routing protocols to interconnecting all nodes. Each peer forwards data for other nodes on the basis of network connectivity and a set of conventions that is determined by the routing protocol. Still, these protocols fail to protect legitimate nodes against several types...
Cognitive radio is a promising solution for spectrum scarcities in the future. Secondary users (SUs) adopt cooperative sensing to learn the primary user's (PU's) occupancy activity. This paper develops a trust-based data aggregation scheme to cope with malicious SU attack in cooperative spectrum sensing in cognitive radio networks. The proposed scheme combines the first-hand and second-hand sensing...
Today, concurrence with information technology (IT) progress, a novel issue has been introduced which is named as" cloud computing". The greatest obstacle that often is considered for acceptance of cloud services is lack of customers' trust to service providers. In this research, the problem of creating trust in cloud services has been evaluated and a model is presented to perform a comprehensive...
Security of sensitive data in the cloud is a critical issue as they can easily be transferred between different locations and then violate some constraints such as country-based regulations. There is notably a specific need to control the path followed by the data when they are transferred within the cloud. This paper is then presenting a new approach using OpenFlow and allowing to enforce in the...
The paper addresses the problem of spectrum sensing data falsification (SSDF) attacks in cooperative sensing and develops a dynamic trust management scheme to reliably detect and mitigate such attacks in cognitive radio networks. Secondary users (SUs) sense the spectrum to identify and dynamically access the available primary user (PU) channel. To improve sensing reliability, SUs send their sensing...
Trusted computing and security of services is one of the most challenging topics today and is the cloud computing's core technology that is currently the focus of international IT universe. Hadoop, as an open-source cloud computing and big data framework, is increasingly used in the business world, while the weakness of security mechanism now becomes one of the main problems obstructing its development...
The lack of proper privacy and security mechanisms to monitor the sensitive information entrusted to cloud service providers by consumers is a barrier to broader adoption of cloud computing. Despite the many benefits that cloud computing offer, many businesses are still skeptical about how privacy is handled in the cloud. This owes to the fact that with cloud computing, the storage and processing...
Trust is essential for the development of ECommerce web sites. Owners or developers of such web sites need to know the important characteristics of trust and how to display them on their web sites. In order to do so, the factors that influence user trust must be studied. Therefore, there is a clear need of a framework for building trust in E-Commerce web sites, especially Business-to-Consumer E-Commerce...
Security is one of the most critical constraints for the expansion of P2P networks. The autonomy, dynamic and distribution natures benefit both valid and malicious users. Exploiting a reputation-based trust model is a feasible solution in such an open environment to build trust relationship among peers. While most of the existing trust models focus on decreasing the abuse, intentions and sharing capabilities...
In existing trust establishment researches, the decision making accuracy and decision delay of received event message are both the outstanding problems in VANETs. Especially on the decision delay, the delay of alert event might lead to traffic accident and injury. In this paper, we propose an adaptive decision making model which can make decision quickly by the effective and quick assistance of the...
Ad hoc networks, due to their spontaneous nature, are frequently established in insecure environments and hence become prone to attacks. These attacks are due to the participation of malicious nodes in the network. Routing protocols are a common target of these nodes. A variety of secure routing protocols have been proposed, that make routes secure using cryptographic algorithms. However, in doing...
Trust and reputation models play an important part in ensuring the security of routing or data forwarding in networks, where the service consumers have no or little knowledge of the service providers. Trust and reputation models generate an accurate assessment for each identity in networks to provide enough information about the service provider and about how good the services offered. However the...
Cooperative spectrum sensing for vacant bands is one of the key techniques in cognitive radio networks. However, the existence of malicious secondary users could severely degrade the performance of cooperative spectrum sensing. Currently, sequential probability ratio test scheme (SPRT) is considered as a powerful approach to improve the sensing decision for cooperative spectrum sensing. Considering...
This paper focuses on developing the trust model for the proposed femto-cloud mobile network which has been designed to build an energy efficient network. The concept of data offloading to a cloud from a mobile device forms the backbone of the work. Trust is one of the most essential parameters in order to determine the quality of any computing system. A test case has been performed to verify the...
In recent years, numerous collaborative web applications have been successfully used to create encyclopedias, learning-objects, maps and even artworks. Trust and reputation systems are two important components of all collaborative information repositories such as Wikipedia. The open nature of such repositories encourages users to contribute to the application. However, this also makes vandalism and...
Even though online education is a very important pillar of lifelong education, institutions are still reluctant to wager for a fully online educational model. At the end, they keep relying on on-site assessment systems, mainly because fully virtual alternatives do not have the deserved social recognition or credibility. Thus, the design of virtual assessment systems that are able to provide effective...
Along with the invention of computers and interconnected networks, physical societal notions like security, trust, and privacy entered the digital environment. The concept of digital environments begins with the trust (established in the real world) in the organisation/individual that manages the digital resources. This concept evolved to deal with the rapid growth of the Internet, where it became...
Mobile ad hoc networks (MANETs) are wireless networks which have a wide range applications due to their dynamic topologies and easy to deployment. However, such networks are also more vulnerable to attacks compared with traditional wireless networks. Certificate revocation is an effective mechanism for providing network security services. Existing schemes are not well suited for MANETs because of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.