Tooska Dargahi

Learn More
Dynamic and efficient routing is one of the key challenges in wireless ad hoc networks. In this paper, based on a reactive AODV protocol, a novel semi-proactive routing protocol, named SP-AODV, is presented that uses proactive routing for some special nodes. The efficiency of the new protocol lies in the fact that some nodes with certain conditions will(More)
One of the most important challenges in mobile ad hoc networks is to use an efficient and dynamic routing protocol, as the nodes can move randomly, which requires the routing protocol to respond quickly to the network topology change. In this paper, a new hybrid routing protocol, based on a reactive AODV routing, is introduced. It follows the proactive(More)
Attribute-Based Encryption (ABE) is a powerful cryptographic tool that allows fine-grained access control over data. Due to its features, ABE has been adopted in several applications, such as encrypted storage or access control systems. Recently, researchers argued about the non acceptable performance of ABE when implemented on mobile devices. Indeed, the(More)
Attribute-Based Encryption (ABE) could be an effective cryptographic tool for the secure management of Internet-of-Things (IoT) devices, but its feasibility in the IoT has been under-investigated thus far. This article explores such feasibility for well-known IoT platforms, namely, Intel Galileo Gen 2, Intel Edison, Raspberry Pi 1 Model B, and Raspberry Pi(More)
The increasing use of mobile devices, along with advances in telecommunication systems, increased the popularity of Location-Based Services (LBSs). In LBSs, users share their exact location with a potentially untrusted Location-Based Service Provider (LBSP). In such a scenario, user privacy becomes a major concern: the knowledge about user location may lead(More)
While the usage of behavioural features for authentication purposes is gaining more and more consensus in the community, there is less consensus on which specific behavioural traits may be useful in eventually different settings. This calls for flexible tools which the application developer can leverage to automate the extraction and management of(More)
Due to the flexibility, affordability and portability of cloud storage, individuals and companies envisage the cloud storage as one of the preferred storage media nowadays. This attracts the eyes of cyber criminals, since much valuable information such as user credentials, and private customer records are stored in the cloud. There are many ways for(More)