network security ieee 2015 projects

Post on 08-Oct-2015

16 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

List of Network Security IEEE 2015 Projects. It Contains the IEEE Projects in the Domain Network Security for the year 2015

TRANSCRIPT

  • Network Security IEEE 2015 Projects

    Web : www.kasanpro.com Email : sales@kasanpro.com

    List Link : http://kasanpro.com/projects-list/network-security-ieee-2015-projects

    Title :A Novel En-route Filtering Scheme against False Data Injection Attacks in Cyber-Physical Networked SystemsLanguage : NS2Project Link : http://kasanpro.com/p/ns2/en-route-filtering-scheme-false-data-injection-attacks-cyber-physical-networked-systemsAbstract : In Cyber-Physical Networked Systems (CPNS), the adversary can inject false measurements to thecontroller through compromised sensor nodes, which not only threaten the security of the system, but also consumesnetwork resources. To deal with this issue, a number of en-route filtering schemes have been designed for wirelesssensor networks in the past. However, these schemes either lack resilience to the number of compromised nodes ordepend on the statically configure routes and node localization, which are not suitable for CPNS. In this paper, wepropose a Polynomial-based Compromise-Resilient En-route Filtering scheme (PCREF), which can filter false injecteddata effectively and achieve a high resilience to the number of compromised nodes without relying on static routesand node localization. Particularly, PCREF adopts polynomials instead of MACs (Message Authentication Codes) forendorsing measurement reports to achieve the resilience to attacks. Each node stores two types of polynomials:authentication polynomial and check polynomial, derived from the primitive polynomial, and used for endorsing andverifying the measurement reports. Via extensive theoretical analysis and experiments, our data show that PCREFachieves better filtering capacity and resilience to the large number of compromised nodes in comparison to theexisting schemes.

top related