Search or add a thesis

Advanced Search (Beta)
Home > Power Centric Nodes in Clustered Knowledge Networks Ensuring Optimal Security

Power Centric Nodes in Clustered Knowledge Networks Ensuring Optimal Security

Thesis Info

Access Option

External Link

Author

Qaisar Javaid, Qaisar

Program

PhD

Institute

International Islamic University

City

Islamabad

Province

Islamabad.

Country

Pakistan

Thesis Completing Year

2016

Thesis Completion Status

Completed

Subject

Computer Science

Language

English

Link

http://prr.hec.gov.pk/jspui/bitstream/123456789/7352/1/Final%20Thesis%20PDF.pdf

Added

2021-02-17 19:49:13

Modified

2024-03-24 20:25:49

ARI ID

1676727811670

Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.

Similar


Knowledge Networks are gaining momentum within cyber world. Knowledge leads to innovation and for this reason organizations focus on research and information gathering in order to gain and improve existing knowledge. In this age of information, which is primarily based on internet and world wide web technologies, enable significantly expanded networks of people to communicate and collaborate „virtually‟ across teams of the entire organization, across organizations and the world, anytime and anyplace. Therefore, wonderful innovations in computing and telecommunications have transformed the corporations from structured and manageable type to interwoven network of blurred boundaries such as; ad hoc networks and mobile wireless networks, semantic web technology etc. This study explores the means of knowledge networks in Information Technology and security leaks that are found and measures that are taken to counter this menace are coming up with optimal Secure Clustered Power Centric node network. The study estimates these measures, evaluating and integrating them to come up with a secured network design. This study seeks to establish these threats and attacks and counter security measures in Wireless Sensor Networks, Mobile Ad-hoc Networks and Semantic Web technology and propose architecture for the purpose of establishing secure routing in knowledge networks called Optimized Network Security Solution for Knowledge Networks – ONSS-KN. Design and development of power-aware, scalable and performance efficient routing protocols for Knowledge Networks (KNs) is an active area of research. In this dissertation, we show that insect colonies based intelligence – commonly referred to as Swarm Intelligence (SI) – provides an ideal metaphor for developing routing protocols for KNs because they consist of minimalists, autonomous individuals that through local interactions self-organize to produce system-level behaviors that show lifelong adaptability to changes and perturbations in an external environment. In this context, we propose a clustering and secure data routing protocol for KNs (iRoutCluster) – inspired by the foraging principles of honey bees. Qaisar Javaid (1094-212001) Page vi To conclude this study, we perform simulation studies to analyze and compare the performance of the final iRoutCluster design with existing protocols. The simulation results demonstrate that iRoutCluster outperforms its competitors in all assumed scenarios and metrics. We then implement the iRoutCluster protocol in MATLAB® simulator to further investigate its performance in mobile networks and large-scale static sensor networks. The results clearly show that iRoutCluster not only performs well in large-scale networks, but is equally good in MANETs as well. Therefore, iRoutCluster is a viable protocol for hybrid ad hoc networks.
Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

ڈاکٹر نصیر احمد اسد - یار من

ڈاکٹر نصیر احمد اسد کی کتاب آ پ کے ہاتھوں میں ہے پڑھ کے خود ہی فیصلہ کر لیجیے گا،مجھے کتاب سے زیادہ صاحب کتاب پر بات کرنی ہے کہ میں نے اپنی زندگی کے بہت سے شب و روز نصیر کے ساتھ گزارے ہیں۔ ایم فل میں داخلہ اس کا سبب بنا۔ سرگودھا یونیورسٹی میں کلاس کا آ غا ز ہوا تو زندگی کا ایک نیا باب شروع ہوا۔ طارق کلیم ہمارا کلاس سی آ ر بھی تھا اور راجہ اندر بھی۔ محفلیں جمانا، خوش گپیاں کرنا اور ٹک کر نہ بیٹھنا طارق کلیم کی مٹی میں گندھے ہوئے تھے دو چار کے ساتھ نہیں بلکہ پوری کلاس کو ساتھ لے کر کنٹین کے ساتھ اس لان میں بیٹھنا جہاں ڈاکٹر طاہر تونسوی کی نظر بھی پڑ جاتی۔ عجیب دن تھے میری مردہ نسوں میں زندگی پھر سے دوڑنے لگی تھی۔ اس اثنا میں جن لوگوں سے قربت ہوئی ان میں نصیر اسد بھی تھا سوٹڈ بوٹڈ، باریش، زودگو اور صاف دل بھولا بھالا نصیر اسد جس میں لڑکپن کی بے فکری اور ادھیڑ عمری کی سنجیدگی باہم پیکار میں تھیں۔ اسے تعلیم کی بہت فکر تھی میری کم گوئی کو اس نے لیاقت جان لیا اور گوندل ہاسٹل میں میرے پاس آنے لگا مل کر پڑھتے،مل کر کھاتے پیتے اور مل کر یونیورسٹی جاتے۔ اس کے پاس ایک سائیکل تھی جس پر سوار ہو کر ہم یونیورسٹی جاتے ڈرائیور عام طور پر نصیر اسد ہوتا۔ وقت گزرتا رہا دوستی پروان چڑھتی رہی اور یوں بلآخر ہمارا ایم فل ہو گیا۔ پھر استاد محترم ڈاکٹر سید عامر سہیل صاحب اور طارق کلیم کے اکسانے پر ہم پی ایچ ڈی میں داخلے کے لیے بغیر تیاری کے ٹیسٹ میں جا بیٹھے۔ پرا نے کلاس فیلوز میں سے پانچ لوگ تھے جن کا داخلہ ہوا۔ ان میں طارق...

PERAN PERILAKU KEPEMIMPINAN WAKIL KEPALA SEKOLAH BIDANG KESISWAAN DALAM PENGORGANISASIAN SISWA BERBASIS MEDIA SOSIAL DI SMK KOTA BEKASI

Principal leadership activities in utilizing social media can affect the effectiveness of organizing, coaching, and communication. This study discusses effective communication with students through utilizing social media. Communication through social media is done by forming groups in various social media. This research was conducted with a survey method that uses data analysis with path analysis methods where calculations are performed with the program used are Data Analysis packages found in Microsoft Excel and SPSS. The subjects of this study were the deputy principals of the Vocational High School students' field of 100 people in the city of Bekasi. The determination of the sample was taken using Slovin formula and random sampling technique, as many as 80 deputy principals in the student field were the sample of the study while 20 deputy principals in the student field were used to test the validation of the research instruments. This research is expected to contribute to society.  

Secure Provenance for Distributed Environment

Data provenance has an essential role in establishing the trustworthiness of data in many applications, where critical decisions have to be made based on the data collected from diverse sources. Therefore, it is indispensable to use authentic and accurate data for such mission-critical applications. In order to fully trust the data provenance itself, it is extremely important to secure the data provenance from forgeries and misuse. Provenance generation, management, and dissemination have received substantial attention from the research community. However, provenance security in a collaborative distributed network has earned less heed from the research community. The traditional time-honoured security solutions cannot be directly applied because of the chained or directed acyclic graph structure of the provenance. For a collaborative distributed network, in the literature, some security solutions have been proposed to secure the provenance information. However,these schemes are not without their limitations. The existing schemes assume transitive trust among participating users, thus attacks initiated by multiple consecutive colluding users on a provenance chain cannot be detected. Such an assumption is beyond the reality, especially working in a file sharing environment or distributed network. Moreover, the existing schemes introduce an additional element to chain the provenance records which results an extra storage overhead. To overcome the aforementioned loopholes, we have proposed secure provenance schemes for a document/file sharing n etwork. The proposed schemes can detect the attacks launched by either consecutive or non-consecutive adversaries. For the provenance records chaining, these schemes aggregate the signatures of the participating users. Experimental results show that the proposed schemes outperform as compared to existing schemes in terms of computation and storage cost. Provenance size is a major hindrance to the adoption of provenance in a resourceconstrained network. The provenance size increases drastically when the number of nodes in the network grow. The growing provenance size becomes the per formance bottleneck especially in Wireless Sensor Networks (WSNs). Different solutions have been proposed in the literature to compress the provenance in formation along with its security. However, in existing provenance compression schemes, the provenance’s size grows linearly with the number of nodes in a WSN. Furthermore, the existing provenance compression schemes are designed for static nodes only and do not account for the mobility factor. Moreover, some secure provenance compression schemes use overlapped arithmetic coding to compress the provenance information. However, there is no criterion to find the overlapping ratio. To overcome the above-mentioned issues, we have proposed a secure provenance compression scheme for mobile nodes of a WSN. Moreover, a novel mechanism has been devised to calculate the overlapping ratio for overlapped arithmetic coding. Furthermore, the proposed scheme assures the confidentiality, integrity, and fresh ness of the provenance information. It is evident from the simulation results that the proposed scheme has higher compression and lower false positive rate.