{"title":"Cooperative wireless sensor networks for green internet of things","authors":"E. Yaacoub, A. Kadri, A. Abu-Dayya","doi":"10.1145/2387218.2387235","DOIUrl":"https://doi.org/10.1145/2387218.2387235","url":null,"abstract":"Green internet of things are investigated by studying energy-efficiency in wireless sensor networks. A cooperative multihop data transmission approach is presented and analyzed. Significant energy savings are achieved with the proposed approach compared to the non cooperative scenario, in addition to better delay results.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133790877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On location privacy and quality of information in participatory sensing","authors":"Ioana Rodhe, C. Rohner, E. Ngai","doi":"10.1145/2387218.2387229","DOIUrl":"https://doi.org/10.1145/2387218.2387229","url":null,"abstract":"Participatory sensing applications typically bind sensor data to locations. Location privacy preserving mechanisms protecting the location of users introduce therefore an uncertainty in the collected data distributions. We consider two strategies to reconstruct a data distribution after k-anonymity has been applied to the users' location information. We investigate how different parameters for the location privacy preserving mechanism influence both the quality of information and the location privacy of the users. Our results show that the cloak area resulted from applying k-anonymity has a higher impact on both the quality of information and the location privacy than the number of users, k, that are cloaked together.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"143-147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130660985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Signs of a bad neighborhood: a lightweight metric for anomaly detection in mobile ad hoc networks","authors":"R. Carmo, M. Werner, M. Hollick","doi":"10.1145/2387218.2387228","DOIUrl":"https://doi.org/10.1145/2387218.2387228","url":null,"abstract":"Anomaly detection in wireless multihop networks is notoriously difficult: the wireless channel causes random errors in transmission and node mobility leads to constantly changing node neighborhoods. The Neighbor Variation Rate (NVR) introduced in this paper is a metric that quantitatively describes how the topology of the neighborhood of a node in a wireless multihop network evolves over time. We analyze the expressiveness of this metric under different speeds of nodes and measuring intervals and we employ it to detect anomalies in the network caused by malicious node activity. We validate our detection model and investigate its parameterization by means of simulation. We build a proof-of-concept and deploy it in a real-world IEEE 802.11s wireless mesh network composed of several static nodes and some mobile nodes. In real-world experiments, we mount attacks against the mesh network and analyze the expressiveness of NVR to characterize these attacks. In addition, we analyze the behavior of NVR when applied to an external dataset obtained from measurements of a real-world dynamic AODV-based mobile ad hoc network. Our results show that our metric is lightweight yet effective for anomaly detection in both stationary and mobile wireless multihop networks.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128507685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Garima Gupta, P. Nagrath, Sandhya Aneja, Neelima Gupta
{"title":"Reference based approach to mitigate blackhole attacks in delay tolerant networks","authors":"Garima Gupta, P. Nagrath, Sandhya Aneja, Neelima Gupta","doi":"10.1145/2387218.2387237","DOIUrl":"https://doi.org/10.1145/2387218.2387237","url":null,"abstract":"Probabilities and social behaviour are two common criteria used to route a message in disruption/delay tolerant network wherein there is only intermittent connectivity between the nodes. In this article we first discuss how the characteristics of these routing algorithms can be exploited by a malicious node to attract data packets and then dropping them to degrade the network performance. We then show the impact of such a behaviour called blackhole attack on DSG [2] as it leverages both the social behaviour as well as the delivery probabilities to make the forwarding decisions.\u0000 We present three solutions to mitigate black hole attacks. The first algorithm mitigates non collaborating blackhole nodes. In the second algorithm, we present a solution that handles collaborating blackhole nodes. The first two algorithms handle only the external attacks. It does not handle the scenario in which a node that is good initially and becomes malicious or selfish later. Finally, we present our third algorithm which handles collaborative blackholes as well as internal attacks. We validate the performance of our algorithms through extensive simulation in ONE simulator.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126452021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An adaptive access control model with privileges overriding and behaviour monitoring in wireless sensor networks","authors":"Htoo Aung Maw, Hannan Xiao, B. Christianson","doi":"10.1145/2387218.2387236","DOIUrl":"https://doi.org/10.1145/2387218.2387236","url":null,"abstract":"Wireless Sensor Networks (WSNs) have attracted a lot of interest in the research community because of their wide range of applications. Due to the distributed nature of WSNs and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. Access control is a critical security service in WSNs to prevent unauthorised access from users. Current access control models in WSNs cannot make access control decisions efficiently and effectively when the system faces unexpected and unanticipated events because access control decisions are based on predefined access policies and roles. Sometimes, users may need to access stored data for emergency and immediate data access but the system cannot grant access to this kind of users' request. Based on the needs of real world requirements, we propose an adaptive access control model that builds on the concepts of overriding access privileges and user behaviour monitoring to provide a flexible approach in the access control model. The proposed access control model will adapt to unanticipated events by using privilege overriding and adjust its decision based on users' behaviour. The proposed approach can make an access control model much flexible and also detect abnormal users' request from authorised users. To the best of our knowledge, the proposed access control model is the first to realize the flexibility of access control model by using the concept of possibility-with-override with users' behaviour monitoring in WSNs","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"293 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132766594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Preventing a DoS threat in vehicular ad-hoc networks using adaptive group beaconing","authors":"Osama Abumansoor, A. Boukerche","doi":"10.1145/2387218.2387231","DOIUrl":"https://doi.org/10.1145/2387218.2387231","url":null,"abstract":"In vehicular ad-hoc networks (VANETs), vehicles exchange position information with their neighbors through periodic beacon messages. In dense areas, a massive number of messages may saturate the network and prevent nodes from acquiring the proper resources to exchange their messages. As the vehicle density increases, the network will be at risk of initiating a denial-of-service attack (DoS) of its own, which will prevent the utilization of beacon messages as intended and affect other critical applications. To resolve such potential threats, adaptive beaconing can adjust a vehicle's beacon rate based on detected signal congestion and traffic conditions. In VANETs, high mobility and rapid change in vehicles' locations present challenges in detecting traffic congestion and providing secure and accurate position information. In this paper, we present a novel approach to sending beacon messages based on neighborhood awareness and road traffic density. The proposed solution also allows authority managements to reduce the number of periodic messages to provide quality of service (QoS) for specific applications and vehicles. Simulation showed network performance improvement and a reduced number of beacon messages in dense areas without compromising the level of awareness that will support QoS provisioning and allow bandwidth availability for critical applications.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"31 17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131714349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing the QoS of real-time video streaming over LTE MBMS using D2D communications","authors":"E. Yaacoub, A. Abu-Dayya","doi":"10.1145/2387218.2387226","DOIUrl":"https://doi.org/10.1145/2387218.2387226","url":null,"abstract":"Real-time video streaming over LTE multicast and broadcast multimedia services (MBMS) is investigated. The impact of device-to-device (D2D) communications in enhancing the quality of service (QoS) and reducing energy consumption from the batteries of mobile terminals (MTs) is studied. We propose an approach where devices cooperate on the short range by forming coalitions for the purpose of energy efficiency. In each coalition, an MT is selected to receive the video stream from the base station on the long range LTE MBMS links. Simulation results show that significant energy savings can be achieved with the proposed approach compared to the non-collaborative case, in addition to significantly enhanced QoS.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116434833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Group signatures for secure and privacy preserving vehicular ad hoc networks","authors":"L. Malina, J. Hajny, V. Zeman","doi":"10.1145/2387218.2387232","DOIUrl":"https://doi.org/10.1145/2387218.2387232","url":null,"abstract":"The security of Vehicular Ad Hoc Networks (VANETs) plays a key role in protecting against bogus and malicious messages, misusing at roads, eavesdropping etc. Nowadays, common cryptographic solutions guarantee message integrity, authentication, non-repudiation and privacy which is required as a serious requirement in VANETs due to the possibility of tracking of drivers by malicious observers. The related and prior works ensure security and privacy. Nevertheless, the efficiency of these schemes is usually low or there is the possibility of denial of services attacks. The main goal of our paper is to provide initial design of a scheme which ensures privacy, security and efficiency. The proposed scheme can also protect against several Denial of Services Attacks. We compare our proposed solution with related solutions and outline the evaluation of our scheme.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122312188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An energy-efficient M2M communication method for leakage detection in underground water pipes","authors":"E. Yaacoub, A. Kadri, A. Abu-Dayya","doi":"10.1145/2387218.2387224","DOIUrl":"https://doi.org/10.1145/2387218.2387224","url":null,"abstract":"An application of machine-to-machine (M2M) communication for leakage detection in underground water infrastructures is considered. A mobile sensor immersed in the water pipe is assumed to communicate with relay nodes on the ground surface, relaying its measured information to a base station for processing. An energy-efficient communication approach based on the cooperation between relay nodes is proposed. The optimal energy minimizing solution is derived and compared to a practical low complexity method. The proposed approach is shown to lead to significant energy savings and to perform closely to the optimal solution. In addition, it is shown to lead to data transmission with considerably shorter delays.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127918331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fast and flexible unsupervised custering algorithm based on ultrametric properties","authors":"Said Fouchal, I. Lavallée","doi":"10.1145/2069105.2069112","DOIUrl":"https://doi.org/10.1145/2069105.2069112","url":null,"abstract":"We introduce in this paper a competitive unsupervised clustering algorithm which has two strong features: it is fast and flexible on the processed data type as well as in terms of precision. Our approach has a computational cost, in the worst case, of O(n^2)+ ε, and in the average case, of O(n)+ ε. This complexity is due to the use of ultrametric distance properties. We create an ultrametric space from a sample data, chosen uniformly at random, in order to obtain a global view of proximities in the data set according to the similarity criterion. Then, we use this proximity profile to cluster the global set. We present two examples of our algorithm and compare our results with those of a classic clustering method.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124846785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}