Security Inopportunistic Networks

作者: Chen Xi , Li Guangsong , Tian Youliang , Ma Jianfeng

DOI: 10.1109/ICICEE.2012.533

关键词:

摘要: Opportunistic Networks is an evolution of delay-tolerant networks and mobile ad-hoc which has a widespread uses in both civilian military. However, the security problems opportunistic are increasingly serious due to its natural characteristics extreme intermittent self-organized. In this paper, we present key issues challenges at different network layers. Then analyze related schemes including management, routing, privacy trust management. Based on these discussions, finally point out potential future research directions networks.

参考文章(22)
Christophe Diot, Jon Crowcroft, Pan Hui, James Scott, Haggle: A networking architecture designed around mobile users wireless on demand network systems and service. pp. 78- 86 ,(2006)
Adi Shamir, Identity-based cryptosystems and signature schemes international cryptology conference. ,vol. 196, pp. 47- 53 ,(1985) , 10.1007/3-540-39568-7_5
Aniket Kate, Gregory M. Zaverucha, Urs Hengartner, Anonymity and security in delay tolerant networks international workshop on security. pp. 504- 513 ,(2007) , 10.1109/SECCOM.2007.4550373
Sacha Trifunovic, Franck Legendre, Carlos Anastasiades, Social Trust in Opportunistic Networks conference on computer communications workshops. pp. 1- 6 ,(2010) , 10.1109/INFCOMW.2010.5466696
Hoang Anh Nguyen, Silvia Giordano, Alessandro Puiatti, Probabilistic Routing Protocol for Intermittently Connected Mobile Ad hoc Network (PROPICMAN) world of wireless mobile and multimedia networks. pp. 1- 6 ,(2007) , 10.1109/WOWMOM.2007.4351696
Marco Conti, Mohan Kumar, Opportunities in Opportunistic Computing IEEE Computer. ,vol. 43, pp. 42- 50 ,(2010) , 10.1109/MC.2010.19
Luciana Pelusi, Andrea Passarella, Marco Conti, Opportunistic networking: data forwarding in disconnected mobile ad hoc networks IEEE Communications Magazine. ,vol. 44, pp. 134- 141 ,(2006) , 10.1109/MCOM.2006.248176
Pan Hui, Jon Crowcroft, Eiko Yoneki, BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks IEEE Transactions on Mobile Computing. ,vol. 10, pp. 1576- 1589 ,(2011) , 10.1109/TMC.2010.246
N. Asokan, Kari Kostiainen, Philip Ginzboorg, Jörg Ott, Cheng Luo, Applicability of identity-based cryptography for disruption-tolerant networking Proceedings of the 1st international MobiSys workshop on Mobile opportunistic networking - MobiOpp '07. pp. 52- 56 ,(2007) , 10.1145/1247694.1247705