As our aging population significantly grows, personal health monitoring is becoming an emerging service and can be accomplished by large-scale, low-power sensor networks, such as Zigbee networks. However, collected medical data may reveal patient privacy, and should be well protected. We propose a Hierarchical and Dynamic Elliptic Curve Cryptosystem based […]
Daily Archives: November 14, 2015
This paper presents a new cloudlet mesh architecture for security enforcement to establish trusted mobile cloud computing. The cloudlet mesh is WiFi-or mobile-connected to the Internet. This security framework establishes a cyber trust shield to fight against intrusions to distance clouds, prevent spam/virus/worm attacks on mobile cloud resources, and stop […]
Cloudlet Mesh for Securing Mobile Clouds from Intrusions and Network Attacks
We detail the implementation of RUBEN, a scalable emulator based on software routers which implements and evaluate energy-aware algorithms in backbone networks. Our solution adopts virtualization techniques to reproduce the behavior of an entire backbone network on a single machine. Each virtual machine is a router implementing an energy-aware algorithm. Moreover, RUBEN is […]
RUBEN: A Router emUlator for green BackbonE Networks
The sensor nodes are battery powered devices, they communicate over a wireless medium and consumes energy during data transmission/reception. The main task in wireless sensor network(WSN) is to reduce power consumption of sensor nodes. It is possible by caching the data to minimize power consumption in WSN. In caching, sink is […]
Replicated Cache Agent Technique for Wireless Sensor Network
This paper studies the role of hourly economic demand response in the optimization of the stochastic day-ahead scheduling of electric power systems with natural gas transmission constraints. The proposed coordinated stochastic model (referred to as EGTran) considers random outages of generating units and transmission lines, and random errors in forecasting […]
Hourly Electricity Demand Response in the Stochastic Day-Ahead Scheduling of Coordinated Electricity and Natural Gas Networks
Implantable and wearable medical devices are used for monitoring, diagnosis, and treatment of an ever-increasing range of medical conditions, leading to an improved quality of life for patients. The addition of wireless connectivity to medical devices has enabled post-deployment tuning of therapy and access to device data virtually anytime and […]
Vibration-based secure side channel for medical devices
Covert channels are created using packet header manipulation, having some serious drawbacks of detectability. TCP/IP header follows strict seam tics, if it is manipulate by a single bit, semantics will not seem to be a normal distribution. Here we are proposed the IP-ID Reference Model as a new way covert […]
The implementation of IP ID Reference Model in Linux kernel
Optical orthogonal codes (OOCs) are widely used as spreading codes in optical fiber networks. In this paper, a bound on the code size of 2-D OOCs with both at most one-pulse per wavelength (AM-OPPW) and at most one-pulse per time slot (AM-OPPTS) is derived. Accordingly, two constructions of optimal 2-D OOCs […]
Constructions of Optimal 2-D Optical Orthogonal Codes via Generalized Cyclotomic Classes
In this paper, we present our analysis using four different systems on two different one-way networktraffic data sets. Specifically, we have explored the usage of two network traffic analyzers, namely Corsaro and Cisco ASA 5515-X, and two machine learning based systems, namely the C4.5 Decision Tree classifier and the AdaBoost.M1 classifier. We have […]
Highlights on analyzing one-way traffic using different tools
One of the primary usage of cloud computing is data storage. Cloud provides enormous capacity of storage for cloud users. Secure data storage and retrieval of the relevant information from the in traditional as well as in cloud computing environment has always been a significant issue. Different techniques have been […]