You are not logged in.

Security and trust in opportunistic networks - a survey

Alajeely, Majeed, Doss, Robin and Ahmad, Asma'a 2015, Security and trust in opportunistic networks - a survey, IETE technical review, vol. 33, no. 3, pp. 256-268, doi: 10.1080/02564602.2015.1094383.

Attached Files
Name Description MIMEType Size Downloads

Title Security and trust in opportunistic networks - a survey
Author(s) Alajeely, Majeed
Doss, RobinORCID iD for Doss, Robin orcid.org/0000-0001-6143-6850
Ahmad, Asma'a
Journal name IETE technical review
Volume number 33
Issue number 3
Start page 256
End page 268
Total pages 13
Publisher Taylor & Francis
Place of publication Abingdon, Eng.
Publication date 2015
ISSN 0256-4602
0974-5971
Keyword(s) Denial-of-service attack
DTN
opportunistic networks
routing protocols
security
trust
Summary Opportunistic networks or OppNets refer to a number of wireless nodes opportunistically communicating with each other in a form of “Store–Carry–Forward”. This occurs when they come into contact with each other without proper network infrastructure. OppNets use wireless technologies, such as IEEE 802.11, WiMAX, Bluetooth, and other short-range radio communication. In OppNets, there is no end-to-end connection between the source and the destination nodes, and the nodes usually have high mobility, low density, limited power, short radio range, and often subject to different kinds of attacks by malicious nodes. Due to these characteristics and features, OppNets are subject to serious security challenges. OppNets strongly depend on human interaction; therefore, the success of securing such networks is based on trust between people. This survey includes the security approaches in OppNets and techniques used to increase their security levels.
Language eng
DOI 10.1080/02564602.2015.1094383
Field of Research 080303 Computer System Security
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category C1 Refereed article in a scholarly journal
Copyright notice ©2015, IETE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30079149

Document type: Journal Article
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 61 Abstract Views, 2 File Downloads  -  Detailed Statistics
Created: Wed, 28 Oct 2015, 00:00:14 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.