Risk Assessment Based on User's Viewpoint for Mobile Ad Hoc Network

被引:2
|
作者
Tanimoto, Shigeaki [1 ]
Shiraki, Shunsuke [1 ]
Iwashita, Motoi [1 ]
Kobayashi, Tohru [2 ]
Sato, Hiroyuki [3 ]
Kanai, Atsushi [4 ]
机构
[1] Chiba Inst Technol, Fac Social Syst Sci, Chiba, Japan
[2] Nagasaki Univ, Sch Engn, Nagasaki, Japan
[3] Univ Tokyo, Ctr Informat Technol, Tokyo, Japan
[4] Hosei Univ, Fac Sci & Engn, Tokyo, Japan
来源
PROCEEDINGS OF 2016 19TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS) | 2016年
关键词
Mobile Ad Hoc Network; User's Viewpoint; Risk Matrix; Risk Assessment;
D O I
10.1109/NBiS.2016.30
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Temporary communications networks need to established during a disaster, such as an earthquake. Thus, ad hoc networks have been attracting attention, particularly use of a mobile or smart phone for a mobile ad hoc network. However, a mobile or smart phone contains much personal information, a list of telephone numbers, etc. Therefore, security of a mobile ad hoc network must be investigated. This paper describes the risk assessment supposing the case where a mobile or smart phone is used for an ad hoc network. Thus, the risk factor of the mobile ad hoc network on the mobile or smart phone is extracted and analyzed, and future proposed measures are clarified. This contributes to achieving a mobile ad hoc network that is safe and secure from a user's viewpoint.
引用
收藏
页码:280 / 285
页数:6
相关论文
共 50 条
  • [41] A measure of mobility for evaluating mobile ad hoc network performance
    He, Linna
    Yin, Wei
    2008 INTERNATIONAL CONFERENCE ON MICROWAVE AND MILLIMETER WAVE TECHNOLOGY PROCEEDINGS, VOLS 1-4, 2008, : 1528 - 1531
  • [42] A Secure Path Selection Scheme for Mobile Ad Hoc Network
    Sachin D. Ubarhande
    Dharmpal D. Doye
    Prakash S. Nalwade
    Wireless Personal Communications, 2017, 97 : 2087 - 2096
  • [43] Detecting and preventing selfish behaviour in mobile ad hoc network
    Tao Lei
    Shangguang Wang
    Jinlin Li
    Ilsun You
    Fangchun Yang
    The Journal of Supercomputing, 2016, 72 : 3156 - 3168
  • [44] Transmission power control in the mobile ad hoc network systems
    Honda, Hirotada
    2006 SICE-ICASE INTERNATIONAL JOINT CONFERENCE, VOLS 1-13, 2006, : 368 - 372
  • [45] PKIM:: A public key infrastructure for Mobile ad hoc network
    Miao, FY
    Xiong, Y
    Yang, SB
    Wang, XF
    CHINESE JOURNAL OF ELECTRONICS, 2005, 14 (04): : 594 - 598
  • [46] A Risk Assessment Method Based on Grey Relational Projection in Ad Hoc Networks
    Fu Cai
    Huang Chu
    Zhang Yunhe
    Han LanSheng
    Peng Bing
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 370 - 373
  • [47] An investigation of machine learning-based intrusion detection system in mobile ad hoc network
    Singh, C. Edwin
    Vigila, S. Maria Celestin
    INTERNATIONAL JOURNAL OF INTELLIGENT ENGINEERING INFORMATICS, 2023, 11 (01) : 54 - 70
  • [48] A Novel Verifiable Threshold Signature Scheme Based on Bilinear Pairing in Mobile Ad Hoc Network
    Meng, Xianyong
    Li, Yangmin
    PROCEEDING OF THE IEEE INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION, 2012, : 361 - 366
  • [49] QoS-Aware Directional Flooding Based on Redundant Route for Mobile Ad Hoc Network
    Wu, Yanling
    Li, Ming
    Ao, Xi
    JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (03): : 677 - 684
  • [50] A time stamp-based algorithm to improve security and performance of mobile ad hoc network
    Ubarhande, S. D.
    Doye, D. D.
    Nalwade, P. S.
    WIRELESS NETWORKS, 2019, 25 (04) : 1867 - 1874