We investigate the data collection problem in sensor networks. The network consists of a number of stationary sensors deployed at different sites for sensing and storing data locally. A mobile element moves from sites to sites to collect data from the sensors periodically. There are different costs associated with the...
The communication in MLS cross-domain environments faces many challenges. The three most important challenges are efficient key management, privacy preserving and covert channel. We propose an Efficient, Secure and Covert Channel Capacity Bounded Protocol which has three algorithms that addresses these challenges: The Efficient Attribute-based Fine-Grained Authentication (EAFA) algorithm, Anonymous...
Markov Decision Process (MDP) is a well-known framework for devising the optimal decision making strategies under uncertainty. Typically, the decision maker assumes a stationary environment which is characterized by a time-invariant transition probability matrix. However, in many real-world scenarios, this assumption is not justified, thus the optimal strategy might not...
Recent advances in wireless technologies have helped the proliferation of wireless devices, ranging from hand-held devices such as cellular phones to more powerful mobile computing platforms as such laptops [1]. Along with that, the end users’
applications running on these devices, ranging from text message to multimedia applications such as...
Due to the limitation of the radio frequency (RF) spectrum, it is increasingly more difficult to support billions of wireless devices in the age of Internet-of-Things. Consequently, many recent wireless indoor communication systems have been developed using free space optical (FSO) communication technologies that exploit the extremely large light spectrum...
This project aims to study the performance of Secure Sockets Layer (SSL) Protocol implemented in JAVA for web applications. Secure Sockets Layer protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. In particular, this project focuses on an implementation of...
We studied the problem of resource allocation in large scale distributed applications such as Online Social Networks (OSN) and Cloud Computing. In such settings, resource allocation schemes need to efficient as well as adaptive to the time-varying environments. The abstract resource allocation problem concerns with how to optimally use resources...
Efficient routing of information packets in dynamically changing communication networks requires routing policies that adapt to changes in load levels, traffic patterns and network topologies. Reinforcement Learning (RL) is an area of artificial intelligence that studies algorithms that dynamically optimize their performance based on experience in an environment. RL, thus,...
One of the most important problems facing any distributed application over a heterogeneous network is the protection of private
sensitive information in local terminals. A subfield of cryptography called secure multiparty computation (SMC) is the study
of such distributed computation protocols that allow distrusted parties to perform joint computation without...
Limited bandwidth and high packet loss rate pose a serious challenge for video streaming applications over wireless networks. Even when packet loss is not present, the bandwidth fluctuation as a result of an arbitrary number of active flows in an IEEE 802.11 network, can significantly degrade the video quality. This...