Q2S and Security for Wireless and Mobile Networks最新文献

筛选
英文 中文
Cooperative wireless sensor networks for green internet of things 协同无线传感器网络实现绿色物联网
Q2S and Security for Wireless and Mobile Networks Pub Date : 2012-10-24 DOI: 10.1145/2387218.2387235
E. Yaacoub, A. Kadri, A. Abu-Dayya
{"title":"Cooperative wireless sensor networks for green internet of things","authors":"E. Yaacoub, A. Kadri, A. Abu-Dayya","doi":"10.1145/2387218.2387235","DOIUrl":"https://doi.org/10.1145/2387218.2387235","url":null,"abstract":"Green internet of things are investigated by studying energy-efficiency in wireless sensor networks. A cooperative multihop data transmission approach is presented and analyzed. Significant energy savings are achieved with the proposed approach compared to the non cooperative scenario, in addition to better delay results.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133790877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
On location privacy and quality of information in participatory sensing 参与式感知中的位置隐私和信息质量
Q2S and Security for Wireless and Mobile Networks Pub Date : 2012-10-24 DOI: 10.1145/2387218.2387229
Ioana Rodhe, C. Rohner, E. Ngai
{"title":"On location privacy and quality of information in participatory sensing","authors":"Ioana Rodhe, C. Rohner, E. Ngai","doi":"10.1145/2387218.2387229","DOIUrl":"https://doi.org/10.1145/2387218.2387229","url":null,"abstract":"Participatory sensing applications typically bind sensor data to locations. Location privacy preserving mechanisms protecting the location of users introduce therefore an uncertainty in the collected data distributions. We consider two strategies to reconstruct a data distribution after k-anonymity has been applied to the users' location information. We investigate how different parameters for the location privacy preserving mechanism influence both the quality of information and the location privacy of the users. Our results show that the cloak area resulted from applying k-anonymity has a higher impact on both the quality of information and the location privacy than the number of users, k, that are cloaked together.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"143-147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130660985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Signs of a bad neighborhood: a lightweight metric for anomaly detection in mobile ad hoc networks 坏邻居的迹象:移动自组织网络中异常检测的轻量级度量
Q2S and Security for Wireless and Mobile Networks Pub Date : 2012-10-24 DOI: 10.1145/2387218.2387228
R. Carmo, M. Werner, M. Hollick
{"title":"Signs of a bad neighborhood: a lightweight metric for anomaly detection in mobile ad hoc networks","authors":"R. Carmo, M. Werner, M. Hollick","doi":"10.1145/2387218.2387228","DOIUrl":"https://doi.org/10.1145/2387218.2387228","url":null,"abstract":"Anomaly detection in wireless multihop networks is notoriously difficult: the wireless channel causes random errors in transmission and node mobility leads to constantly changing node neighborhoods. The Neighbor Variation Rate (NVR) introduced in this paper is a metric that quantitatively describes how the topology of the neighborhood of a node in a wireless multihop network evolves over time. We analyze the expressiveness of this metric under different speeds of nodes and measuring intervals and we employ it to detect anomalies in the network caused by malicious node activity. We validate our detection model and investigate its parameterization by means of simulation. We build a proof-of-concept and deploy it in a real-world IEEE 802.11s wireless mesh network composed of several static nodes and some mobile nodes. In real-world experiments, we mount attacks against the mesh network and analyze the expressiveness of NVR to characterize these attacks. In addition, we analyze the behavior of NVR when applied to an external dataset obtained from measurements of a real-world dynamic AODV-based mobile ad hoc network. Our results show that our metric is lightweight yet effective for anomaly detection in both stationary and mobile wireless multihop networks.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128507685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Reference based approach to mitigate blackhole attacks in delay tolerant networks 时延容忍网络中基于参考的黑洞攻击缓解方法
Q2S and Security for Wireless and Mobile Networks Pub Date : 2012-10-24 DOI: 10.1145/2387218.2387237
Garima Gupta, P. Nagrath, Sandhya Aneja, Neelima Gupta
{"title":"Reference based approach to mitigate blackhole attacks in delay tolerant networks","authors":"Garima Gupta, P. Nagrath, Sandhya Aneja, Neelima Gupta","doi":"10.1145/2387218.2387237","DOIUrl":"https://doi.org/10.1145/2387218.2387237","url":null,"abstract":"Probabilities and social behaviour are two common criteria used to route a message in disruption/delay tolerant network wherein there is only intermittent connectivity between the nodes. In this article we first discuss how the characteristics of these routing algorithms can be exploited by a malicious node to attract data packets and then dropping them to degrade the network performance. We then show the impact of such a behaviour called blackhole attack on DSG [2] as it leverages both the social behaviour as well as the delivery probabilities to make the forwarding decisions.\u0000 We present three solutions to mitigate black hole attacks. The first algorithm mitigates non collaborating blackhole nodes. In the second algorithm, we present a solution that handles collaborating blackhole nodes. The first two algorithms handle only the external attacks. It does not handle the scenario in which a node that is good initially and becomes malicious or selfish later. Finally, we present our third algorithm which handles collaborative blackholes as well as internal attacks. We validate the performance of our algorithms through extensive simulation in ONE simulator.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126452021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
An adaptive access control model with privileges overriding and behaviour monitoring in wireless sensor networks 无线传感器网络中具有权限覆盖和行为监控的自适应访问控制模型
Q2S and Security for Wireless and Mobile Networks Pub Date : 2012-10-24 DOI: 10.1145/2387218.2387236
Htoo Aung Maw, Hannan Xiao, B. Christianson
{"title":"An adaptive access control model with privileges overriding and behaviour monitoring in wireless sensor networks","authors":"Htoo Aung Maw, Hannan Xiao, B. Christianson","doi":"10.1145/2387218.2387236","DOIUrl":"https://doi.org/10.1145/2387218.2387236","url":null,"abstract":"Wireless Sensor Networks (WSNs) have attracted a lot of interest in the research community because of their wide range of applications. Due to the distributed nature of WSNs and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. Access control is a critical security service in WSNs to prevent unauthorised access from users. Current access control models in WSNs cannot make access control decisions efficiently and effectively when the system faces unexpected and unanticipated events because access control decisions are based on predefined access policies and roles. Sometimes, users may need to access stored data for emergency and immediate data access but the system cannot grant access to this kind of users' request. Based on the needs of real world requirements, we propose an adaptive access control model that builds on the concepts of overriding access privileges and user behaviour monitoring to provide a flexible approach in the access control model. The proposed access control model will adapt to unanticipated events by using privilege overriding and adjust its decision based on users' behaviour. The proposed approach can make an access control model much flexible and also detect abnormal users' request from authorised users. To the best of our knowledge, the proposed access control model is the first to realize the flexibility of access control model by using the concept of possibility-with-override with users' behaviour monitoring in WSNs","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"293 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132766594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Preventing a DoS threat in vehicular ad-hoc networks using adaptive group beaconing 使用自适应组信标防止车辆自组织网络中的DoS威胁
Q2S and Security for Wireless and Mobile Networks Pub Date : 2012-10-24 DOI: 10.1145/2387218.2387231
Osama Abumansoor, A. Boukerche
{"title":"Preventing a DoS threat in vehicular ad-hoc networks using adaptive group beaconing","authors":"Osama Abumansoor, A. Boukerche","doi":"10.1145/2387218.2387231","DOIUrl":"https://doi.org/10.1145/2387218.2387231","url":null,"abstract":"In vehicular ad-hoc networks (VANETs), vehicles exchange position information with their neighbors through periodic beacon messages. In dense areas, a massive number of messages may saturate the network and prevent nodes from acquiring the proper resources to exchange their messages. As the vehicle density increases, the network will be at risk of initiating a denial-of-service attack (DoS) of its own, which will prevent the utilization of beacon messages as intended and affect other critical applications. To resolve such potential threats, adaptive beaconing can adjust a vehicle's beacon rate based on detected signal congestion and traffic conditions. In VANETs, high mobility and rapid change in vehicles' locations present challenges in detecting traffic congestion and providing secure and accurate position information. In this paper, we present a novel approach to sending beacon messages based on neighborhood awareness and road traffic density. The proposed solution also allows authority managements to reduce the number of periodic messages to provide quality of service (QoS) for specific applications and vehicles. Simulation showed network performance improvement and a reduced number of beacon messages in dense areas without compromising the level of awareness that will support QoS provisioning and allow bandwidth availability for critical applications.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"31 17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131714349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Enhancing the QoS of real-time video streaming over LTE MBMS using D2D communications 利用D2D通信增强LTE MBMS上实时视频流的QoS
Q2S and Security for Wireless and Mobile Networks Pub Date : 2012-10-24 DOI: 10.1145/2387218.2387226
E. Yaacoub, A. Abu-Dayya
{"title":"Enhancing the QoS of real-time video streaming over LTE MBMS using D2D communications","authors":"E. Yaacoub, A. Abu-Dayya","doi":"10.1145/2387218.2387226","DOIUrl":"https://doi.org/10.1145/2387218.2387226","url":null,"abstract":"Real-time video streaming over LTE multicast and broadcast multimedia services (MBMS) is investigated. The impact of device-to-device (D2D) communications in enhancing the quality of service (QoS) and reducing energy consumption from the batteries of mobile terminals (MTs) is studied. We propose an approach where devices cooperate on the short range by forming coalitions for the purpose of energy efficiency. In each coalition, an MT is selected to receive the video stream from the base station on the long range LTE MBMS links. Simulation results show that significant energy savings can be achieved with the proposed approach compared to the non-collaborative case, in addition to significantly enhanced QoS.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116434833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Group signatures for secure and privacy preserving vehicular ad hoc networks 用于保护安全和隐私的车辆自组织网络的组签名
Q2S and Security for Wireless and Mobile Networks Pub Date : 2012-10-24 DOI: 10.1145/2387218.2387232
L. Malina, J. Hajny, V. Zeman
{"title":"Group signatures for secure and privacy preserving vehicular ad hoc networks","authors":"L. Malina, J. Hajny, V. Zeman","doi":"10.1145/2387218.2387232","DOIUrl":"https://doi.org/10.1145/2387218.2387232","url":null,"abstract":"The security of Vehicular Ad Hoc Networks (VANETs) plays a key role in protecting against bogus and malicious messages, misusing at roads, eavesdropping etc. Nowadays, common cryptographic solutions guarantee message integrity, authentication, non-repudiation and privacy which is required as a serious requirement in VANETs due to the possibility of tracking of drivers by malicious observers. The related and prior works ensure security and privacy. Nevertheless, the efficiency of these schemes is usually low or there is the possibility of denial of services attacks. The main goal of our paper is to provide initial design of a scheme which ensures privacy, security and efficiency. The proposed scheme can also protect against several Denial of Services Attacks. We compare our proposed solution with related solutions and outline the evaluation of our scheme.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122312188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An energy-efficient M2M communication method for leakage detection in underground water pipes 一种用于地下水管泄漏检测的节能M2M通信方法
Q2S and Security for Wireless and Mobile Networks Pub Date : 2012-10-24 DOI: 10.1145/2387218.2387224
E. Yaacoub, A. Kadri, A. Abu-Dayya
{"title":"An energy-efficient M2M communication method for leakage detection in underground water pipes","authors":"E. Yaacoub, A. Kadri, A. Abu-Dayya","doi":"10.1145/2387218.2387224","DOIUrl":"https://doi.org/10.1145/2387218.2387224","url":null,"abstract":"An application of machine-to-machine (M2M) communication for leakage detection in underground water infrastructures is considered. A mobile sensor immersed in the water pipe is assumed to communicate with relay nodes on the ground surface, relaying its measured information to a base station for processing. An energy-efficient communication approach based on the cooperation between relay nodes is proposed. The optimal energy minimizing solution is derived and compared to a practical low complexity method. The proposed approach is shown to lead to significant energy savings and to perform closely to the optimal solution. In addition, it is shown to lead to data transmission with considerably shorter delays.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127918331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Fast and flexible unsupervised custering algorithm based on ultrametric properties 基于超度量特性的快速灵活无监督聚类算法
Q2S and Security for Wireless and Mobile Networks Pub Date : 2011-10-31 DOI: 10.1145/2069105.2069112
Said Fouchal, I. Lavallée
{"title":"Fast and flexible unsupervised custering algorithm based on ultrametric properties","authors":"Said Fouchal, I. Lavallée","doi":"10.1145/2069105.2069112","DOIUrl":"https://doi.org/10.1145/2069105.2069112","url":null,"abstract":"We introduce in this paper a competitive unsupervised clustering algorithm which has two strong features: it is fast and flexible on the processed data type as well as in terms of precision. Our approach has a computational cost, in the worst case, of O(n^2)+ ε, and in the average case, of O(n)+ ε. This complexity is due to the use of ultrametric distance properties. We create an ultrametric space from a sample data, chosen uniformly at random, in order to obtain a global view of proximities in the data set according to the similarity criterion. Then, we use this proximity profile to cluster the global set. We present two examples of our algorithm and compare our results with those of a classic clustering method.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124846785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信