Daily Archives: November 14, 2015


As our aging population significantly grows, personal health monitoring is becoming an emerging service and can be accomplished by large-scale, low-power sensor networks, such as Zigbee networks. However, collected medical data may reveal patient privacy, and should be well protected. We propose a Hierarchical and Dynamic Elliptic Curve Cryptosystem based […]

Hierarchical and Dynamic Elliptic Curve Cryptosystem Based Self-Certified Public Key Scheme for Medical Data Protection


This paper presents a new cloudlet mesh architecture for security enforcement to establish trusted mobile cloud computing. The cloudlet mesh is WiFi-or mobile-connected to the Internet. This security framework establishes a cyber trust shield to fight against intrusions to distance clouds, prevent spam/virus/worm attacks on mobile cloud resources, and stop […]

Cloudlet Mesh for Securing Mobile Clouds from Intrusions and Network Attacks


We detail the implementation of RUBEN, a scalable emulator based on software routers which implements and evaluate energy-aware algorithms in backbone networks. Our solution adopts virtualization techniques to reproduce the behavior of an entire backbone network on a single machine. Each virtual machine is a router implementing an energy-aware algorithm. Moreover, RUBEN is […]

RUBEN: A Router emUlator for green BackbonE Networks



The sensor nodes are battery powered devices, they communicate over a wireless medium and consumes energy during data transmission/reception. The main task in wireless sensor network(WSN) is to reduce power consumption of sensor nodes. It is possible by caching the data to minimize power consumption in WSN. In caching, sink is […]

Replicated Cache Agent Technique for Wireless Sensor Network


This paper studies the role of hourly economic demand response in the optimization of the stochastic day-ahead scheduling of electric power systems with natural gas transmission constraints. The proposed coordinated stochastic model (referred to as EGTran) considers random outages of generating units and transmission lines, and random errors in forecasting […]

Hourly Electricity Demand Response in the Stochastic Day-Ahead Scheduling of Coordinated Electricity and Natural Gas Networks


Implantable and wearable medical devices are used for monitoring, diagnosis, and treatment of an ever-increasing range of medical conditions, leading to an improved quality of life for patients. The addition of wireless connectivity to medical devices has enabled post-deployment tuning of therapy and access to device data virtually anytime and […]

Vibration-based secure side channel for medical devices




Optical orthogonal codes (OOCs) are widely used as spreading codes in optical fiber networks. In this paper, a bound on the code size of 2-D OOCs with both at most one-pulse per wavelength (AM-OPPW) and at most one-pulse per time slot (AM-OPPTS) is derived. Accordingly, two constructions of optimal 2-D OOCs […]

Constructions of Optimal 2-D Optical Orthogonal Codes via Generalized Cyclotomic Classes


In this paper, we present our analysis using four different systems on two different one-way networktraffic data sets. Specifically, we have explored the usage of two network traffic analyzers, namely Corsaro and Cisco ASA 5515-X, and two machine learning based systems, namely the C4.5 Decision Tree classifier and the AdaBoost.M1 classifier. We have […]

Highlights on analyzing one-way traffic using different tools



One of the primary usage of cloud computing is data storage. Cloud provides enormous capacity of storage for cloud users. Secure data storage and retrieval of the relevant information from the in traditional as well as in cloud computing environment has always been a significant issue. Different techniques have been […]

Data Management System to Improve Security and Availability in Cloud Storage