Opportunistic Sensor Networks: A Survey on Privacy and Secure Routing

被引:0
作者
Arafath, Mohammed Salman [1 ]
Khan, Khaleel Ur Rahman [2 ]
机构
[1] Jawaharlal Nehru Technol Univ Hyderabad, Dept CSE, Hyderabad, Telengana, India
[2] ACE Coll Engn, Dept CSE, Hyderabad, Telengana, India
来源
2017 2ND INTERNATIONAL CONFERENCE ON ANTI-CYBER CRIMES (ICACC) | 2017年
关键词
Oppnets; OSN; Intruder; Opportunistic Sensor Network; Oppnet; Wireless Sensor Network; Ad-hoc Sensor Network; Secure Routing;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the advancement of mobile devices, a new paradigm called opportunistic sensor networks emerges which has a lot of applications, such as Military surveillance, disaster relief, search and rescue, vehicle tracking and much more. Opportunistic Sensor Network (OSN) has become one of the actively researched areas motivating researchers to come up with routing strategies and securing the routing with different lightweight techniques. In this paper, the focus is mainly on security and privacy mechanisms in opportunistic sensor networks keeping Military as a viewpoint. This paper is a pioneer attempt to classify most of the existing protocols in OSN also discusses the security requirements, threats, challenges and constraints posed by the opportunistic sensor network due to its intermittent, infrastructure-based or infrastructure-less nature. It also presents a clear distinction between Infrastructure-based and Infrastructure-less types of routing followed by a various technique. Finally, it concludes with the discussion of most of the algorithms used to achieve privacy and security in an opportunistic sensor network with suitable security achievements and security concerns.
引用
收藏
页码:41 / 46
页数:6
相关论文
共 46 条
[1]  
Abraham D., 2001, P AMCIS 2001
[2]  
Anastasi G, 2009, ELECTR ENG APPL SIGN, P389
[3]  
[Anonymous], AD HOC SENSOR NETWOR
[4]  
[Anonymous], 2000, CS200006 DUK U DEP C
[5]   Power aware design of an elliptic curve coprocessor for 8 bit platforms [J].
Bertoni, G ;
Breveglieri, L ;
Venturi, M .
FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2006, :337-+
[6]   Decentralized trust management [J].
Blaze, M ;
Feigenbaum, J ;
Lacy, J .
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, :164-173
[7]  
BONEH D, 2001, CRYPTO
[8]  
Bouam S, 2003, PIMRC 2003: 14TH IEEE 2003 INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS PROCEEDINGS, VOLS 1-3 2003, P1331
[9]  
Chu Y.-H., 1997, WORLD WIDE WEB J, V2, P127
[10]  
Costantino G, 2012, IEEE WCNC