Tooska Dargahi

Learn More
Attribute-Based Encryption (ABE) is a powerful cryptographic tool that allows fine-grained access control over data. Due to its features, ABE has been adopted in several applications, such as encrypted storage or access control systems. Recently, researchers argued about the non acceptable performance of ABE when implemented on mobile devices. Indeed, the(More)
Dynamic and efficient routing is one of the key challenges in wireless ad hoc networks. In this paper, based on a reactive AODV protocol, a novel semi-proactive routing protocol, named SP-AODV, is presented that uses proactive routing for some special nodes. The efficiency of the new protocol lies in the fact that some nodes with certain conditions will(More)
One of the most important challenges in mobile ad hoc networks is to use an efficient and dynamic routing protocol, as the nodes can move randomly, which requires the routing protocol to respond quickly to the network topology change. In this paper, a new hybrid routing protocol, based on a reactive AODV routing, is introduced. It follows the proactive(More)
Attribute-Based Encryption (ABE) could be an effective cryptographic tool for the secure management of Internet-of-Things (IoT) devices, but its feasibility in the IoT has been under-investigated thus far. This article explores such feasibility for well-known IoT platforms, namely, Intel Galileo Gen 2, Intel Edison, Raspberry Pi 1 Model B, and Raspberry Pi(More)
Two mainstream techniques are traditionally used to authorize access to a WiFi network. Small scale networks usually rely on the offline distribution of a WPA/WPA2 static pre-shared secret key (PSK); security hence relies on the fact that this PSK is not leaked by end user, and is not disclosed via dictionary or brute-force attacks. On the other side,(More)
While the usage of behavioural features for authentication purposes is gaining more and more consensus in the community, there is less consensus on which specific behavioural traits may be useful in eventually different settings. This calls for flexible tools which the application developer can leverage to automate the extraction and management of(More)
  • 1