myacademicproject logo

Mobile Computing

  • myacademicproject categorys

    A Proxy-based Collaboration System to Minimize Content Download Time and Energy Consumption

    • B.TECH / M.TECH / M.SC / PH.D

    •  Mukesh.B

    • 10 Months ago

    Mobile collaborative community (MCC) is an emerging technology that allows multiple mobile nodes (MNs) to perform a resource intensive task, such as large content download, in a cooperative manner. I

    Know More
  • myacademicproject categorys

    Detecting Mobile Malicious Webpages in Real Time

    • B.Tech / M.Tech / M.Sc / Ph.D

    •  GANGADHAR.T

    • 13 Months ago

    Mobile specific webpages differ significantly from their desktop counterparts in content, layout and functionality. Accordingly, existing techniques to detect malicious websites are unlikely to work for such webpages.

    Know More
  • myacademicproject categorys

    Quantifying Interdependent Privacy Risks with Location Data

    • B.Tech / M.Tech / M.Sc / Ph.D

    •  GANGADHAR.T

    • 13 Months ago

    Co-location information about users is increasingly available online. For instance, mobile users more and more frequently report their co-locations with other users in the messages and in the pictures they post on social networking websites by tagging the names of the friends they are with.

    Know More
  • myacademicproject categorys

    Searching Trajectories by Regions of Interest

    • B.Tech / M.Tech / M.Sc / Ph.D

    •  GANGADHAR.T

    • 13 Months ago

    With the increasing availability of moving-object tracking data, trajectory search is increasingly important. We propose and investigate a novel query type named trajectory search by regions of interest (TSR query). Given an argument set of trajectories

    Know More
  • myacademicproject categorys

    SUPERMAN Security Using Pre-Existing Routing for Mobile Ad hoc Networks

    • B.Tech / M.Tech / M.Sc / Ph.D

    •  GANGADHAR.T

    • 12 Months ago

    The flexibility and mobility of Mobile Ad hoc Networks (MANETs) have made them increasing popular in a wide range of use cases. To protect these networks, security protocols have been developed to protect routing and application data.

    Know More
  • myacademicproject categorys

    SUPERMAN Security Using Pre-Existing Routing for Mobile Ad hoc Networks

    • B.TECH / M.TECH / M.SC / PH.D

    •   GANGADHAR.T

    • 13 Months ago

    The flexibility and mobility of Mobile Ad hoc Networks (MANETs) have made them increasing popular in a wide range of use cases. To protect these networks, security protocols have been developed to protect routing and application data. However, these protocols only protect routes or communication, not both. Both secure routing and communication security protocols must be implemented to provide full protection.

    Know More
  • myacademicproject categorys

    Providing Privacy-Aware Incentives in Mobile Sensing Systems

    • B.TECH / M.TECH / M.SC / PH.D

    •   GANGADHAR.T

    • 13 Months ago

    Mobile sensing relies on data contributed by users through their mobile device (e.g., smart phone) to obtain useful information about people and their surroundings. However, users may not want to contribute due to lack of incentives and concerns on possible privacy leakage. To effectively promote user participation, both incentive and privacy issues should be addressed. Although incentive and privacy have been addressed separately in mobile sensing, it is still an open problem to address them simultaneously. In this paper,

    Know More
  • myacademicproject categorys

    Energy and Memory Efficient Clone Detection in Wireless Sensor Networks

    • B.TECH / M.TECH / M.SC / PH.D

    •  GANGADHAR.T

    • 13 Months ago

    In this paper, we propose an energy-efficient location-aware clone detection protocol in densely deployed WSNs, which can guarantee successful clone attack detection and maintain satisfactory network lifetime. Specifically, we exploit the location information of sensors and randomly select witnesses located in a ring area to verify the legitimacy of sensors and to report detected clone attacks. The ring structure facilitates energy-efficient data forwarding along the path towards the witnesses and the sink. We theoretically prove that the proposed protocol can achieve 100 percent clone detection probability with trustful witnesses. We further extend the work by studying the clone detection performance with untrustful witnesses and show that the clone detection probability still approaches

    Know More
  • myacademicproject categorys

    Providing Privacy-Aware Incentives in Mobile Sensing Systems

    • B.TECH / M.TECH / M.SC / PH.D

    •  GANGADHAR.T

    • 13 Months ago

    Mobile sensing relies on data contributed by users through their mobile device (e.g., smart phone) to obtain useful information about people and their surroundings. However, users may not want to contribute due to lack of incentives and concerns on possible privacy leakage. To effectively promote user participation, both incentive and privacy issues should be addressed. Although incentive and privacy have been addressed separately in mobile sensing, it is still an open problem to address them simultaneously

    Know More
  • myacademicproject categorys

    Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach

    • B.TECH / M.TECH / M.SC / PH.D

    •  GANGADHAR.T

    • 12 Months ago

    Detecting node failures in mobile wireless networks is very challenging because the network topology can be highly dynamic, the network may not be always connected, and the resources are limited. In this paper, we take a probabilistic approach and propose two node failure detection schemes that systematically combine localized monitoring, location estimation and node collaboration. Extensive simulation results in both connected and disconnected networks demonstrate that our schemes achieve high failure detection rates (close to an upper bound) and low false positive rates, and incur low communication overhead.

    Know More
  • myacademicproject categorys

    Wormhole Attack Detection Algorithms in Wireless Network Coding Systems

    • B.TECH / M.TECH / M.SC / PH.D

    •   GANGADHAR.T

    • 12 Months ago

    Network coding has been shown to be an effective approach to improve the wireless system performance. However, many security issues impede its wide deployment in practice. Besides the well-studied pollution attacks, there is another severe threat, that of wormhole attacks, which undermines the performance gain of network coding. Since the underlying characteristics of network coding systems are distinctly different from traditional wireless networks, the impact of wormhole attacks and countermeasures are generally unknown. In this paper, we quantify wormholes’ devastating harmful impact

    Know More
  • myacademicproject categorys

    Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks

    • B.TECH / M.TECH / M.SC / PH.D

    •   GANGADHAR.T

    • 12 Months ago

    Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless ad hoc network. In this paper, while observing a sequence of packet losses in the network, we are interested in determining whether the losses are caused by link errors only, or by the combined effect of link errors and malicious drop. We are especially interested in the insider-attack case, whereby malicious nodes that are part of the route exploit their knowledge of the communication context to selectively drop a small amount of packets critical to the network performance. Because the packet dropping rate in this case is comparable to the channel error rate, conventional algorithms that are based on detecting the packet loss rate cannot achieve satisfactory detection accuracy.

    Know More
  • myacademicproject categorys

    IP-Geo location Mapping for Moderately Connected Internet Regions

    • B.TECH / M.TECH / M.SC / PH.D

    •   GANGADHAR.T

    • 12 Months ago

    Most IP-geolocation mapping schemes take delay-measurement approach, based on the assumption of a strong correlation between networking delay and geographical distance between the targeted client and the landmarks. In this paper, however, we investigate a large region of moderately connected Internet and find the delay-distance correlation is weak. But we discover a more probable rule—with high probability the shortest delay comes from the closest distance. Based on this closest-shortest rule, we develop a simple and novel IP-geolocation mapping scheme for moderately connected Internet regions, called GeoGet. In GeoGet, we take a large number of webservers as passive landmarks and map a targeted client to the geolocation of the landmark that has the shortest delay. We further use JavaScript at targeted clients to generate HTTP/Get probing for delay measurement.

    Know More
  • myacademicproject categorys

    Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes

    • B.TECH / M.TECH / M.SC / PH.D

    •   GANGADHAR.T

    • 12 Months ago

    Compromised node and denial of service are two key attacks in wireless sensor networks (WSNs). In this paper, we study data delivery mechanisms that can with high probability circumvent black holes formed by these attacks. We argue that classic multipath routing approaches are vulnerable to such attacks, mainly due to their deterministic nature. So once the adversary acquires the routing algorithm, it can compute the same routes known to the source, hence, making all information sent over these routes vulnerable to its attacks. In this paper, we develop mechanisms that generate randomized multipath routes. Under our designs, the routes taken by the “shares” of different packets change over time.

    Know More
  • myacademicproject categorys

    Trust Based Optimal Routing in MANETS

    • B.TECH / M.TECH / M.SC / PH.D

    •   GANGADHAR.T

    • 12 Months ago

    A MANET ( Mobile Ad Hoc Networks ) is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. Since the nodes are mobile, the network topology may change rapidly and unpredictably over time. The network is decentralized, where all network activity including discovering the topology and delivering messages

    Know More
  • myacademicproject categorys

    Topology control in mobile ad-hoc networks with cooperative communications

    • B.TECH / M.TECH / M.SC / PH.D

    •   GANGADHAR.T

    • 12 Months ago

    Cooperative communication has received tremendous interest for wireless networks. Most existing works on cooperative communications are focused on link-level physical layer issues. Consequently, the impacts of cooperative communications on network-level upper layer issues

    Know More