Preventing Distributed Denial-of-Service Flooding Attacks With Dynamic Path Identifiers

Preventing Distributed Denial-of-Service Flooding Attacks With Dynamic Path Identifiers There are increasing interests in using path identifiers ( PIDs ) as inter-domain routing objects. However, the PIDs used in existing approaches are static, which makes it easy for attackers to launch the distributed denial-of-service (DDoS) flooding attacks. To address this issue, in this paper, we…

Read More

Secure and Private Data Aggregation for Energy Consumption Scheduling in Smart Grids

Secure and Private Data Aggregation for Energy Consumption Scheduling in Smart Grids The recent proposed solutions for demand side energy management leverage the two-way communication infrastructure provided by modern smart-meters and sharing the usage information with the other users. In this paper, we first highlight the privacy and security issues involved in the distributed demand…

Read More

Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks

Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks Although quite popular for the protection for ad-hoc networks (MANETs, IoT, VANETs, etc.), detection & mitigation techniques only function after the attack has commenced. Prevention, however, attempts at thwarting an attack before it is executed. Both techniques can be realized either by the collective collaboration of network…

Read More

GeTrust: A guarantee-based trust model in Chord-based P2P networks

GeTrust: A guarantee-based trust model in Chord-based P2P networks More and more users are attracted by P2P networks characterized by decentralization, autonomy and anonymity. However, users’ unconstrained behavior makes it necessary to use a trust model when establishing trust relationships between peers. Most existing trust models are based on recommendations, which, however, suffer from the…

Read More

Energy efficient and provenance based trust routing for delay tolerant networks

Delay tolerant networks (DTNs) are often encountered in military network environments where end-to-end connectivity is not guaranteed due to frequent disconnection or delay. This work proposes a provenance-based trust framework, namely PROVEST (PROVEnance-baSed Trust model) that aims to achieve accurate peer-to-peer trust assessment and maximize the delivery of correct messages received by destination nodes while…

Read More

A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks

A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks   Affording secure and efficient big data aggregation methods is very attractive in the field of wireless sensor networks (WSNs) research. In real settings, the WSNs have been broadly applied, such as target tracking and environment remote monitoring. However, data can be easily…

Read More