Hindawi Publishing

Displaying 201-240 of 1739 results

  • White Papers // Nov 2013

    Selective Cooperative Transmission in Ad Hoc Networks with Directional Antennas

    In this paper, the authors present a Selective Cooperative Transmission scheme (abbreviated SCT) for ad hoc network with directional antennas that leverages the benefits of directional-only antenna approach and cooperative communication. The main feature of SCT is its adaptability to the channel condition in the network. In other words, when...

    Provided By Hindawi Publishing

  • White Papers // Nov 2013

    Trusted Computing Strengthens Cloud Authentication

    Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues as well as running the appropriate applications. Another entry on the list of cloud functions which has been handled internally is Identity Access Management (IAM). Companies encounter IAM as...

    Provided By Hindawi Publishing

  • White Papers // Nov 2013

    Efficient Resources Provisioning Based on Load Forecasting in Cloud

    Cloud providers should ensure QoS while maximizing resources utilization. One optimal strategy is to timely allocate resources in a fine-grained mode according to application's actual resources demand. The necessary precondition of this strategy is obtaining future load information in advance. The authors propose a multi-step-ahead load forecasting method, KSwSVR, based...

    Provided By Hindawi Publishing

  • White Papers // Oct 2013

    An Embedded Cloud Design for Internet-of-Things

    Internet-of-Things (IoT) consists of interconnected heterogeneous devices that ubiquitously interact with physical world. The devices are often resource constrained in terms of energy, computation, and communication resources. Distributing processing between these heterogeneous devices could yield to better performance and sharing, and extending resources of the devices could yield to more...

    Provided By Hindawi Publishing

  • White Papers // Oct 2013

    SSE: A Secure Searchable Encryption Scheme for Urban Sensing and Querying

    With the distributed sensors that are deployed to monitor the urban environment in smart cities, the sensed data are overwhelming and beyond the scope of the Wireless Sensor Networks (WSNs) capability. Due to the communication range limits of the sensors, most of these data will be outsourced and stored on...

    Provided By Hindawi Publishing

  • White Papers // Oct 2013

    A Novel Authentication Scheme for V2I Communication Based on WAVE Unicast Services

    One of the most challenging issues in vehicular network designs is security matter. Particularly, there have been several potential attacks (e.g., message alteration, eavesdropping, privacy violation, and replay) on Vehicle To Infrastructure (V2I) communication. Most previous studies have based on Public Key Infrastructure (PKI) and authentication in broadcast services. By...

    Provided By Hindawi Publishing

  • White Papers // Oct 2013

    A Novel Web Classification Algorithm Using Fuzzy Weighted Association Rules

    In associative classification method, the rules generated from association rule mining are converted into classification rules. The concept of association rule mining can be extended in web mining environment to find associations between web pages visited together by the internet users in their browsing sessions. The weighted fuzzy association rule...

    Provided By Hindawi Publishing

  • White Papers // Oct 2013

    On the Anonymity of Identity-Based Encryption

    Anonymity of Identity-Based Encryption (IBE) means that given a cipher-text, one cannot distinguish the target identity from a random identity. In this paper, the authors thoroughly discuss the anonymity of IBE systems. They found that the current definition of anonymity is obscure to describe some IBE systems, such as Gentry...

    Provided By Hindawi Publishing

  • White Papers // Oct 2013

    A Karaoke System with Real-Time Media Merging and Sharing Functions for a Cloud-Computing-Integrated Mobile Device

    Mobile devices such as Personal Digital Assistants (PDAs), Smartphones, and tablets have increased in popularity and are extremely efficient for work-related, social, and entertainment uses. Popular entertainment services have also attracted substantial attention. Thus, relevant industries have exerted considerable efforts in establishing a method by which mobile devices can be...

    Provided By Hindawi Publishing

  • White Papers // Oct 2013

    Hybrid MAC Scheme for Vehicular Communications

    Vehicular communications have been creating new applications in Intelligent Transportation Systems (ITS) areas by converging Information and Communication Technology (ICT) with automobile and road industries. In this paper, the authors introduce hybrid MAC scheme for vehicular communications which enhances the performance of IEEE 802.11p based communication system. The proposed MAC...

    Provided By Hindawi Publishing

  • White Papers // Oct 2013

    Circuit Implementation, Operation, and Simulation of Multivalued Nonvolatile Static Random Access Memory Using a Resistivity Change Device

    The authors proposed and computationally analyzed a multi-valued, nonvolatile SRAM using a ReRAM. Two reference resistors and a programmable resistor are connected to the storage nodes of a standard SRAM cell. The proposed 9T3R MNV-SRAM cell can store 2 bits of memory. In the storing operation, the recall operation and...

    Provided By Hindawi Publishing

  • White Papers // Oct 2013

    Enterprise Information Security Management Based on Context-Aware RBAC and Communication Monitoring Technology

    Now-a-days, in the workplace, information technology has an enormous influence on many enterprises. Information technology has an enormous influence in many enterprises. Computers have not only become important devices that people rely on in their daily lives and work, but have also become essential tools for enterprises. More and more...

    Provided By Hindawi Publishing

  • White Papers // Oct 2013

    A Novel Cloud Computing Algorithm of Security and Privacy

    Cloud computing provides service of several different service types, namely, Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). The emergence of cloud computing has simplified the flow of large-scale deployment distributed system of software suppliers; when issuing respective application programs in a...

    Provided By Hindawi Publishing

  • White Papers // Oct 2013

    Reputation Revision Method for Selecting Cloud Services Based on Prior Knowledge and a Market Mechanism

    The trust levels of cloud services should be evaluated to ensure their reliability. The effectiveness of these evaluations has major effects on user satisfaction, which is increasingly important. However, it is difficult to provide objective evaluations in open and dynamic environments because of the possibilities of malicious evaluations, individual preferences,...

    Provided By Hindawi Publishing

  • White Papers // Oct 2013

    Cloud Service Selection Using Multi-Criteria Decision Analysis

    Cloud Computing (CC) has recently been receiving tremendous attention from the IT industry and academic researchers. CC leverages its unique services to cloud customers in a pay-as-you-go, anytime, anywhere manner. Cloud services provide dynamically scalable services through the Internet on demand. Therefore, service provisioning plays a key role in CC....

    Provided By Hindawi Publishing

  • White Papers // Oct 2013

    Empirical Analysis of Server Consolidation and Desktop Virtualization in Cloud Computing

    Physical server transited to Virtual Server Infrastructure (VSI) and desktop device to Virtual Desktop Infrastructure (VDI) have the crucial problems of server consolidation, virtualization performance, virtual machine density, Total Cost of Ownership (TCO), and Return On Investments (ROI). Besides, how to appropriately choose hypervisor for the desired server/desktop virtualization is...

    Provided By Hindawi Publishing

  • White Papers // Oct 2013

    Efficient Cluster Head Selection Algorithm for MANET

    In Mobile Ad hoc NETwork (MANET) cluster head selection is considered a gigantic challenge. In wireless sensor network LEACH protocol can be used to select cluster head on the bases of energy, but it is still a dispute in mobile ad hoc networks and especially when nodes are itinerant. In...

    Provided By Hindawi Publishing

  • White Papers // Oct 2013

    Location Estimation Using Space-Time Signal Processing in RFID Wireless Sensor Networks

    The authors consider Real-Time Locating Systems (RTLS) consisting of Radio Frequency IDentification (RFID) tags and multi-antenna readers to propose a novel location estimation algorithm based on the concept of space-time signature matching for multipath environments. In contrast to previous fingerprint-based approaches that rely on Received Signal Strength (RSS) information only,...

    Provided By Hindawi Publishing

  • White Papers // Oct 2013

    Secure and Efficient Control Transfer for IoT Devices

    The prevalence of Internet of Things (IoT) requires flexible and fine-grained controls over the IoT devices. Existing works rely on specific controllers or programs to remotely control IoT devices, which is inefficient to support intelligent control in IoT environments. In contrast, utilizing a common portal device, for example, smart phone,...

    Provided By Hindawi Publishing

  • White Papers // Oct 2013

    Privacy Protection Based Secure Data Transaction Protocol for Smart Sensor Meter in Smart Grid

    A smart grid is a data communications network integrated with an electrical grid that collects and analyzes near-real-time data on power transmission, distribution, and consumption. Currently, smart grid systems are considered to be necessary for improving the monitoring and control of a power distribution infrastructure. Using distributed measurement architecture, it...

    Provided By Hindawi Publishing

  • White Papers // Sep 2013

    Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are distributed in nature where sensor nodes operate independently without any centralized authority. Intrusion Detection System (IDS) is regarded as the second line of defense against network anomalies and threats. IDS play an important role in network security. There are many techniques which are used to...

    Provided By Hindawi Publishing

  • White Papers // Sep 2013

    Detection and Countermeasure of Node Misbehaviour in Clustered Wireless Sensor Network

    Wireless sensor networks are widely used in many applications like battlefield monitoring, environment monitoring, and so forth. In all of these applications the cooperation among various sensor nodes is needed to forward the data packets to the base station. However, it expends the various resources of a sensor node such...

    Provided By Hindawi Publishing

  • White Papers // Sep 2013

    Systems Thinking Safety Analysis: Nuclear Security Assessment of Physical Protection System in Nuclear Power Plants

    The dynamical quantification is done in the security of Nuclear Power Plants (NPPs). The time delay is important to the security of the NPPs. How the defense against possible terror attack reacts could be analyzed by some aspects by several external impacts. The political, social, and technological aspects could be...

    Provided By Hindawi Publishing

  • White Papers // Sep 2013

    Balancing Energy Consumption in Clustered Wireless Sensor Networks

    Clustering in wireless sensor networks is an efficient way to structure and organize the network. It aims at identifying a subset of nodes within the network and binding it to a leader (i.e., cluster head). The leader becomes in charge of specific additional tasks like gathering data from all nodes...

    Provided By Hindawi Publishing

  • White Papers // Sep 2013

    A Secure Implementation of a Symmetric Encryption Algorithm in White-Box Attack Contexts

    In a white-box context, an adversary has total visibility of the implementation of the cryptosystem and full control over its execution platform. As a countermeasure against the threat of key compromise in this context, a new secure implementation of the symmetric encryption algorithm SHARK is proposed. The general approach is...

    Provided By Hindawi Publishing

  • White Papers // Sep 2013

    Design of an Evolutionary Approach for Intrusion Detection

    A novel evolutionary approach is proposed for effective intrusion detection based on benchmark datasets. The proposed approach can generate a pool of non-inferior individual solutions and ensemble solutions thereof. The generated ensembles can be used to detect the intrusions accurately. For intrusion detection problem, the proposed approach could consider conflicting...

    Provided By Hindawi Publishing

  • White Papers // Sep 2013

    Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks

    In this paper, the authors examined the previous schemes and security vulnerabilities of the previous schemes. Lee et al.'s and Wu et al.'s scheme was vulnerable to replay attack, cannot achieved perfect forward secrecy, cannot provided anonymity. And Mun et al.'s scheme was vulnerable to replay attack and man-in-the-middle attack,...

    Provided By Hindawi Publishing

  • White Papers // Sep 2013

    An Efficient Processing of Join Queries for Sensor Networks Using Column-Oriented Databases

    Recently, the sensor network area is gaining attention both in the industry and academia. Many applications of sensor network such as vehicle tracking and environmental monitoring require joining sensor data scattered over the network. The main performance criterion for queries in a sensor network is to minimize the battery power...

    Provided By Hindawi Publishing

  • White Papers // Sep 2013

    An Efficient Cluster Authentication Scheme Based on VANET Environment in M2M Application

    Wireless and mobile sensor network technologies in M2M (Machine-To-Machine) are rapidly applied to the people real life. Thus, in near future, advanced wireless and mobile sensor network in M2M application will be major key factor of the future generation convergence network which is based on the state of the application....

    Provided By Hindawi Publishing

  • White Papers // Sep 2013

    An Efficient WSN Simulator for GPU-Based Node Performance

    In wireless sensor network, when these sensors are wrongly placed in an observation region, they can quickly run out of batteries or be disconnected. These incidents may result in huge losses in terms of sensing data from numerous sensors and their costs. For this reason, a number of simulators have...

    Provided By Hindawi Publishing

  • White Papers // Sep 2013

    Framework for Secure Wireless Communication in Wireless Sensor Networks

    With large-scale and rapid development in Wireless Sensor Networks (WSNs), there is great demand to adopt security mechanisms for secure wireless communication. WSNs have many fields of applications that are playing an essential role in increasing productivity and reducing cost. The restricted and constrained nature of sensors along with potentially...

    Provided By Hindawi Publishing

  • White Papers // Sep 2013

    A Study of Practical Proxy Re-Encryption with a Keyword Search Scheme Considering Cloud Storage Structure

    Data outsourcing services have emerged with the increasing use of digital information. They can be used to store data from various devices via networks that are easy to access. Unlike existing removable storage systems, storage outsourcing is available to many users because it has no storage limit and does not...

    Provided By Hindawi Publishing

  • White Papers // Sep 2013

    Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks

    Recent advances in wireless communication technologies and applications have enabled the large-scale deployment of Wireless Sensor Networks (WSNs). These networks have applications in several important and critical areas, such as military, critical infrastructure monitoring, healthcare, environment monitoring, and manufacturing. Security and privacy are critical issues to many sensor network applications,...

    Provided By Hindawi Publishing

  • White Papers // Sep 2013

    BMCloud: Minimizing Repair Bandwidth and Maintenance Cost in Cloud Storage

    To protect data in cloud storage, fault tolerance and efficient recovery become very important. Recent studies have developed numerous solutions based on erasure code techniques to solve this problem using functional repairs. However, there are two limitations to address. The first one is consistency since the Encoding Matrix (EM) is...

    Provided By Hindawi Publishing

  • White Papers // Sep 2013

    MAP: Towards Authentication for Multiple Tags

    The prevalence of Radio Frequency IDentification (RFID) technology requires Privacy-Preserving Authentication (PPA) protocols to prevent privacy leakage during authentication. Existing PPA protocols employ the per-tag authentication, in which the reader has to sequentially authenticate the tags within the detecting region. Such a processing pattern becomes a bottleneck in current RFID...

    Provided By Hindawi Publishing

  • White Papers // Sep 2013

    An Efficient Schema for Cloud Systems Based on SSD Cache Technology

    Traditional caching strategy is mainly based on the memory cache, taking read-write speed as its ultimate goal. However, with the emergence of SSD, the design ideas of traditional cache are no longer applicable. Considering the read-write characteristics and times limit of erasing, the characteristics of SSD are taken into account...

    Provided By Hindawi Publishing

  • White Papers // Sep 2013

    An Embedded Laser Marking Controller Based on ARM and FPGA Processor

    Laser marking is an important branch of the laser information processing technology. The existing laser marking controllers are most based on PC and Windows operating system, which is large and inconvenient to move. Still, it can't work outdoors or in other harsh environments. In order to compensate for these insufficient,...

    Provided By Hindawi Publishing

  • White Papers // Sep 2013

    An Improved Biometrics-Based Remote User Authentication Scheme with User Anonymity

    The authors review the biometrics-based user authentication scheme proposed by the researcher in 2012. The authors show that there exist loopholes in the scheme which are detrimental for its security. Therefore the authors propose an improved scheme eradicating the flaws of An's scheme. Then a detailed security analysis of the...

    Provided By Hindawi Publishing

  • White Papers // Aug 2013

    An Improved Dynamic ID-Based Remote User Authentication with Key Agreement Scheme

    In recent years, several dynamic ID-based remote user authentication schemes have been proposed. In 2012, Wen and Li proposed a dynamic ID-based remote user authentication with key agreement scheme. They claimed that their scheme can resist impersonation attack and insider attack and provide anonymity for the users. However, the authors...

    Provided By Hindawi Publishing

  • White Papers // Aug 2013

    Real-Time Detection of Application-Layer DDoS Attack Using Time Series Analysis

    Distributed Denial of Service (DDoS) attacks are one of the major threats to the current Internet, and application-layer DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are more undetectable. Consequently, neither Intrusion Detection Systems (IDS) nor victim server can detect malicious packets. In this paper, a novel approach...

    Provided By Hindawi Publishing