4
Mobile Computing IEEE 2014 Projects Web : www.kasanpro.com Email : [email protected] List Link : http://kasanpro.com/projects-list/mobile-computing-ieee-2014-projects Title :DOTS: A Propagation Delay-aware Opportunistic MAC Protocol for Underwater Sensor Networks Language : C# Project Link : http://kasanpro.com/p/c-sharp/dots-propagation-delay-aware-opportunistic-mac-protocol-underwater-sensor-networks Abstract : Underwater Acoustic Sensor Networks (UW-ASNs) use acoustic links as a means of communications and are accordingly confronted with long propagation delays, low bandwidth, and high transmission power consumption. This unique situation, however, permits multiple packets to concurrently propagate in the underwater channel, which must be exploited in order to improve the overall throughput. To this end, we propose the Delay-aware Opportunistic Transmission Scheduling (DOTS) algorithm that uses passively obtained local information (i.e., neighboring nodes' propagation delay map and their expected transmission schedules) to increase the chances of concurrent transmissions while reducing the likelihood of collisions. Our extensive simulation results document that DOTS outperforms existing solutions and provides fair medium access. Title :DOTS: A Propagation Delay-aware Opportunistic MAC Protocol for Underwater Sensor Networks Language : NS2 Project Link : http://kasanpro.com/p/ns2/dots-propagation-delay-aware-opportunistic-mac-protocol-underwater-sensor-network Abstract : Underwater Acoustic Sensor Networks (UW-ASNs) use acoustic links as a means of communications and are accordingly confronted with long propagation delays, low bandwidth, and high transmission power consumption. This unique situation, however, permits multiple packets to concurrently propagate in the underwater channel, which must be exploited in order to improve the overall throughput. To this end, we propose the Delay-aware Opportunistic Transmission Scheduling (DOTS) algorithm that uses passively obtained local information (i.e., neighboring nodes' propagation delay map and their expected transmission schedules) to increase the chances of concurrent transmissions while reducing the likelihood of collisions. Our extensive simulation results document that DOTS outperforms existing solutions and provides fair medium access. Title :From MAP to DIST: The Evolution of a Large-Scale WLAN Monitoring System Language : C# Project Link : http://kasanpro.com/p/c-sharp/from-map-dist-the-evolution-large-scale-wlan-monitoring-system Abstract : The edge of the Internet is increasingly becoming wireless. Therefore, monitoring the wireless edge is important to understanding the security and performance aspects of the Internet experience. We designed and implemented a large-scale WLAN monitoring system, the Dartmouth Internet security testbed (DIST), at Dartmouth College. It is equipped with distributed arrays of "sniffers" that cover 210 diverse campus locations and more than 5,000 users. In this paper, we describe our approach, designs, and solutions for addressing the technical challenges that have resulted from efficiency, scalability, security, and management perspectives. We also present extensive evaluation results on a production network, and summarize the lessons learned. Title :From MAP to DIST: The Evolution of a Large-Scale WLAN Monitoring System Language : NS2 Project Link : http://kasanpro.com/p/ns2/from-map-dist-the-evolution-large-scale-wlan-monitoring-system-code Abstract : The edge of the Internet is increasingly becoming wireless. Therefore, monitoring the wireless edge is important to understanding the security and performance aspects of the Internet experience. We designed and implemented a large-scale WLAN monitoring system, the Dartmouth Internet security testbed (DIST), at Dartmouth

Mobile Computing IEEE 2014 Projects

Embed Size (px)

Citation preview

Page 1: Mobile Computing IEEE 2014 Projects

Mobile Computing IEEE 2014 Projects

Web : www.kasanpro.com     Email : [email protected]

List Link : http://kasanpro.com/projects-list/mobile-computing-ieee-2014-projects

Title :DOTS: A Propagation Delay-aware Opportunistic MAC Protocol for Underwater Sensor NetworksLanguage : C#

Project Link : http://kasanpro.com/p/c-sharp/dots-propagation-delay-aware-opportunistic-mac-protocol-underwater-sensor-networks

Abstract : Underwater Acoustic Sensor Networks (UW-ASNs) use acoustic links as a means of communications andare accordingly confronted with long propagation delays, low bandwidth, and high transmission power consumption.This unique situation, however, permits multiple packets to concurrently propagate in the underwater channel, whichmust be exploited in order to improve the overall throughput. To this end, we propose the Delay-aware OpportunisticTransmission Scheduling (DOTS) algorithm that uses passively obtained local information (i.e., neighboring nodes'propagation delay map and their expected transmission schedules) to increase the chances of concurrenttransmissions while reducing the likelihood of collisions. Our extensive simulation results document that DOTSoutperforms existing solutions and provides fair medium access.

Title :DOTS: A Propagation Delay-aware Opportunistic MAC Protocol for Underwater Sensor NetworksLanguage : NS2

Project Link : http://kasanpro.com/p/ns2/dots-propagation-delay-aware-opportunistic-mac-protocol-underwater-sensor-networks-code

Abstract : Underwater Acoustic Sensor Networks (UW-ASNs) use acoustic links as a means of communications andare accordingly confronted with long propagation delays, low bandwidth, and high transmission power consumption.This unique situation, however, permits multiple packets to concurrently propagate in the underwater channel, whichmust be exploited in order to improve the overall throughput. To this end, we propose the Delay-aware OpportunisticTransmission Scheduling (DOTS) algorithm that uses passively obtained local information (i.e., neighboring nodes'propagation delay map and their expected transmission schedules) to increase the chances of concurrenttransmissions while reducing the likelihood of collisions. Our extensive simulation results document that DOTSoutperforms existing solutions and provides fair medium access.

Title :From MAP to DIST: The Evolution of a Large-Scale WLAN Monitoring SystemLanguage : C#

Project Link : http://kasanpro.com/p/c-sharp/from-map-dist-the-evolution-large-scale-wlan-monitoring-system

Abstract : The edge of the Internet is increasingly becoming wireless. Therefore, monitoring the wireless edge isimportant to understanding the security and performance aspects of the Internet experience. We designed andimplemented a large-scale WLAN monitoring system, the Dartmouth Internet security testbed (DIST), at DartmouthCollege. It is equipped with distributed arrays of "sniffers" that cover 210 diverse campus locations and more than5,000 users. In this paper, we describe our approach, designs, and solutions for addressing the technical challengesthat have resulted from efficiency, scalability, security, and management perspectives. We also present extensiveevaluation results on a production network, and summarize the lessons learned.

Title :From MAP to DIST: The Evolution of a Large-Scale WLAN Monitoring SystemLanguage : NS2

Project Link : http://kasanpro.com/p/ns2/from-map-dist-the-evolution-large-scale-wlan-monitoring-system-code

Abstract : The edge of the Internet is increasingly becoming wireless. Therefore, monitoring the wireless edge isimportant to understanding the security and performance aspects of the Internet experience. We designed andimplemented a large-scale WLAN monitoring system, the Dartmouth Internet security testbed (DIST), at Dartmouth

Page 2: Mobile Computing IEEE 2014 Projects

College. It is equipped with distributed arrays of "sniffers" that cover 210 diverse campus locations and more than5,000 users. In this paper, we describe our approach, designs, and solutions for addressing the technical challengesthat have resulted from efficiency, scalability, security, and management perspectives. We also present extensiveevaluation results on a production network, and summarize the lessons learned.

Title :Cloud-Assisted Mobile-Access of Health Data With Privacy and AuditabilityLanguage : C#

Project Link : http://kasanpro.com/p/c-sharp/cloud-assisted-mobile-access-health-data-with-privacy-auditability

Abstract : Motivated by the privacy issues, curbing the adoption of electronic healthcare systems and the wildsuccess of cloud service models, we propose to build privacy into mobile healthcare systemswith the help of theprivate cloud. Our system offers salient features including efficient key management, privacy-preserving data storage,and retrieval, especially for retrieval at emergencies, and auditability for misusing health data. Specifically, wepropose to integrate key management from pseudorandom number generator for unlinkability, a secure indexingmethod for privacypreserving keyword searchwhich hides both search and access patterns based on redundancy,and integrate the concept of attributebased encryption with threshold signing for providing role-based access controlwith auditability to prevent potential misbehavior, in both normal and emergency cases.

Mobile Computing IEEE 2014 Projects

Title :Cloud-Assisted Mobile-Access of Health Data With Privacy and AuditabilityLanguage : NS2

Project Link : http://kasanpro.com/p/ns2/cloud-assisted-mobile-access-health-data-privacy-auditability

Abstract : Motivated by the privacy issues, curbing the adoption of electronic healthcare systems and the wildsuccess of cloud service models, we propose to build privacy into mobile healthcare systemswith the help of theprivate cloud. Our system offers salient features including efficient key management, privacy-preserving data storage,and retrieval, especially for retrieval at emergencies, and auditability for misusing health data. Specifically, wepropose to integrate key management from pseudorandom number generator for unlinkability, a secure indexingmethod for privacypreserving keyword searchwhich hides both search and access patterns based on redundancy,and integrate the concept of attributebased encryption with threshold signing for providing role-based access controlwith auditability to prevent potential misbehavior, in both normal and emergency cases.

Title :Efficient Authentication for Mobile and Pervasive ComputingLanguage : C#

Project Link : http://kasanpro.com/p/c-sharp/efficient-authentication-mobile-pervasive-computing

Abstract : With today's technology, many applications rely on the existence of small devices that can exchangeinformation and form communication networks. In a significant portion of such applications, the confidentiality andintegrity of the communicated messages are of particular interest. In this work, we propose two novel techniques forauthenticating short encrypted messages that are directed to meet the requirements of mobile and pervasiveapplications. By taking advantage of the fact that the message to be authenticated must also be encrypted, wepropose provably secure authentication codes that are more efficient than any message authentication code in theliterature. The key idea behind the proposed techniques is to utilize the security that the encryption algorithm canprovide to design more efficient authentication mechanisms, as opposed to using standalone authenticationprimitives.

Title :Efficient Authentication for Mobile and Pervasive ComputingLanguage : NS2

Project Link : http://kasanpro.com/p/ns2/efficient-authentication-mobile-pervasive-computing-code

Abstract : With today's technology, many applications rely on the existence of small devices that can exchangeinformation and form communication networks. In a significant portion of such applications, the confidentiality andintegrity of the communicated messages are of particular interest. In this work, we propose two novel techniques forauthenticating short encrypted messages that are directed to meet the requirements of mobile and pervasiveapplications. By taking advantage of the fact that the message to be authenticated must also be encrypted, wepropose provably secure authentication codes that are more efficient than any message authentication code in theliterature. The key idea behind the proposed techniques is to utilize the security that the encryption algorithm can

Page 3: Mobile Computing IEEE 2014 Projects

provide to design more efficient authentication mechanisms, as opposed to using standalone authenticationprimitives.

http://kasanpro.com/ieee/final-year-project-center-thoothukudi-reviews

Title :Preserving Location Privacy in Geo-Social ApplicationsLanguage : C#

Project Link : http://kasanpro.com/p/c-sharp/preserving-location-privacy-geo-social-applications

Abstract : Using geo-social applications, such as FourSquare, millions of people interact with their surroundingsthrough their friends and their recommendations. Without adequate privacy protection, however, these systems canbe easily misused, e.g., to track users or target them for home invasion. In this paper, we introduce LocX, a novelalternative that provides significantly-improved location privacy without adding uncertainty into query results or relyingon strong assumptions about server security. Our key insight is to apply secure user-specific, distance-preservingcoordinate transformations to all location data shared with the server. The friends of a user share this user's secretsso they can apply the same transformation. This allows all location queries to be evaluated correctly by the server, butour privacy mechanisms guarantee that servers are unable to see or infer the actual location data from thetransformed data or from the data access. We show that LocX provides privacy even against a powerful adversarymodel, and we use prototype measurements to show that it provides privacy with very little performance overhead,making it suitable for today's mobile devices.

Title :Preserving Location Privacy in Geo-Social ApplicationsLanguage : NS2

Project Link : http://kasanpro.com/p/ns2/preserving-location-privacy-geo-social-applications-code

Abstract : Using geo-social applications, such as FourSquare, millions of people interact with their surroundingsthrough their friends and their recommendations. Without adequate privacy protection, however, these systems canbe easily misused, e.g., to track users or target them for home invasion. In this paper, we introduce LocX, a novelalternative that provides significantly-improved location privacy without adding uncertainty into query results or relyingon strong assumptions about server security. Our key insight is to apply secure user-specific, distance-preservingcoordinate transformations to all location data shared with the server. The friends of a user share this user's secretsso they can apply the same transformation. This allows all location queries to be evaluated correctly by the server, butour privacy mechanisms guarantee that servers are unable to see or infer the actual location data from thetransformed data or from the data access. We show that LocX provides privacy even against a powerful adversarymodel, and we use prototype measurements to show that it provides privacy with very little performance overhead,making it suitable for today's mobile devices.

Mobile Computing IEEE 2014 Projects

Title :Privacy-Preserving Optimal Meeting Location Determination on Mobile DevicesLanguage : C#

Project Link : http://kasanpro.com/p/c-sharp/privacy-preserving-optimal-meeting-location-determination-mobile-devices

Abstract : Equipped with state-of-the-art smartphones and mobile devices, today's highly interconnected urbanpopulation is increasingly dependent on these gadgets to organize and plan their daily lives. These applications oftenrely on current (or preferred) locations of individual users or a group of users to provide the desired service, whichjeopardizes their privacy; users do not necessarily want to reveal their current (or preferred) locations to the serviceprovider or to other, possibly untrusted, users. In this paper, we propose privacy-preserving algorithms for determiningan optimal meeting location for a group of users. We perform a thorough privacy evaluation by formally quantifyingprivacy-loss of the proposed approaches. In order to study the performance of our algorithms in a real deployment,we implement and test their execution efficiency on Nokia smartphones. By means of a targeted user-study, weattempt to get an insight into the privacy-awareness of users in locationbased services and the usability of theproposed solutions.

Title :Privacy-Preserving Optimal Meeting Location Determination on Mobile DevicesLanguage : NS2

Project Link :

Page 4: Mobile Computing IEEE 2014 Projects

http://kasanpro.com/p/ns2/privacy-preserving-optimal-meeting-location-determination-mobile-devices-code

Abstract : Equipped with state-of-the-art smartphones and mobile devices, today's highly interconnected urbanpopulation is increasingly dependent on these gadgets to organize and plan their daily lives. These applications oftenrely on current (or preferred) locations of individual users or a group of users to provide the desired service, whichjeopardizes their privacy; users do not necessarily want to reveal their current (or preferred) locations to the serviceprovider or to other, possibly untrusted, users. In this paper, we propose privacy-preserving algorithms for determiningan optimal meeting location for a group of users. We perform a thorough privacy evaluation by formally quantifyingprivacy-loss of the proposed approaches. In order to study the performance of our algorithms in a real deployment,we implement and test their execution efficiency on Nokia smartphones. By means of a targeted user-study, weattempt to get an insight into the privacy-awareness of users in locationbased services and the usability of theproposed solutions.