IEEE 2017

Routing in Mobile Ad-Hoc Networks using Social Tie Strengths and Mobility Plans

Routing in Mobile Ad-Hoc Networks using Social Tie Strengths and Mobility Plans

ABSTRACT We consider the problem of routing in a mobile ad-hoc network (MANET) for which the planned mobilities of the nodes are partially known a priori and the nodes travel in groups. This situation arises commonly in military and emergency response scenarios. Optimal routes are computed using the most reliable path principle in which the […]

Quality of Service for MANET based Smart cities

Quality of Service for MANET based Smart cities

ABSTRACT In the past decade‚Äôs digital revolution has caused major breakthroughs in integrated communication technologies field and has changed the way people work, communicate and live. Cities are moving from static infrastructure and buildings to dynamic smart ecosystems known as smart cities. Smart city refers to urban development in various domains of the city like […]

Low Power Wide Area Network Analysis: Can LoRa Scale

Low Power Wide Area Network Analysis: Can LoRa Scale

ABSTRACT Low Power Wide Area (LPWA) networks are making spectacular progress from design, standardisation, to commercialisation. At this time of fast-paced adoption, it is of utmost importance to analyse how well these technologies will scale as the number of devices connected to the Internet of Things (IoT) inevitably grows. In this letter, we provide a […]

Soft Biometrics: Globally Coherent Solutions for Hair Segmentation and Style Recognition based on Hierarchical MRFs

Soft Biometrics: Globally Coherent Solutions for Hair Segmentation and Style Recognition based on Hierarchical MRFs

ABSTRACT Markov Random Fields (MRFs) are a popular tool in many computer vision problems and faithfully model a broad range of local dependencies. However, rooted in the Hammersley-Clifford theorem, they face serious difficulties in enforcing the global coherence of the solutions without using too high order cliques that reduce the computational effectiveness of the inference […]

CRCMD&R: Cluster and Reputation basedCooperative Malicious Node Detection & Removal Scheme in MANETs

CRCMD&R: Cluster and Reputation basedCooperative Malicious Node Detection & Removal Scheme in MANETs

ABSTRACT While mobile ad hoc networks have become a mature & globally adopted technology due to its wide range of applications. Such environment has some basic differences in comparison to wired networks. Due to these little differences the MANETs are more prone to interception and manipulation. This further opens possibilities of insecure routing. For the […]

Resilience of DoS Attacks in DesigningAnonymous User Authentication Protocol forWireless Sensor Networks

Resilience of DoS Attacks in DesigningAnonymous User Authentication Protocol forWireless Sensor Networks

ABSTRACT Wireless sensor networks (WSNs) include spatially allotted autonomous instruments that employ sensors to check environmental or physical conditions. These autonomous instruments or nodes blend with routers or gateway to make several WSN-based real-time applications. In many critical applications, an external user can directly access the real-time data from sensor node. In this context, before […]

A Game-theoretic Approach toFake-Acknowledgment Attack on Cyber-PhysicalSystems

A Game-theoretic Approach toFake-Acknowledgment Attack on Cyber-PhysicalSystems

ABSTRACT A class of malicious attacks against remote state estimation in Cyber-Physical Systems is considered. A sensor adopts an acknowledgement (ACK)-based online power schedule to improve the remote state estimation performance under limited resources. To launch malicious attacks, the attacker can modify the ACKs from the remote estimator and convey fake information to the sensor, […]

Human-Powered Data Cleaning for Probabilistic Reachability Queries on Uncertain Graphs

Human-Powered Data Cleaning for Probabilistic Reachability Queries on Uncertain Graphs

ABSTRACT Uncertain graph models are widely used in real-world applications such as knowledge graphs and social networks. To capture the uncertainty, each edge in an uncertain graph is associated with an existential probability that signifies the likelihood of the existence of the edge. One notable issue of querying uncertain graphs is that the results are […]

FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data

FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data

ABSTRACT Spatial data have wide applications, e.g., location-based services, and geometric range queries (i.e., finding points inside geometric areas, e.g., circles or polygons) are one of the fundamental search functions over spatial data. The rising demand of outsourcing data is moving large-scale datasets, including large-scale spatial datasets, to public clouds. Meanwhile, due to the concern […]

Decentralized Configuration of Embedded Web Services for Smart Home Applications Detection

Decentralized Configuration of Embedded Web Services for Smart Home Applications Detection

ABSTRACT Web Services can be used as a communication structure for embedded devices. Out of numerous Web Service specifications there is a subset (Profile) to implement Web Services on resource constrained devices, called Devices Pro- file for Web Services (DPWS). The resulting service oriented architecture enables the user to discover new devices, e.g., in the […]