-
An Incentive Security Model to Provide Fairness for Peer-to-Peer Networks
Authors:
Samaneh Berenjian,
Saeed Hajizadeh,
Reza Ebrahimi Atani
Abstract:
Peer-to-Peer networks are designed to rely on resources of their own users. Therefore, resource management plays an important role in P2P protocols. Therefore, resource management plays an important role in P2P protocols. Early P2P networks did not use proper mechanisms to manage fairness. However, after seeing difficulties and rise of freeloaders in networks like Gnutella, the importance of provi…
▽ More
Peer-to-Peer networks are designed to rely on resources of their own users. Therefore, resource management plays an important role in P2P protocols. Therefore, resource management plays an important role in P2P protocols. Early P2P networks did not use proper mechanisms to manage fairness. However, after seeing difficulties and rise of freeloaders in networks like Gnutella, the importance of providing fairness for users have become apparent. In this paper, we propose an incentive based security model which leads to a network infrastructure that lightens the work of Seeders and makes Leechers to contribute more. This method is able to prevent betrayals in Leecher-to-Leecher transactions and more importantly, helps Seeders to be treated more fairly. This is what other incentive methods such as Bittorrent are incapable of doing. Additionally, by getting help from cryptography and combining it with our method, it is also possible to achieve secure channels, immune to spying, next to a fair network. The simulation results clearly show that how our proposed approach can overcome free-riding issue. In addition, our findings revealed that our approach is able to provide an appropriate level of fairness for the users and can decrease the download time.
△ Less
Submitted 27 June, 2019; v1 submitted 21 June, 2019;
originally announced June 2019.
-
A Wireless Sensor Network based approach to monitor and control air Pollution in large urban areas
Authors:
Seyed Pourya Miralavy,
Reza Ebrahimi Atani,
Navid Khoshrouz
Abstract:
Air pollution is a major concern in large urban areas. Various studies have been made to monitor and control the pollution level emitted by the vehicles but some main factors like ease of implementation or feasibility of the proposed approaches are not focused in the told studies. In this paper we propose a wireless sensor network solution to monitor vehicles exhaust systems pollution emission. Fu…
▽ More
Air pollution is a major concern in large urban areas. Various studies have been made to monitor and control the pollution level emitted by the vehicles but some main factors like ease of implementation or feasibility of the proposed approaches are not focused in the told studies. In this paper we propose a wireless sensor network solution to monitor vehicles exhaust systems pollution emission. Furthermore, we evaluate the feasibility of our proposed approach with respect to energy consumption and network lifetime by means of simulation. Our results indicate that our proposed scheme is practical for implementation using well known MAC layer protocols.
△ Less
Submitted 29 January, 2019;
originally announced February 2019.
-
An Analytical Perspective to Traffic Engineering in Anonymous Communication Systems
Authors:
Mehran Alidoost Nia,
Eduard Babulak,
Benjamin Fabian,
Reza Ebrahimi Atani
Abstract:
Anonymous communication systems (ACS) offer privacy and anonymity through the Internet. They are mostly free tools and are popular among users all over the world. In the recent years, anonymity applications faced many problems regarding traffic engineering methods. Even though they ensure privacy under some conditions, their anonymity will be endangered by high performance processing units. To add…
▽ More
Anonymous communication systems (ACS) offer privacy and anonymity through the Internet. They are mostly free tools and are popular among users all over the world. In the recent years, anonymity applications faced many problems regarding traffic engineering methods. Even though they ensure privacy under some conditions, their anonymity will be endangered by high performance processing units. To address these issues, this study is devoted to investigating traffic-engineering methods in anonymous communication systems, and proposes an analytical view of the current issues in ACS privacy and anonymity. Our study also indicates new types of solutions for these current issues with ACS.
△ Less
Submitted 20 December, 2017;
originally announced December 2017.
-
A Survey of Credit Card Fraud Detection Techniques: Data and Technique Oriented Perspective
Authors:
SamanehSorournejad,
Zahra Zojaji,
Reza Ebrahimi Atani,
Amir Hassan Monadjemi
Abstract:
Credit card plays a very important rule in today's economy. It becomes an unavoidable part of household, business and global activities. Although using credit cards provides enormous benefits when used carefully and responsibly,significant credit and financial damages may be caused by fraudulent activities. Many techniques have been proposed to confront the growth in credit card fraud. However, al…
▽ More
Credit card plays a very important rule in today's economy. It becomes an unavoidable part of household, business and global activities. Although using credit cards provides enormous benefits when used carefully and responsibly,significant credit and financial damages may be caused by fraudulent activities. Many techniques have been proposed to confront the growth in credit card fraud. However, all of these techniques have the same goal of avoiding the credit card fraud; each one has its own drawbacks, advantages and characteristics. In this paper, after investigating difficulties of credit card fraud detection, we seek to review the state of the art in credit card fraud detection techniques, data sets and evaluation criteria.The advantages and disadvantages of fraud detection methods are enumerated and compared.Furthermore, a classification of mentioned techniques into two main fraud detection approaches, namely, misuses (supervised) and anomaly detection (unsupervised) is presented. Again, a classification of techniques is proposed based on capability to process the numerical and categorical data sets. Different data sets used in literature are then described and grouped into real and synthesized data and the effective and common attributes are extracted for further usage.Moreover, evaluation employed criterions in literature are collected and discussed.Consequently, open issues for credit card fraud detection are explained as guidelines for new researchers.
△ Less
Submitted 19 November, 2016;
originally announced November 2016.
-
Light Weight Implementation of Stream Ciphers for M-Commerce Applications
Authors:
Mona Pourghasem,
Elham Ghare Sheikhloo,
Reza Ebrahimi Atani
Abstract:
In today's world the use of computer and telecommunications networking is essential for human life. Among these, mobile tools and devices due to availability, have found a special impact on everyone life. This feature addition to providing sample facilities such as financial transactions at any place and time has raised the Sensitivities about security of these devices. In order to provide securit…
▽ More
In today's world the use of computer and telecommunications networking is essential for human life. Among these, mobile tools and devices due to availability, have found a special impact on everyone life. This feature addition to providing sample facilities such as financial transactions at any place and time has raised the Sensitivities about security of these devices. In order to provide security, numerous techniques have been proposed which due to the limitations of mobile devices; an algorithm should be taken that have the ability to function for light weight ubiquitous computing. In this paper, four eSTREAM candidates from software profile were taken into account and analyzed and implemented by using J2ME technology. Then these algorithms were implemented on a variety of mobile phones and are compared with each other in terms of execution time and finally the obtained Results are expressed.
△ Less
Submitted 20 March, 2014;
originally announced April 2014.
-
A Novel Anonymous Cloud Architecture Design; Providing Secure Online Services and Electronic Payments
Authors:
Mehran Alidoost Nia,
Aida Ghorbani,
Reza Ebrahimi Atani
Abstract:
Anonymous cloud architecture provides secure environment for business and also e-commerce approaches. By using this type of architecture, we can propose anonymous online applications. Customers who need secure and reliable online services should pay for provided services. A big problem is electronic payment that is needed for billing customers. But customer identity should be remained anonymous du…
▽ More
Anonymous cloud architecture provides secure environment for business and also e-commerce approaches. By using this type of architecture, we can propose anonymous online applications. Customers who need secure and reliable online services should pay for provided services. A big problem is electronic payment that is needed for billing customers. But customer identity should be remained anonymous during and also after payment procedure. In this paper we propose a novel and modified anonymous architecture that ensures customers that hide their identity from others. This architecture is used from common network protocols and we eliminate Tor anonymous service from architecture design space because of independency. The here is introduced scalability parameter in anonymous cloud architecture design space. After all we compare proposed architecture with other popular cloud architectures in this range and we obtain its advantages according to efficiency, security and anonymity.
△ Less
Submitted 8 April, 2014;
originally announced April 2014.
-
A novel datatype architecture support for programming languages
Authors:
Mehran Alidoost Nia,
Reza Ebrahimi Atani
Abstract:
In programmers point of view, Datatypes in programming language level have a simple description but inside hardware, huge machine codes are responsible to describe type features. Datatype architecture design is a novel approach to match programming features along with hardware design. In this paper a novel Data type-Based Code Reducer (TYPELINE) architecture is proposed and implemented according t…
▽ More
In programmers point of view, Datatypes in programming language level have a simple description but inside hardware, huge machine codes are responsible to describe type features. Datatype architecture design is a novel approach to match programming features along with hardware design. In this paper a novel Data type-Based Code Reducer (TYPELINE) architecture is proposed and implemented according to significant data types (SDT) of programming languages. TYPELINE uses TEUs for processing various SDT operations. This architecture design leads to reducing the number of machine codes, and increases execution speed, and also improves some parallelism level. This is because this architecture supports some operation for the execution of Abstract Data Types in parallel. Also it ensures to maintain data type features and entire application level specifications using the proposed type conversion unit. This framework includes compiler level identifying execution modes and memory management unit for decreasing object read/write in heap memory by ISA support. This energy-efficient architecture is completely compatible with object oriented programming languages and in combination mode it can process complex C++ data structures with respect to parallel TYPELINE architecture support.
△ Less
Submitted 1 February, 2014;
originally announced February 2014.