Risk Assessment Based on User's Viewpoint for Mobile Ad Hoc Network

被引:2
|
作者
Tanimoto, Shigeaki [1 ]
Shiraki, Shunsuke [1 ]
Iwashita, Motoi [1 ]
Kobayashi, Tohru [2 ]
Sato, Hiroyuki [3 ]
Kanai, Atsushi [4 ]
机构
[1] Chiba Inst Technol, Fac Social Syst Sci, Chiba, Japan
[2] Nagasaki Univ, Sch Engn, Nagasaki, Japan
[3] Univ Tokyo, Ctr Informat Technol, Tokyo, Japan
[4] Hosei Univ, Fac Sci & Engn, Tokyo, Japan
来源
PROCEEDINGS OF 2016 19TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS) | 2016年
关键词
Mobile Ad Hoc Network; User's Viewpoint; Risk Matrix; Risk Assessment;
D O I
10.1109/NBiS.2016.30
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Temporary communications networks need to established during a disaster, such as an earthquake. Thus, ad hoc networks have been attracting attention, particularly use of a mobile or smart phone for a mobile ad hoc network. However, a mobile or smart phone contains much personal information, a list of telephone numbers, etc. Therefore, security of a mobile ad hoc network must be investigated. This paper describes the risk assessment supposing the case where a mobile or smart phone is used for an ad hoc network. Thus, the risk factor of the mobile ad hoc network on the mobile or smart phone is extracted and analyzed, and future proposed measures are clarified. This contributes to achieving a mobile ad hoc network that is safe and secure from a user's viewpoint.
引用
收藏
页码:280 / 285
页数:6
相关论文
共 50 条
  • [31] Routing Optimizing Algorithm of Mobile Ad-Hoc Network Based on Genetic Algorithm
    Wu Xiao-Yan
    Liu Yang
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON COMMUNICATION, ELECTRONICS AND AUTOMATION ENGINEERING, 2013, 181 : 1205 - 1211
  • [32] Swarm based reliable and power efficient multicast routing in mobile ad hoc network
    Sabari A.
    Duraiswamy K.
    Information Technology Journal, 2010, 9 (07) : 1383 - 1389
  • [33] AN IMPROVED WEIGHTED CLUSTERING ALGORITHM FOR MOBILE AD HOC NETWORK
    Li, Jingxia
    Qu, Zhaowei
    CIICT 2008: PROCEEDINGS OF CHINA-IRELAND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATIONS TECHNOLOGIES 2008, 2008, : 484 - 488
  • [34] Detecting and preventing selfish behaviour in mobile ad hoc network
    Lei, Tao
    Wang, Shangguang
    Li, Jinlin
    You, Ilsun
    Yang, Fangchun
    JOURNAL OF SUPERCOMPUTING, 2016, 72 (08): : 3156 - 3168
  • [35] A Secure Path Selection Scheme for Mobile Ad Hoc Network
    Ubarhande, Sachin D.
    Doye, Dharmpal D.
    Nalwade, Prakash S.
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (02) : 2087 - 2096
  • [36] Genetic Algorithm Routing Protocol for Mobile Ad Hoc Network
    Alsaqour, Raed
    Kamal, Saif
    Abdelhaq, Maha
    Al Jeroudi, Yazan
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (01): : 941 - 960
  • [37] Evaluation on the factors that influence performance of mobile Ad Hoc network
    Su, Yudan
    2008 ANNUAL IEEE STUDENT PAPER CONFERENCE, 2008, : 149 - 153
  • [38] ARDSR: An anycast routing protocol for mobile ad hoc network
    Peng, GG
    Yang, HH
    Gao, CS
    PROCEEDINGS OF THE IEEE 6TH CIRCUITS AND SYSTEMS SYMPOSIUM ON EMERGING TECHNOLOGIES: FRONTIERS OF MOBILE AND WIRELESS COMMUNICATION, VOLS 1 AND 2, 2004, : 505 - 508
  • [39] Research and implementation of mobile ad hoc network emulation system
    Liu, WG
    Song, HT
    22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOP, PROCEEDINGS, 2002, : 749 - 754
  • [40] An Effective Routing Reliability Model for Mobile Ad Hoc Network
    Qin Danyang
    Ma Lin
    Wang Huihui
    Sha Xuejun
    Xu Yubin
    2009 FIRST INTERNATIONAL CONFERENCE ON FUTURE INFORMATION NETWORKS, 2009, : 173 - 177