scispace - formally typeset
Search or ask a question

Showing papers in "Computer Communications in 2011"


Journal ArticleDOI
TL;DR: A comprehensive survey of networking research projects and activities covering various testbeds for experimentations for new architectures, new security mechanisms, content delivery mechanisms, management and control frameworks, service architectures, and routing mechanisms is presented.

260 citations


Journal ArticleDOI
TL;DR: An enhanced authentication scheme is proposed, which covers all the identified weaknesses of Wang et al.'s scheme and is more secure and efficient for practical application environment.

239 citations


Journal ArticleDOI
TL;DR: An overview of VHO techniques, along with the main algorithms, protocols and tools proposed in the literature are presented, and the most appropriate V HO techniques to efficiently communicate in VN environments are suggested considering the particular characteristics of this type of networks.

229 citations


Journal ArticleDOI
TL;DR: This paper developed a real-time intrusion detection system (RT-IDS) using the Decision Tree technique to classify on-line network data as normal or attack data and identified 12 essential features of network data which are relevant to detecting network attacks using the information gain as the authors' feature selection criterions.

215 citations


Journal ArticleDOI
TL;DR: A novel prediction-based data collection protocol is proposed, in which a double-queue mechanism is designed to synchronize the prediction data series of the sensor node and the sink node, and therefore, the cumulative error of continuous predictions is reduced.

198 citations


Journal ArticleDOI
TL;DR: A secure and light-weight authentication scheme with user anonymity for wireless communications that is secure in the case that the information stored in thesmart card is disclosed but the user password of the smart card owner is unknown to the attacker.

196 citations


Journal ArticleDOI
TL;DR: This study employs ns2 to validate the effect of the proposed IDS deployment, as IDS nodes can rapidly block a malicious node, without false positives, if a proper threshold is set.

192 citations


Journal ArticleDOI
TL;DR: TinyPBC as discussed by the authors is the most efficient implementation of PBC primitives for 8, 16 and 32-bit processors commonly found in sensor nodes and can compute pairings in 1.90s on ATmega128L, 1.27s on MSP430 and 0.14s on PXA27x.

174 citations


Journal ArticleDOI
TL;DR: This paper presents a hash-based mutual authentication protocol, designed to send a random number generated by a tag to a back-end server without disclosure, which substitutes arandom number with a secret value, which is employed in a response message.

173 citations


Journal ArticleDOI
TL;DR: This paper discusses issues related to the design of underwater acoustic network protocols which are tailored around, and leverage on, the differences between underwater acoustics and terrestrial radio, and introduces a set of solutions which explicitly account for the longer propagation delays.

155 citations


Journal ArticleDOI
TL;DR: The proposed classification algorithm, RBPBoost, is achieved by combining ensemble of classifier outputs and Neyman Pearson cost minimization strategy, for final classification decision, and achieves high detection accuracy (99.4%) with fewer false alarms and outperforms the existing ensemble algorithms.

Journal ArticleDOI
TL;DR: A novel scalable RFID authentication protocol based on the scheme presented in Song and Mitchell (2009) [1], that takes constant time to authenticate a tag is proposed.

Journal ArticleDOI
TL;DR: A survey and an experimental study of the energy consumption issues and energy-efficient technologies of the MAC protocol in IEEE 802.11 WLAN.

Journal ArticleDOI
TL;DR: A dissemination protocol that prevents the so-called broadcast storm problem in dense networks by employing an optimized broadcast suppression technique and efficiently deals with disconnected networks by relying on the store-carry-forward communication model is presented.

Journal ArticleDOI
TL;DR: A comprehensive and up-to-date survey of available movement traces, modeling/analyses of these traces, and synthetic mobility models that include position information is provided.

Journal ArticleDOI
TL;DR: This paper proposes an energy-efficient and high-accuracy (EEHA) scheme for secure data aggregation that is more efficient and accurate than the existing scheme and conducts extensive simulations to evaluate the performance.

Journal ArticleDOI
TL;DR: A detailed investigation of key challenges that constitute an efficient RRM framework is presented and an overview with a classification of recent solutions, in terms of decision making, is provided along with the discussion.

Journal ArticleDOI
TL;DR: This paper argues that in addition to allowing a device to find other appropriate devices with which to interact, while detecting those that are malicious, the proposed probabilistic trust management scheme is also capable of allowing a devices to judge the trustworthiness of another device it interacts with.

Journal ArticleDOI
TL;DR: A robust user authentication and key agreement scheme suitable for ubiquitous computing environments and can preserve the privacy of the client's secret key even if the secret information stored in a smart card is compromised.

Journal ArticleDOI
TL;DR: A novel form of centrality is introduced: the second order centrality which can be computed in a distributed manner which provides locally each node with a value reflecting its relative criticity and relies on a random walk visiting the network in an unbiased fashion.

Journal ArticleDOI
TL;DR: A robust and efficient authentication scheme based on strong-password approach to provide secure remote access in digital home network environments and it can be validated that the proposed scheme is more robust authentication mechanism having better security properties.

Journal ArticleDOI
TL;DR: This paper proposes a new approach for detecting and clustering botnet traffic on large-scale network application communities, in which a novel decision tree model is used to classify those traffic to be unknown by the payload content into known application communities.

Journal ArticleDOI
TL;DR: This study demonstrates that Chen et al.'s RFID authentication scheme does not provide location privacy and suffers from replay attacks, and an improved scheme is also proposed which can prevent possible attacks and be applied in environments requiring a high level of security.

Journal ArticleDOI
TL;DR: The power consumption of base stations for mobileWiMAX, fixed WiMAX, UMTS, HSPA, and LTE is modelled and related to the coverage, and the influence of MIMO is investigated.

Journal ArticleDOI
TL;DR: This work does the statistic work on vulnerabilities of three famous vulnerability databases and analyzes the distribution of vulnerabilities to expose the differences among different vulnerability rating systems, and proposes VRSS for qualitative rating and quantitative scoring vulnerabilities, which can combine respective advantages of all kinds ofulnerability rating systems.

Journal ArticleDOI
TL;DR: In this paper, the authors proposed an Android/OSGi platform for vehicular telematics applications, which includes remote management, rich class-sharing, proprietary vehicular applications, security policies, easy management of Application Programming Interface (APIs), and an open environment.

Journal ArticleDOI
TL;DR: This paper proposes an efficient solution to maintain coverage, while preserving the connectivity of the network, and aims to cover the area of interest (AOI), while minimizing the count of the active sensor nodes.

Journal ArticleDOI
TL;DR: This article tries to call the attention of Computer Communications readers to new and promising research areas, identified by members of the journal editorial board to stimulate further research activities in these areas.

Journal ArticleDOI
TL;DR: The situations when the p-sensitive k-anonymity property is not enough for the sensitive attributes protection are identified and a set of algorithms using the idea of top-down specification is devised, which is shown to be superior to the previous method in terms of effectiveness and efficiency.

Journal ArticleDOI
TL;DR: The main objective of this scheme is to manage reputation locally with minimum communication and delay overhead and to assign appropriate role or level to the deserved nodes in order to increase the throughput of overall network.