Search For:

Displaying 1-26 out of 26 total
Secure Synchronization of Periodic Updates in Ad Hoc Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Bogdan Carbunar, Michael Pearce, Shivajit Mohapatra, Loren J. Rittle, Venu Vasudevan, Octavian Carbunar
Issue Date:August 2010
pp. 1060-1073
We present techniques for synchronizing nodes that periodically broadcast content and presence updates to colocated nodes over an ad hoc network, where nodes may exhibit Byzantine malicious behavior. Instead of aligning duty cycles, our algorithms synchron...
 
Continuous Mobile Authentication Using Virtual Key Typing Biometrics
Found in: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Tao Feng, Xi Zhao,Bogdan Carbunar, Weidong Shi
Issue Date:July 2013
pp. 1547-1552
Due to the increasing popularity of mobile technologies, sensitive user information is often stored on mobile devices. However, the essential task of mobile user authentication is rendered more challenging by the conflicting requirements of security and us...
 
Continuous Remote Mobile Identity Management Using Biometric Integrated Touch-Display
Found in: 2012 45th Annual IEEE/ACM International Symposium on Microarchitecture Workshops (MICROW)
By Tao Feng,Ziyi Liu,Bogdan Carbunar,Dainis Boumber,Weidong Shi
Issue Date:December 2012
pp. 55-62
AbstractWhile enriching the user experiences, the developmentof mobile devices and applications introduces new securityand privacy vulnerabilities for the remote services accessed bymobile device users. A trusted and usable authentication architecturefor m...
 
You unlocked the Mt. Everest badge on foursquare! Countering location fraud in Geosocial Networks
Found in: 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS)
By Bogdan Carbunar,Rahul Potharaju
Issue Date:October 2012
pp. 182-190
GeoSocial Networks (GSNs) are online social networks centered on the location information of their users. Users “check-in” their location and use it to acquire location-based special status (e.g., badges, mayorships) and receive venue dependent rewards. Th...
 
Safe cities. A participatory sensing approach
Found in: 2012 IEEE 37th Conference on Local Computer Networks (LCN 2012)
By Jaime Ballesteros,Mahmudur Rahman,Bogdan Carbunar,Naphtali Rishe
Issue Date:October 2012
pp. 626-634
Smart cities combine technology and human resources to improve the quality of life and reduce expenditures. Ensuring the safety of city residents remains one of the open problems, as standard budgetary investments fail to decrease crime levels. This work t...
 
Toward Private Joins on Outsourced Data
Found in: IEEE Transactions on Knowledge and Data Engineering
By Bogdan Carbunar,Radu Sion
Issue Date:September 2012
pp. 1699-1710
In an outsourced database framework, clients place data management responsibilities with specialized service providers. Of essential concern in such frameworks is data privacy. Potential clients are reluctant to outsource sensitive data to a foreign party ...
 
Payments for Outsourced Computations
Found in: IEEE Transactions on Parallel and Distributed Systems
By Bogdan Carbunar,Mahesh V. Tripunitara
Issue Date:February 2012
pp. 313-320
With the recent advent of cloud computing, the concept of outsourcing computations, initiated by volunteer computing efforts, is being revamped. While the two paradigms differ in several dimensions, they also share challenges, stemming from the lack of tru...
 
JANUS: A Framework for Scalable and Secure Routing in Hybrid Wireless Networks
Found in: IEEE Transactions on Dependable and Secure Computing
By Bogdan Carbunar, Ioannis Ioannidis, Cristina Nita-Rotaru
Issue Date:October 2009
pp. 295-308
Hybrid networks consisting of cellular and Wi-Fi networks were proposed as a high-throughput architecture for cellular services. In such networks, devices equipped with cellular and Wi-Fi network cards access Internet services through the cellular base sta...
 
Verifiable Credit Based Transfers in Wireless Ad Hoc Networks
Found in: Parallel and Distributed Processing Symposium, International
By Bogdan Carbunar, Brett Lindsley, Michael Pearce, Venu Vasudevan
Issue Date:March 2007
pp. 59
Encouraging cooperation between users of mobile devices operating in ad hoc mode is a difficult task mostly because the scarce battery and bandwidth resources of devices suggest that selfish behavior may be most beneficial. The insecure usage of credits to...
 
High Throughput Routing in Hybrid Cellular and Ad-Hoc Networks
Found in: A World of Wireless, Mobile and Multimedia Networks, International Symposium on
By Ioannis Ioannidis, Bogdan Carbunar, Cristina Nita-Rotaru
Issue Date:June 2005
pp. 171-176
In this paper we present DST, a routing protocol for hybrid networks that is scalable with the network size and achieves high throughput by taking advantage of multiple channels. DST maintains a close to optimal spanning tree of the network by using distri...
 
Distributed and Dynamic Voronoi Overlays for Coverage Detection and Distributed Hash Tables in Ad-Hoc Networks
Found in: Parallel and Distributed Systems, International Conference on
By Bogdan Carbunar, Ananth Grama, Jan Vitek
Issue Date:July 2004
pp. 549
In this paper we study two important problems - coverage-boundary detection and implementing distributed has tables in ad-hoc wireless networks. These problems frequently arise in service location and relocation in wireless networks. For the centralized co...
 
Towards Safe Cities: A Mobile and Social Networking Approach
Found in: IEEE Transactions on Parallel and Distributed Systems
By Jaime Ballesteros,Bogdan Carbunar,Mahmudur Rahman,Naphtali Rishe,S. S. Iyengar
Issue Date:September 2014
pp. 2451-2462
Population density and natural and man-made disasters make public safety a concern of growing importance. In this paper we aim to enable the vision of smart and safe cities by exploiting mobile and social networking technologies to securely and privately e...
 
Private Badges for Geosocial Networks
Found in: IEEE Transactions on Mobile Computing
By Bogdan Carbunar,Radu Sion,Rahul Potharaju,Moussa Ehsan
Issue Date:July 2013
pp. 1
Geosocial networks (GSNs) extend classic online social networks with the concept of location. Users can report their presence at venues through "check-ins" and, when certain check-in sequences are satisfied, users acquire special status in the fo...
 
Yelp Events: Making Bricks Without Clay?
Found in: 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops (ICDCSW)
By Jaime Ballesteros,Bogdan Carbunar,Mahmudur Rahman,Naphtali Rishe
Issue Date:July 2013
pp. 156-161
Review based geosocial networks are online social networks centered on the location of venues and users as well as on reviews left by users for visited venues. The popularity and impact of reviews makes them an ideal tool for influencing public opinion. In...
 
Network Aware Caching for Video on Demand systems
Found in: 2012 IEEE Thirteenth International Symposium on
By Bogdan Carbunar,Rahul Potharaju,Michael Pearce,Venu Vasudevan
Issue Date:June 2012
pp. 1-9
Video on Demand (VoD) services allow users to select and locally consume remotely stored content. We investigate the use of caching to solve the scalability issues of several existing VoD providers. We propose metrics and goals that define the requirements...
   
Seeing is not believing: visual verifications through liveness analysis using mobile devices
Found in: Proceedings of the 29th Annual Computer Security Applications Conference (ACSAC '13)
By Bogdan Carbunar, Mahmudur Rahman, Umut Topkara
Issue Date:December 2013
pp. 239-248
The visual information captured with camera-equipped mobile devices has greatly appreciated in value and importance as a result of their ubiquitous and connected nature. Today, banking customers expect to be able to deposit checks using mobile devices, and...
     
Toward preserving privacy and functionality in geosocial networks
Found in: Proceedings of the 19th annual international conference on Mobile computing & networking (MobiCom '13)
By Athanasios V. Vasilakos, Bogdan Carbunar, Jaime Ballesteros, Mahmudur Rahman, Naphtali Rishe
Issue Date:September 2013
pp. 207-210
In this paper, we consider an environment in which computational offoading is adopted amongst mobile devices. We call such an environment a mobile device cloud (MDC). In this work, we highlight via emulation, experimenation and real measurements, the poten...
     
A framework for network aware caching for video on demand systems
Found in: ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
By Bogdan Carbunar, Michael Needham, Michael Pearce, Rahul Potharaju, Venugopal Vasudevan
Issue Date:August 2013
pp. 1-22
Video on Demand (VoD) services allow users to select and locally consume remotely stored content. We investigate the use of caching to solve the scalability issues of several existing VoD providers. We propose metrics and goals that define the requirements...
     
Private location centric profiles for GeoSocial networks
Found in: Proceedings of the 20th International Conference on Advances in Geographic Information Systems (SIGSPATIAL '12)
By Bogdan Carbunar, Jaime Ballesteros, Mahmudur Rahman, Naphtali Rishe
Issue Date:November 2012
pp. 458-461
Providing input to targeted advertising, profiling social network users is an important source of revenue for geosocial networks. Since profiles contain personal information, their construction introduces a trade-off between user privacy and incentives of ...
     
Private geosocial networking
Found in: Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (GIS '11)
By Bogdan Carbunar, Radu Sion
Issue Date:November 2011
pp. 365-368
Location based social or geosocial networks (GSNs) have recently emerged as a natural combination of location based services with online social networks: users register their location and activities, share it with friends and achieve special status (e.g., ...
     
iFriendU: leveraging 3-cliques to enhance infiltration attacks in online social networks
Found in: Proceedings of the 17th ACM conference on Computer and communications security (CCS '10)
By Bogdan Carbunar, Cristina Nita-Rotaru, Rahul Potharaju
Issue Date:October 2010
pp. 723-725
Online Social Networks (OSNs) such as Facebook have become ubiquitous in the past few years, counting hundreds of millions of people as members. OSNs allow users to form friendship relationships, join groups, communicate and share information with friends....
     
Query privacy in wireless sensor networks
Found in: ACM Transactions on Sensor Networks (TOSN)
By Bogdan Carbunar, Michael Pearce, Venu Vasudevan, Weidong Shi, Yang Yu
Issue Date:February 2010
pp. 1-34
Existing mechanisms for querying wireless sensor networks leak client interests to the servers performing the queries. The leaks are not only in terms of specific regions of interest but also of client access patterns. In this article we introduce the prob...
     
XPay: practical anonymous payments for tor routing and other networked services
Found in: Proceedings of the 8th ACM workshop on Privacy in the electronic society (WPES '09)
By Bogdan Carbunar, Radu Sion, Yao Chen
Issue Date:November 2009
pp. 41-50
We design and analyze the first practical anonymous payment mechanisms for network services. We start by reporting on our experience with the implementation of a routing micropayment solution for Tor. We then propose micropayment protocols of increasingly ...
     
Efficient access enforcement in distributed role-based access control (RBAC) deployments
Found in: Proceedings of the 14th ACM symposium on Access control models and technologies (SACMAT '09)
By Bogdan Carbunar, Mahesh V. Tripunitara
Issue Date:June 2009
pp. 1-22
We address the distributed setting for enforcement of a centralized Role-Based Access Control (RBAC) protection state. We present a new approach for time- and space-efficient access enforcement. Underlying our approach is a data structure that we call a ca...
     
Building castles out of mud: practical access pattern privacy and correctness on untrusted storage
Found in: Proceedings of the 15th ACM conference on Computer and communications security (CCS '08)
By Bogdan Carbunar, Peter Williams, Radu Sion
Issue Date:October 2008
pp. 79-79
We introduce a new practical mechanism for remote data storage with efficient access pattern privacy and correctness. A storage client can deploy this mechanism to issue encrypted reads, writes, and inserts to a potentially curious and malicious storage se...
     
JANUS: towards robust and malicious resilient routing in hybrid wireless networks
Found in: Proceedings of the 2004 ACM workshop on Wireless security (WiSe '04)
By Bogdan Carbunar, Cristina Nita-Rotaru, Ioanis Ioannidis
Issue Date:October 2004
pp. 11-20
In this paper we investigate and provide solutions for security threats in the context of hybrid networks consisting of a cellular base station and mobile devices equipped with dual cellular and ad-hoc (802.11b) cards. The cellular connection is used for r...
     
 1