Security Framework for Opportunistic Networks

被引:7
|
作者
Kumar, Prashant [1 ]
Chauhan, Naveen [1 ]
Chand, Narottam [1 ]
机构
[1] Natl Inst Technol Hamirpur, Hamirpur, India
来源
PROGRESS IN INTELLIGENT COMPUTING TECHNIQUES: THEORY, PRACTICE, AND APPLICATIONS, VOL 2 | 2018年 / 719卷
关键词
Opportunistic networks; Security; Privacy; Security framework; Delay tolerant networks; Trust management;
D O I
10.1007/978-981-10-3376-6_50
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Opportunistic Networks have evolved as special class of mobile ad hoc and delay tolerant networks which have a vast range of applications. In opportunistic networks, the permanent links among the nodes are absent and delay is high. Due to self-organized nature of opportunistic networks, these networks have many security threats, e.g, how to protect the data confidentiality, integrity, privacy as well as the trust among the nodes. In this article, we present the specific security challenges to opportunistic networks and analyze related security requirement. Based on these discussions, we propose a general security framework for opportunistic networks and point out the future research direction in opportunistic networks.
引用
收藏
页码:465 / 471
页数:7
相关论文
共 50 条
  • [21] A trust-based framework for data forwarding in opportunistic networks
    Li, Na
    Das, Sajal K.
    AD HOC NETWORKS, 2013, 11 (04) : 1497 - 1509
  • [22] A security and trust framework for virtualized networks and software-defined networking
    Yan, Zheng
    Zhang, Peng
    Vasilakos, Athanasios V.
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3059 - 3069
  • [23] Efficient Geocasting in Opportunistic Networks
    Rajaei, Aydin
    Chalmers, Dan
    Wakeman, Ian
    Parisis, George
    COMPUTER COMMUNICATIONS, 2018, 127 : 105 - 121
  • [24] Information assurance security framework for enterprise networks
    Kesari, MD
    Velayutham, T
    Sudarsan, SD
    Jagadhane, M
    Sailaja, U
    SAM '05: Proceedings of the 2005 International Conference on Security and Management, 2005, : 180 - 184
  • [25] A DIAMETER Based Security Framework for Mobile Networks
    Tran Quang Thanh
    Rebahi, Yacine
    Magedanz, Thomas
    2014 INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND MULTIMEDIA (TEMU), 2014, : 7 - 12
  • [26] A content-centric framework for effective data dissemination in opportunistic networks
    Chen, Ling-Jyh
    Yu, Chen-Hung
    Tseng, Cheng-Long
    Chu, Hao-hua
    Chou, Cheng-Fu
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2008, 26 (05) : 761 - 772
  • [27] SecOMN: Improved Security Approach for Opportunistic Mobile Networks Using Cyber Foraging
    Padhi, Swastik
    Tiwary, Mayank
    Priyadarshini, Rojalina
    Panigrahi, Chhabi Rani
    Misra, Rachita
    2016 3RD INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN INFORMATION TECHNOLOGY (RAIT), 2016, : 415 - 421
  • [28] From Opportunistic Networks to Opportunistic Computing
    Conti, Marco
    Giordano, Silvia
    May, Martin
    Passarella, Andrea
    IEEE COMMUNICATIONS MAGAZINE, 2010, 48 (09) : 126 - 139
  • [29] DiTON: Distributed transactions in opportunistic networks
    Eary, Chance
    Kumar, Mohan
    Zaruba, Gergely
    COMPUTER COMMUNICATIONS, 2017, 109 : 176 - 183
  • [30] A Security Framework for Wireless Sensor Networks: Theory and Practice
    Guyeux, Christophe
    Makhoul, Abdallah
    Bahi, Jacques M.
    2014 IEEE 23RD INTERNATIONAL WETICE CONFERENCE (WETICE), 2014, : 269 - 274