Security Framework for Opportunistic Networks

被引:7
|
作者
Kumar, Prashant [1 ]
Chauhan, Naveen [1 ]
Chand, Narottam [1 ]
机构
[1] Natl Inst Technol Hamirpur, Hamirpur, India
来源
PROGRESS IN INTELLIGENT COMPUTING TECHNIQUES: THEORY, PRACTICE, AND APPLICATIONS, VOL 2 | 2018年 / 719卷
关键词
Opportunistic networks; Security; Privacy; Security framework; Delay tolerant networks; Trust management;
D O I
10.1007/978-981-10-3376-6_50
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Opportunistic Networks have evolved as special class of mobile ad hoc and delay tolerant networks which have a vast range of applications. In opportunistic networks, the permanent links among the nodes are absent and delay is high. Due to self-organized nature of opportunistic networks, these networks have many security threats, e.g, how to protect the data confidentiality, integrity, privacy as well as the trust among the nodes. In this article, we present the specific security challenges to opportunistic networks and analyze related security requirement. Based on these discussions, we propose a general security framework for opportunistic networks and point out the future research direction in opportunistic networks.
引用
收藏
页码:465 / 471
页数:7
相关论文
共 50 条
  • [1] SF-APP: A Secure Framework for Authentication and Privacy Preservation in Opportunistic Networks
    Kumar, Prashant
    Chauhan, Naveen
    Chand, Narottam
    Awasthi, Lalit K.
    INTERNATIONAL JOURNAL OF WEB SERVICES RESEARCH, 2018, 15 (02) : 47 - 66
  • [2] Security and trust management in opportunistic networks: a survey
    Wu, Yue
    Zhao, Yimeng
    Riguidel, Michel
    Wang, Guanghao
    Yi, Ping
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (09) : 1812 - 1827
  • [3] Authentication with Privacy Preservation in Opportunistic Networks
    Kumar, Prashant
    Chauhan, Naveen
    Chand, Narottam
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2017, : 183 - 188
  • [4] Security and Trust in Opportunistic Networks - A Survey
    Alajeely, Majeed
    Doss, Robin
    Ahmad, Asma'a
    IETE TECHNICAL REVIEW, 2016, 33 (03) : 256 - 268
  • [5] Enhancement of Security in Opportunistic Networks
    Mathur, Mansi
    Verma, Jyoti
    Poonam
    ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2023, PT I, 2024, 2090 : 27 - 43
  • [6] Security-oriented opportunistic data forwarding in Mobile Social Networks
    Wu, Dapeng
    Zhang, Feng
    Wang, Honggang
    Wang, Ruyan
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 87 : 803 - 815
  • [7] A framework for the evaluation of routing protocols in opportunistic networks
    Akestoridis, Dimitrios-Georgios
    Papapetrou, Evangelos
    COMPUTER COMMUNICATIONS, 2019, 145 : 14 - 28
  • [8] Authentication using Trust Framework in Opportunistic Networks
    Singh, Umesh Pal
    Chauhan, Naveen
    2017 8TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2017,
  • [9] A Framework for WSN-based Opportunistic Networks
    Fu, Xiuwen
    Li, Wenfeng
    Ming, Huahong
    Fortino, Giancarlo
    PROCEEDINGS OF THE 2015 IEEE 19TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2015, : 343 - 348
  • [10] On Security of Opportunistic Routing Protocol in Wireless Sensor Networks
    Sharma, Archana
    Singh, Yashwant
    PROCEEDINGS OF RECENT INNOVATIONS IN COMPUTING, ICRIC 2019, 2020, 597 : 407 - 419