Monday, June 13, 2011

Final Year Projects | IEEE Projects | Application Projects



Final Year Projects | IEEE Projects | Application Projects


Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing

Posted: 13 Jun 2011 05:43 AM PDT

Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing

Mobile Computing – June 2011

ABSTRACT

Due to the unattended nature of wireless sensor networks, an adversary can capture and compromise sensor nodes, make replicas of them, and then mount a variety of attacks with these replicas. These replica node attacks are dangerous because they allow the attacker to leverage the compromise of a few nodes to exert control over much of the network. Several replica node detection schemes have been proposed in the literature to defend against such attacks in static sensor networks. However, these schemes rely on fixed sensor locations and hence do not work in mobile sensor networks, where sensors are expected to move. In this work, we propose a fast and effective mobile replica node detection scheme using the Sequential Probability Ratio Test. To the best of our knowledge, this is the first work to tackle the problem of replica node attacks in mobile sensor networks. We show analytically and through simulation experiments that our scheme detects mobile replicas in an efficient and robust manner at the cost of reasonable overheads.


Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks

Posted: 13 Jun 2011 05:41 AM PDT

Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks


Dependable and Secure Computing – July-August 2011

ABSTRACT

In this paper, we formulate an analytical model to characterize the spread of malware in decentralized, Gnutella type peer-to-peer (P2P) networks and study the dynamics associated with the spread of malware. Using a compartmental model, we derive the system parameters or network conditions under which the P2P network may reach a malware free equilibrium. The model also evaluates the effect of control strategies like node quarantine on stifling the spread of malware. The model is then extended to consider the impact of P2P networks on the malware spread in networks of smart cell phones


0 comments:

Post a Comment

Final Year Projects | IEEE Projects | Application Projects

Monday, June 13, 2011

Final Year Projects | IEEE Projects | Application Projects


Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing

Posted: 13 Jun 2011 05:43 AM PDT

Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing

Mobile Computing – June 2011

ABSTRACT

Due to the unattended nature of wireless sensor networks, an adversary can capture and compromise sensor nodes, make replicas of them, and then mount a variety of attacks with these replicas. These replica node attacks are dangerous because they allow the attacker to leverage the compromise of a few nodes to exert control over much of the network. Several replica node detection schemes have been proposed in the literature to defend against such attacks in static sensor networks. However, these schemes rely on fixed sensor locations and hence do not work in mobile sensor networks, where sensors are expected to move. In this work, we propose a fast and effective mobile replica node detection scheme using the Sequential Probability Ratio Test. To the best of our knowledge, this is the first work to tackle the problem of replica node attacks in mobile sensor networks. We show analytically and through simulation experiments that our scheme detects mobile replicas in an efficient and robust manner at the cost of reasonable overheads.


Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks

Posted: 13 Jun 2011 05:41 AM PDT

Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks


Dependable and Secure Computing – July-August 2011

ABSTRACT

In this paper, we formulate an analytical model to characterize the spread of malware in decentralized, Gnutella type peer-to-peer (P2P) networks and study the dynamics associated with the spread of malware. Using a compartmental model, we derive the system parameters or network conditions under which the P2P network may reach a malware free equilibrium. The model also evaluates the effect of control strategies like node quarantine on stifling the spread of malware. The model is then extended to consider the impact of P2P networks on the malware spread in networks of smart cell phones


0 comments:

Post a Comment

 

Copyright 2008 All Rights Reserved | Blogger Template by Bloganol and Smart Blogging Tips | Distributed by Deluxe Templates