1,427 research outputs found

    A New Scheme for Minimizing Malicious Behavior of Mobile Nodes in Mobile Ad Hoc Networks

    Get PDF
    The performance of Mobile Ad hoc networks (MANET) depends on the cooperation of all active nodes. However, supporting a MANET is a cost-intensive activity for a mobile node. From a single mobile node perspective, the detection of routes as well as forwarding packets consume local CPU time, memory, network-bandwidth, and last but not least energy. We believe that this is one of the main factors that strongly motivate a mobile node to deny packet forwarding for others, while at the same time use their services to deliver its own data. This behavior of an independent mobile node is commonly known as misbehaving or selfishness. A vast amount of research has already been done for minimizing malicious behavior of mobile nodes. However, most of them focused on the methods/techniques/algorithms to remove such nodes from the MANET. We believe that the frequent elimination of such miss-behaving nodes never allowed a free and faster growth of MANET. This paper provides a critical analysis of the recent research wok and its impact on the overall performance of a MANET. In this paper, we clarify some of the misconceptions in the understating of selfishness and miss-behavior of nodes. Moreover, we propose a mathematical model that based on the time division technique to minimize the malicious behavior of mobile nodes by avoiding unnecessary elimination of bad nodes. Our proposed approach not only improves the resource sharing but also creates a consistent trust and cooperation (CTC) environment among the mobile nodes. The simulation results demonstrate the success of the proposed approach that significantly minimizes the malicious nodes and consequently maximizes the overall throughput of MANET than other well known schemes.Comment: 10 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS July 2009, ISSN 1947 5500, Impact Factor 0.42

    Efficient And Robust Video Steganography Algorithms For Secure Data Communication

    Get PDF
    Nowadays, the science of information hiding has gained tremendous significance due to advances in information and communication technology. The performance of any steganography method relies on the imperceptibility, embedding capacity, and robustness against attacks. This research provides solutions for the existing video steganography problems by proposing new and effective methods for digital video steganography. The key objectives of our paper are as follows: 1) a highly secure video steganography algorithm based on error correcting codes (ECC); 2) an increased payload video steganography algorithm in the discrete wavelet domain based on ECC; 3) a novel video steganography algorithm based on Kanade-Lucas-Tomasi (KLT) tracking and ECC; 4) a robust video steganography algorithm in the wavelet domain based on KLT tracking and ECC; and 5) a video steganography algorithm based on multiple object tracking and ECC. The experimental results from our research demonstrate that our proposed algorithms achieve higher embedding capacity as well as better imperceptibility of stego videos. Furthermore, the preprocessing stages increase the security and robustness of the proposed algorithms against attacks when compared to state-of-the-art steganographic methods

    Optimization and Job Scheduling in Heterogeneous Networks

    Get PDF
    The final publication is available at www.springerlink.comA heterogeneous network is a connected network of different platforms and operating systems. Job scheduling is a problem of selecting a free resource for unexecuted task from a pool of submitted tasks. Furthermore, it is required to find for every resource the best order of the tasks assigned to it. The purpose of this paper is to develop an efficient algorithm for job scheduling in heterogeneous networks. The algorithm should include parameters such as properties of resources and properties of jobs. The algorithm includes a cost function that is required to be optimized which includes parameters such as the total processing time, average waiting time. Our results demonstrate that the proposed algoritghm can be efficiently used to determine the performance of different job scheduling algorithms under different sets of loads.http://link.springer.com/chapter/10.1007%2F978-90-481-3662-9_4

    An Efficient Video Steganography Algorithm Based on BCH Codes

    Get PDF
    © ASEE 2015In this paper, in order to improve the security and efficiency of the steganography algorithm, we propose an efficient video steganography algorithm based on the binary BCH codes. First the pixels’ positions of the video frames’ components are randomly permuted by using a private key. Moreover, the bits’ positions of the secret message are also permuted using the same private key. Then, the secret message is encoded by applying BCH codes (n, k, t), and XORed with random numbers before the embedding process in order to protect the message from being read. The selected embedding area in each Y, U, and V frame components is randomly chosen, and will differ from frame to frame. The embedding process is achieved by hiding each of the encoded blocks into the 3-2-2 least significant bit (LSB) of the selected YUV pixels. Experimental results have demonstrated that the proposed algorithm have a high embedding efficiency, high embedding payload, and resistant against hackers

    Robust Heterogeneous Network to Support Multitasking

    Get PDF
    Due to emerging technology, efficient multitasking approach is highly demanded. But it is hard to accomplish in heterogeneous wireless networks, where diverse networks have dissimilar geometric features in service and traffic models. Multitasking loss examination based on Markov chain becomes inflexible in these networks owing to rigorous computations is obligatory. This paper emphases on the performance of heterogeneous wireless networks based on multitasking. A method based on multitasking of the interrelated traffic is used to attain an approximate performance in heterogeneous wireless networks with congested traffic. The accuracy of the robust heterogeneous network with multitasking is verified by using ns2 simulations.http://arxiv.org/abs/1309.451

    Using Available Wireless/Wired Network Infrastructure for Public Safety and Emergency Early Response

    Get PDF
    © ASEE 2008After September eleven the idea of Public Safety became a key policy goal for every governmental, education and commercial institute. Currently, most of the buildings are equipped with infrastructure for internal and external communication and networking. By being able to utilize the existing infrastructure of wireless / wired network in a building, we can have in place an early response system to disasters. This is important to save lives and get resolution for a disaster sooner. The idea here is to eliminate or reduce additional cost for a dedicated infrastructure for early response system. Due to the growth for the need of internetworking, most of the buildings have already a good base for such a system. This article contributes to the solution of the problem by specifying a novel solution for integration WLAN and existing infrastructure to the system of public safety and emergency early response
    • …
    corecore