The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Data extraction is used to extract important data from large database which stored at the multiple sites. It may be keep in many computers covered in the some physical location or may be covered a network of computers. In this paper, we present protocol for secure extraction of association rules in horizontally distributed database. This protocol is based on the Fast Distributed Mining (FDM) algorithm,...
Mobile ad hoc networks (MANET) is a type of networks that consists of autonomous nodes connecting directly without a top-down network architecture or central controller. Absence of base stations in MANET force the nodes to rely on their adjacent nodes in transmitting messages. The dynamic nature of MANET makes the relationship between nodes untrusted due to mobility of nodes. A malicious node may...
Symbolic execution and mutation testing have been demonstrated to be effective in revealing program defects. Despite their potential, their application cost, scalability and robust operation are obstacles to their practical use. Symbolic execution has the problem of path explosion, which results from the vast number of program paths, while mutation testing involves a large number of program variants...
With a growing amount of transferred data in an interconnected world, the insurance of a secure communication between two peers becomes a critical task in the software industry. A leak of critical data can cause tremendous costs in a financial, social but also political manner. For this sake, cryptographic protocols are implemented and regulate the data transfer, thus ensuring the safety of transferred...
Internet of Things (IoT) security and privacy remain a major challenge, mainly due to the massive scale and distributed nature of IoT networks. Blockchain-based approaches provide decentralized security and privacy, yet they involve significant energy, delay, and computational overhead that is not suitable for most resource-constrained IoT devices. In our previous work, we presented a lightweight...
The proliferation of consumer Internet of Things (IoT) devices offers as many convenient benefits as it poses significant vulnerabilities. Patching or otherwise mitigating these vulnerabilities will be difficult for the existing home security ecosystem. This paper proposes a central security manager that is built on top of the smarthome's hub or gateway router and positioned to intercept all traffic...
The paradigm of crowd-assisted sensing primarily relies on volunteers, who use their personal devices to collect sensor information. To foster participants' contributions and hence ensure the viability of the underlying applications, different approaches, such as novel incentive schemes and privacy-preserving mechanisms, have been proposed. In most cases, these approaches have been evaluated by means...
Enhanced Course of Action (CoA) generation is a fundamental component of effective risk management and mitigation. This paper presents an extension of a system capable of integrating physics-based (hard) and people-generated (soft) data, for the purpose of achieving increased situational assessment and automatic CoA generation upon risk identification. The system's capabilities are enhanced through...
There is a growing need for Vehicular Ad-hoc Networks (VANETs), in which vehicles communicate with each other (i. e., Vehicle to Vehicle, V2V) or with the infrastructure (i. e., Vehicle to Infrastructure, V2I) on a wireless basis. This paper presents an improved traffic monitoring system for VANET applications via a proposed security scheme. Specifically, the proposed model analyzes the monitored...
As sensor nodes in a wireless network are tiny, very small, low-cost and deployed in an unattended environment, they are easily prone to many kinds of serious attacks. One such attack is Node Replication attack, where the attacker creates multiple clones /replicas of the legitimate node and deploys them at various paths in the network. As these replicas behave exactly like legitimate node, it is very...
Today's world is the smart world. In this smart world, everything that is from home to city everything is smart. So in this paper part of the smart home is given that is smart door lock system. In this owner can control their door using the smartphone by viewing the live feed. One database is there for storing visitors information. By using Bluetooth technology this all system works.
Vehicular ad hoc network is based on MANET all the vehicle to vehicle and vehicle roadside are connected to the wireless sensor network. In this paper mainly discuss on the security in the VANET in the lightweight cloud environment. Moving vehicle on the roadside connected through the sensor nodes and to provide communication between the vehicles and directly connected to the centralized environment...
Realization of an application using Wireless Sensor Networks (WSNs) using Sensor Nodes (SNs) brings in profound advantages of ad-hoc and flexible network deployments. Implementation of these networks face immense challenges due to short wireless range; along with limited power, storage & computational capabilities of SNs. Also, due to the tiny physical attributes of the SNs in WSNs, they are prone...
The use of the Smartphones is increasing day by day and also used as an essential tool for everyday tasks. Most of the smartphone applications are used to fetch the data from the servers and transmit the sensitive user information to the server. This communication is carried on a wireless network, which is more vulnerable than the wired network. This insecure communication channel needs to be protected...
Cryptography is necessary in every field of IT applications; security is required in every minor field that helps in stopping the understanding of the data that is encrypted. In this research, we are trying to implement an encryption technique that is very light and yet strong enough to secure large amount of data being transferred in the network. This does not require a key that has to be randomly...
This work introduces a novel security framework for wireless sensor networks (WSN) based on dynamic duty cycle, which allows nodes to detect their compromised neighbors based on unanticipated fluctuations in network traffic send rate over time. Our framework was assessed by its ability to detect advanced WSN threats (e.g., active, passive, or both attacks). One of the benefits of this framework is...
The rapid increase of Internet of Things (IoT) devices will have a significant impact on people's daily life, providing a wide range of services, such as smart lights, door locks, and cameras remotely controlled by smartphones. Remote access within the same environment or via the Internet requires effective authentication and authorization mechanisms beyond those provided by static authentication...
Cloud computing is a growing technology that offers compute, storage and network resources as a service over the internet. It enables the individuals, clients or the enterprises to outsource their data and application software to the cloud server. The services are offered by a cloud service provider (CSP) and the users need to pay for what they use. There are many security concerns needs to be addressed...
Online social networks (OSNs), attract millions of people and hence users are drastically increasing day by day. Thus the users of the online social network increase ultimately. OSN users existing social relationship can be generalized as 1-hop trust relationship, and further they extend their network through a multi-hop trust chain during the recommendation of authenticated users. Unfortunately,...
Security is still the main obstacle that is preventing businesses from moving towards the Cloud, which makes choosing the right Cloud service provider CSP a critical decision. We propose in this paper a methodology for evaluation and selection of Cloud security services based on a Multi-Criteria Analysis (MCA) process using a set of evaluation criteria and quantitative metrics. We then give a general...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.