You are on page 1of 2

1)

Clustering Key Management of Forward Security


Abstract: Based on the clustering model which takes the fully distributed CA private key management scheme, and combined the trust assessment strategy in dynamic, we proposed a new type of key management scheme with forward security. We also carried out some simulation experiments. The results show that as the number of nodes in the network is different, the certification success rate and the node certification delay remain stable.

2)

A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming


Abstract: Peer-to-peer (P2P) streaming has been widely deployed over the Internet. A streaming system usually has multiple channels, and peers may form multiple groups for content distribution. In this paper, we propose a distributed overlay framework (called SMesh) for dynamic groups where users may frequently hop from one group to another while the total pool of users remain stable. SMesh first builds arelatively stable mesh consisting of all hosts for control messaging. The mesh supports dynamic host joining and leaving, and will guide the construction of delivery trees. Using the Delaunay Triangulation (DT) protocol as an example, we show how to construct an efficient mesh with low maintenance cost. We further study various tree construction mechanisms based on the mesh, including embedded, bypass, and intermediate trees. Through simulations on Internet-like topologies, we show that SMesh achieves low delay and low link stress.

3)

Human character reorganization by handwriting using fuzzy logic


Abstract: Human character reorganization by handwriting using fuzzy logic, illustrates that the behavior or character according to the normal handwriting of the person. Proposed work gadgets particularly pointing or pinning towards human behavior and Eclipses the peculiar of human character tendency. Given a set of images which contain human handwriting, Predict the behavior of handwriting in each image and pinpoint their locations. Tag each handwriting with their behavior that must be stored along with the image. Given a set of such tagged images, Retrieve behavior based on specified handwriting.

4)

Integration of False Data Detection with data aggregation & confidential transmission in wsn
Abstract: In wireless sensor networks, compromised sensor nodes can inject false data during both data aggregation and data forwarding. The existing false data detection techniques consider false data injections during data forwarding only and do not allow any change on the data by data aggregation. However, this paper presents

a data aggregation and authentication protocol, called DAA, to integrate false data detection with data aggregation and confidentiality. To support data aggregation along with false data detection, the monitoring nodes of every data aggregator also conduct data aggregation and compute the corresponding small-size message authentication codes for data verification at their pair mates. To support confidential data transmission, the sensor nodes between two consecutive data aggregators verify the data integrity on the encrypted data rather than the plain data. Performance analysis shows that DAA detects any false data injected by up to T compromised nodes, and that the detected false data are not forwarded beyond the next data aggregator on the path. Despite that false data detection and data confidentiality increase the communication overhead, simulation results show that DAA can still reduce the amount of transmitted data by up to 60% with the help of data aggregation and early detection of false data.

5)

Data Leakage Detection

You might also like