1

Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking

Nowadays, mobile users have a vast number of applications and services at their disposal. Each of these might impose some privacy threats on users' "Personally Identifiable Information" (PII). Location privacy is a crucial part of PII, and as such, …

A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things

In the Internet-of-Things (IoT), users might share part of their data with different IoT prosumers, which offer applications or services. Within this open environment, the existence of an adversary introduces security risks. These can be related, for …

Cybersecurity Games and Investments: A Decision Support Approach

In this paper we investigate how to optimally invest in cybersecurity controls. We are particularly interested in examining cases where the organization suffers from an underinvestment problem or inefficient spending on cybersecurity. To this end, we …

Game Theory Meets Information Security Management

This work addresses the challenge “how do we make better security decisions?” and it develops techniques to support human decision making and algorithms which enable well-founded cyber security decisions to be made. In this paper we propose a game …

A Probabilistic Algorithm for Secret Matrix Share Size Reduction

Secret sharing is an important tool in cryptography and has many applications for wireless networks. This paper is motivated by the need for space-efficient secret sharing schemes. We first propose a simple probabilistic algorithm which can be used, …

Secure Decentralised Ubiquitous Networking for Emergency Communications

Our modern densely populated cities have created an Achilles heel for public safety services where natural or man-made disasters often result in high casualties. The 2005 London bombings have exposed the inadequacy of current First Responder (FR) …

A Case Study of Internet of Things Based on Wireless Sensor Networks and Smart Phones

In the state of the art, Internet of Things (IoT) tends to be touted as a future technology. Based on that concept and the constant development of Wireless Sensor Networks (WSNs), this paper explains and implements a case study of a converged …

ChaMeLeon (CML): A hybrid and adaptive routing protocol for Emergency Situations

This document describes the ChaMeLeon (CML) routing protocol designed for Mobile Ad hoc NETworks (MANETs) supporting emergency communications. CML is a hybrid and adaptive routing protocol operating within a defined disaster area denoted as the …

ROBUST: Reliable Overlay Based Utilisation of Services and Topology for emergency MANETs

Emergency services and networks are an emerging area of scientific research. During an emergency scenario such as forest fires, earthquakes, tsunamis and terrorist attacks rescuers need to establish communication to coordinate their actions by using …

Secure Routing for Supporting Ad-hoc Extreme Emergency Infrastructures

The importance of emergency services has lead to an indispensable need for lightweight technologies that will support emergency rescue missions. Due to their nature and the non-infrastructure characteristics Mobile Ad-hoc Networks (MANETs) are …