Risk Assessment Based on User's Viewpoint for Mobile Ad Hoc Network

被引:2
|
作者
Tanimoto, Shigeaki [1 ]
Shiraki, Shunsuke [1 ]
Iwashita, Motoi [1 ]
Kobayashi, Tohru [2 ]
Sato, Hiroyuki [3 ]
Kanai, Atsushi [4 ]
机构
[1] Chiba Inst Technol, Fac Social Syst Sci, Chiba, Japan
[2] Nagasaki Univ, Sch Engn, Nagasaki, Japan
[3] Univ Tokyo, Ctr Informat Technol, Tokyo, Japan
[4] Hosei Univ, Fac Sci & Engn, Tokyo, Japan
来源
PROCEEDINGS OF 2016 19TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS) | 2016年
关键词
Mobile Ad Hoc Network; User's Viewpoint; Risk Matrix; Risk Assessment;
D O I
10.1109/NBiS.2016.30
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Temporary communications networks need to established during a disaster, such as an earthquake. Thus, ad hoc networks have been attracting attention, particularly use of a mobile or smart phone for a mobile ad hoc network. However, a mobile or smart phone contains much personal information, a list of telephone numbers, etc. Therefore, security of a mobile ad hoc network must be investigated. This paper describes the risk assessment supposing the case where a mobile or smart phone is used for an ad hoc network. Thus, the risk factor of the mobile ad hoc network on the mobile or smart phone is extracted and analyzed, and future proposed measures are clarified. This contributes to achieving a mobile ad hoc network that is safe and secure from a user's viewpoint.
引用
收藏
页码:280 / 285
页数:6
相关论文
共 50 条
  • [1] A Projection Pursuit Based Risk Assessment Method in Mobile Ad hoc Networks
    Cai, Fu
    Ming, Liu
    Jing, Chen
    Li, Zhang
    Liu, Xiao-Yang
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2011, 4 (05): : 749 - 758
  • [2] A Projection Pursuit Based Risk Assessment Method in Mobile Ad hoc Networks
    Cai F.
    Ming L.
    Jing C.
    Li Z.
    Liu X.-Y.
    International Journal of Computational Intelligence Systems, 2011, 4 (5) : 749 - 758
  • [3] Risk based authorisation for Mobile ad hoc networks
    Tuptuk, Nilufer
    Lupu, Emil
    INTER-DOMAIN MANAGEMENT, PROCEEDINGS, 2007, 4543 : 188 - +
  • [4] Energy Control based Routing for Mobile Ad hoc Network
    Wang, Yu
    2009 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2009, : 59 - 62
  • [5] Research on Ad Hoc Network Security Risk Assessment Method
    Lei, Xiaolong
    Ma, Tao
    Niu, Zhao
    Ma, Chunlai
    Shan, Hong
    PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 2272 - 2279
  • [6] Reliability Analysis of Mobile Ad Hoc Network
    Singh, Moirangthem Marjit
    Mandal, Jyotsana Kumar
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 161 - 164
  • [7] Multipath Routing for Mobile Ad Hoc Network
    Qin, Fujian
    Liu, Youyuan
    ISIP: 2009 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING, PROCEEDINGS, 2009, : 237 - 240
  • [8] A Novel Clustering Algorithm based on GPS of the Mobile Ad Hoc Network
    Liu Jiancai
    Hai Xiao
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 2973 - 2976
  • [9] Wi-Fi Direct Based Mobile Ad hoc Network
    Lee, Jae Hyeck
    Park, Myong-Soon
    Shah, Sayed Chhattan
    2017 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS2017), 2017, : 116 - 120
  • [10] A Secure Mobile Ad hoc Network Based on Distributed Certificate Authority
    Seyed Amin Hosseini Seno
    Rahmat Budiarto
    Tat-Chee Wan
    Arabian Journal for Science and Engineering, 2011, 36 : 245 - 257