17 research outputs found

    Securing Data Dissemination in Vehicular ad hoc Networks

    Get PDF
    Vehicular ad hoc networks (VANETs) are a subclass of mobile ad hoc networks (MANETs) in which the mobile nodes are vehicles; these vehicles are autonomous systems connected by wireless communication on a peer-to-peer basis. They are self-organized, self-configured and self-controlled infrastructure-less networks. This kind of network has the advantage of being able to be set-up and deployed anywhere and anytime because it has no infrastructure set-up and no central administration. Distributing information between these vehicles over long ranges in such networks, however, is a very challenging task, since sharing information always has a risk attached to it especially when the information is confidential. The disclosure of such information to anyone else other than the intended parties could be extremely damaging, particularly in military applications where controlling the dissemination of messages is essential. This thesis therefore provides a review of the issue of security in VANET and MANET; it also surveys existing solutions for dissemination control. It highlights a particular area not adequately addressed until now: controlling information flow in VANETs. This thesis contributes a policy-based framework to control the dissemination of messages communicated between nodes in order to ensure that message remains confidential not only during transmission, but also after it has been communicated to another peer, and to keep the message contents private to an originator-defined subset of nodes in the VANET. This thesis presents a novel framework to control data dissemination in vehicle ad hoc networks in which policies are attached to messages as they are sent between peers. This is done by automatically attaching policies along with messages to specify how the information can be used by the receiver, so as to prevent disclosure of the messages other than consistent with the requirements of the originator. These requirements are represented as a set of policy rules that explicitly instructs recipients how the information contained in messages can be disseminated to other nodes in order to avoid unintended disclosure. This thesis describes the data dissemination policy language used in this work; and further describes the policy rules in order to be a suitable and understandable language for the framework to ensure the confidentiality requirement of the originator. This thesis also contributes a policy conflict resolution that allows the originator to be asked for up-to-date policies and preferences. The framework was evaluated using the Network Simulator (NS-2) to provide and check whether the privacy and confidentiality of the originators’ messages were met. A policy-based agent protocol and a new packet structure were implemented in this work to manage and enforce the policies attached to packets at every node in the VANET. Some case studies are presented in this thesis to show how data dissemination can be controlled based on the policy of the originator. The results of these case studies show the feasibility of our research to control the data dissemination between nodes in VANETs. NS-2 is also used to test the performance of the proposed policy-based agent protocol and demonstrate its effectiveness using various network performance metrics (average delay and overhead)

    Data Confidentiality in Mobile Ad hoc Networks

    Full text link
    Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis. These individual nodes act as routers to forward both their own data and also their neighbours' data by sending and receiving packets to and from other nodes in the network. The relatively easy configuration and the quick deployment make ad hoc networks suitable the emergency situations (such as human or natural disasters) and for military units in enemy territory. Securing data dissemination between these nodes in such networks, however, is a very challenging task. Exposing such information to anyone else other than the intended nodes could cause a privacy and confidentiality breach, particularly in military scenarios. In this paper we present a novel framework to enhance the privacy and data confidentiality in mobile ad hoc networks by attaching the originator policies to the messages as they are sent between nodes. We evaluate our framework using the Network Simulator (NS-2) to check whether the privacy and confidentiality of the originator are met. For this we implemented the Policy Enforcement Points (PEPs), as NS-2 agents that manage and enforce the policies attached to packets at every node in the MANET.Comment: 12 page

    Adopting E-Commerce to users’ needs

    Get PDF
    The objectives of this paper are to identify and analyse the extent to which the site is fulfilling all the user’s requirements and needs. The related works comprise the history of interactive design and the benefits of user-centered development, which is the methodology followed in this survey. Moreover, there is a brief comparison between Waterfall and User-centered methodology in terms of addressing the issues of time saving and addressing fulfilment of users’ needs. The data required to conduct this study was acquired using two research methods; the questionnaire and direct user observation, in order to address all the performance related attributes in the usability stage of the evaluation. An evaluation of the website, based on statements of usability goals and criteria, was undertaken in relation to the implementation and testing of the new design. JARIR bookstore website was chosen as a case study in this paper to investigate the usability and interactivity of the website design. The analysis section includes needs, users and tasks and data analysis, whereas the design phase covers the user interface and database design. At the end of this paper, some recommendations are presented regarding JARIR website that can be taken into account when developing the website in the future

    A Novel Approach for Sentiment Analysis of a Low Resource Language Using Deep Learning Models

    Get PDF
    Sentiment analysis is a process of dealing with people's opinions, remarks, and comments to extract valuable insights from them. Sentiment analysis can be used for various purposes like market analysis, campaign monitoring, decision-making, etc. In recent years, there has been much research on sentiment classification, particularly in English. However, these existing approaches used for the English language cannot be applied to the Urdu language. The substantial rise in communication traffic, including audio, text, video, and pictures, has significantly shifted the Internet of Things (IoT) from scalar to Multimedia Internet of Things (MIoT). So far, the integration of MIoT and NLP systems has received less attention, but it has evolved as a novel research paradigm for smart applications. This article proposes deep learning techniques for sentence-level Urdu sentiment analysis (Urdu SA) for MIoT. Our approach consists of various phases, i.e., data gathering, text preprocessing, model training, testing, and evaluation. A data set of 25 thousand Urdu reviews are used for training the proposed models. This data set is built by scraping various Urdu blogs and social media platforms, and some part of the IMDB data set is used after translating it into the Urdu language. Native Urdu speakers do data annotation, and various preprocessing techniques, i.e., tokenization, stemming, etc., are applied. The two deep learning models, i.e., Convolutional Neural Network (CNN) and Long Short-term Memory (LSTM), are trained on preprocessed Urdu reviews to find their sentiments in this article. Both models are tested using various combinations of hyperparameters, and each model's accuracy and F1 scores are evaluated. The study results show that the LSTM model outperforms the CNN model by achieving a 96% accuracy and 91% F1 score

    Mobile Grid System: Policy and Privacy

    No full text
    Mobile Grid Services have given the ability to move jobs, data and application software from nodes to nodes during jobs' execution in the grid environment. They have also solved some of the lack in finding suitable resources for the jobs. To facilitate the ability to support mobile resource sharing between multiple heterogeneous Virtual Organizations (VOs), an authorization policy management framework is needed to support authorization for heterogeneous authorization systems. Traditional authorization policy management frameworks act well in authorization policy for a single VO where the contributing hosts grant the permission to follow a global authorization system. However most of policy management tools do not provide a clear support for sharing mobile resources between multiple heterogeneous VOs. To solve this problem, we present in this book a dynamic and heterogeneous policy management framework that can give a clear policy definition about the ability to move jobs, data and application software from nodes to nodes during jobs' execution in the grid environment

    Dynamic Policy Management in Mobile Grid Environments

    No full text
    Mobile Grid Services have given the ability to move jobs, data and application software from nodes tonodes during jobs execution in the grid environment. These migrations depend on the grid’s users and thegrid’s nodes policies. The heterogeneity, diversity of policies and attributes leads to a need for policymanagement tools that can handle these problems. Also, before the users can submit their jobs or runtheir applications on a certain resource or system they may need to guarantee that this resource orsystem has not been compromised, which could result in their own application or data being stolen orasking for certain users to be allowed to access the service. To date, not enough attention has been paidto policies that deal with such concerns. Most existing grid systems have support only limited types ofpolicies (e.g. CPU resources). A few designs consider enforcing data policies in their architecture.Therefore, we propose a dynamic policy framework that addresses these issues (user-submitted policy,data policy and multiple Virtual Organizations (VOs). <br/

    Comparison Between Cloud and Grid Computing: Review Paper

    No full text
    Cloud computing is the most recent announced technology that has been launched on the network world.Clouds are considered as a new generation of Grid computing. Clouds consist of data centres which areowned by the same institute. The homogeneity within each data centre in the infrastructure is the mainfeature for the cloud computing compared to grid computing. This paper provides a definition for thecloud, it discusses many aspects of Cloud Computing, and describes architectures for the cloud (by lookingat Amazon’s application (GrepTheWeb)) and how its cost definition differs from that of Grid computing.This paper focuses on comparing Cloud Computing to previous generations such as Grid Computing, byreviewing some Security and Policy Issues in Cloud and Grid Computing. At the end, this paper describesthe similarities and differences between the Grid and Cloud approaches.<br/

    Review on the Security Related Issues in Context Aware System.”

    No full text
    ABSTRACT A context aware system is recognized as a &quot;system which uses any context information previous to, o

    Privacy in Cloud Systems

    No full text
    corecore