Coimbatore Institute of Information Technology (CIIT)

Displaying 1-7 of 7 results

  • White Papers // Dec 2013

    A Secure Energy Mechanism for WSN and Its Implementation in NS-2

    Wireless Sensor Networks (WSNs) are usually deployed for gathering data from unattended or hostile environments. Therefore, securing data transmission across these environments is a must. Due to the fact that the sensors have a limited power, any security mechanism for sensor network must be energy efficient. In this paper, a...

    Provided By Coimbatore Institute of Information Technology (CIIT)

  • White Papers // Apr 2012

    Providing a Secure Interface Using Smart Phone Based Sensors Networks in Cloud Computing

    The research on secure sensor networks in the context of a high-level cloud based brokering architecture and highlighted various research challenges going forward. The authors outline research challenges associated with assessing the trustworthiness of the sensors based on environmental sensor data, detecting and defending against "Sensory malware" on such sensors,...

    Provided By Coimbatore Institute of Information Technology (CIIT)

  • White Papers // Apr 2012

    Challenging Threats and Flaws in Cloud Computing Environment

    A lack of understanding about security risks is one of the key factors holding back cloud computing Reports suggest that security as the main speed bump slowing the pace of cloud adoption. But what tends to be overlooked, even by cloud advocates, is that overall security threats are changing as...

    Provided By Coimbatore Institute of Information Technology (CIIT)

  • White Papers // Apr 2012

    Security in Wireless Networks: In the Case of Jammers &Various Dos Attacks

    In this paper, the authors address various Dos attacks, Jammers & Counter measures in wireless internet. In this paper, they present a detailed up-to-date discussion on the jamming & various Dos attacks recorded in the literature. They also design and implement FIJI (Fighting Implicit Jamming) to effectively detect jammers. Finally,...

    Provided By Coimbatore Institute of Information Technology (CIIT)

  • White Papers // Apr 2012

    On Demand Provisioning of Tasks Using Clustering in Multicloud

    Dramatic changes are affecting the world of work which mainly includes the increased impact of information technology. Cloud computing is a technology which helps users to access any shared data or computing services via internet, with no need to build up an infrastructure to support it. Cloud computing acts as...

    Provided By Coimbatore Institute of Information Technology (CIIT)

  • White Papers // Apr 2012

    Reputation Based Collaborative Intrusion Detection Systems

    To increase the overall accuracy of the intrusion assessment, the distributed Intrusion Detection Systems (IDSes) are allowed to integrate and distribute their knowledge about intrusions in an effective Collaborative Intrusion Detection Network (CIDN), this paper proposes a distributed Host-based Intrusion Detection System (HIDS) collaboration system, particularly focusing on acquaintance management...

    Provided By Coimbatore Institute of Information Technology (CIIT)

  • White Papers // Apr 2012

    Formal Secure Outsourcing of Linear Programming in Cloud Computing

    Cloud computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsource their large computation workloads to the cloud, and economically enjoy the massive computational power, bandwidth, storage, and even appropriate software that can be shared in...

    Provided By Coimbatore Institute of Information Technology (CIIT)

  • White Papers // Apr 2012

    Security in Wireless Networks: In the Case of Jammers &Various Dos Attacks

    In this paper, the authors address various Dos attacks, Jammers & Counter measures in wireless internet. In this paper, they present a detailed up-to-date discussion on the jamming & various Dos attacks recorded in the literature. They also design and implement FIJI (Fighting Implicit Jamming) to effectively detect jammers. Finally,...

    Provided By Coimbatore Institute of Information Technology (CIIT)

  • White Papers // Apr 2012

    On Demand Provisioning of Tasks Using Clustering in Multicloud

    Dramatic changes are affecting the world of work which mainly includes the increased impact of information technology. Cloud computing is a technology which helps users to access any shared data or computing services via internet, with no need to build up an infrastructure to support it. Cloud computing acts as...

    Provided By Coimbatore Institute of Information Technology (CIIT)

  • White Papers // Apr 2012

    Challenging Threats and Flaws in Cloud Computing Environment

    A lack of understanding about security risks is one of the key factors holding back cloud computing Reports suggest that security as the main speed bump slowing the pace of cloud adoption. But what tends to be overlooked, even by cloud advocates, is that overall security threats are changing as...

    Provided By Coimbatore Institute of Information Technology (CIIT)

  • White Papers // Apr 2012

    Providing a Secure Interface Using Smart Phone Based Sensors Networks in Cloud Computing

    The research on secure sensor networks in the context of a high-level cloud based brokering architecture and highlighted various research challenges going forward. The authors outline research challenges associated with assessing the trustworthiness of the sensors based on environmental sensor data, detecting and defending against "Sensory malware" on such sensors,...

    Provided By Coimbatore Institute of Information Technology (CIIT)

  • White Papers // Apr 2012

    Reputation Based Collaborative Intrusion Detection Systems

    To increase the overall accuracy of the intrusion assessment, the distributed Intrusion Detection Systems (IDSes) are allowed to integrate and distribute their knowledge about intrusions in an effective Collaborative Intrusion Detection Network (CIDN), this paper proposes a distributed Host-based Intrusion Detection System (HIDS) collaboration system, particularly focusing on acquaintance management...

    Provided By Coimbatore Institute of Information Technology (CIIT)

  • White Papers // Dec 2013

    A Secure Energy Mechanism for WSN and Its Implementation in NS-2

    Wireless Sensor Networks (WSNs) are usually deployed for gathering data from unattended or hostile environments. Therefore, securing data transmission across these environments is a must. Due to the fact that the sensors have a limited power, any security mechanism for sensor network must be energy efficient. In this paper, a...

    Provided By Coimbatore Institute of Information Technology (CIIT)

  • White Papers // Apr 2012

    Formal Secure Outsourcing of Linear Programming in Cloud Computing

    Cloud computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsource their large computation workloads to the cloud, and economically enjoy the massive computational power, bandwidth, storage, and even appropriate software that can be shared in...

    Provided By Coimbatore Institute of Information Technology (CIIT)