Learn More
We propose a new model for data storage and access in clouds. Our scheme avoids storing multiple encrypted copies of same data. In our framework for secure data storage, cloud stores encrypted data (without being able to decrypt them). The main novelty of our model is addition of key distribution centers (KDCs). We propose DACC (Distributed Access Control(More)
Beaconless georouting algorithms are fully reactive and work without prior knowledge of their neighbors. However, existing approaches can either not guarantee delivery or they require the exchange of complete neighborhood information. We describe two general methods for completely reactive face routing with guaranteed delivery. The Beaconless Forwarder(More)
Existing routing and broadcasting protocols for ad hoc networks assume an ideal physical layer model. We apply the log normal shadow fading model to represent a realistic physical layer and use the probability p(x) for receiving a packet successfully as a function of distance x between two nodes. We define the transmission radius R as the distance at which(More)
Detecting misbehavior (such as transmissions of false information) in vehicular ad hoc networks (VANETs) is a very important problem with wide range of implications, including safety related and congestion avoidance applications. We discuss several limitations of existing misbehavior detection schemes (MDS) designed for VANETs. Most MDS are concerned with(More)
Existing position-based routing algorithms, where packets are forwarded in the geographic direction of the destination, normally require that the forwarding node knows the positions of all neighbors in its transmission range. This information on direct neighbors is gained by observing beacon messages that each node sends out periodically. Several beaconless(More)
Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications on our platform. However, Taylor & Francis, our agents, and our licensors make no representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the Content. Any opinions and views(More)
We propose a new decentralized access control scheme for secure data storage in clouds that supports anonymous authentication. In the proposed scheme, the cloud verifies the authenticity of the series without knowing the user's identity before storing data. Our scheme also has the added feature of access control in which only valid users are able to decrypt(More)
Vehicular ad hoc networks (VANETs) have emerged as an area of interest for both industry and researches because they have become an essential part of intelligent transportation systems (ITSs). Many applications in VANET require sending a message to certain or all vehicles within a region, called geocast. Sometimes geocast requires that the message be kept(More)
Radio frequency identification and wireless sensor networks are two important wireless technologies that have a wide variety of applications in current and future systems. RFID facilitates detection and identification of objects that are not easily detectable or distinguishable by using conventional sensor technologies. However, it does not provide(More)
Utility companies (electricity, gas, and water suppliers), governments, and researchers have been urging to deploy communication-based systems to read meters, known as automatic meter reading (AMR). An AMR system is envisaged to bring on benefits to customers, utilities, and governments. The advantages include reducing peak demand for energy, supporting the(More)