scholarly journals Avoiding Privacy Violation for Resource Sharing in Ad hoc Networks of Pervasive Computing Environment

Author(s):  
KM Asif ◽  
Sheikh I Ahamed ◽  
Nilothpal Talukder
2010 ◽  
Vol 3 (5) ◽  
pp. 359-361
Author(s):  
Isaac Z. Wu ◽  
X.-Y. Li ◽  
M. Song ◽  
C.-M. Liu

2019 ◽  
pp. 592-620
Author(s):  
Poonam Saini ◽  
Awadhesh Kumar Singh

Resource sharing is the most attractive feature of distributed computing. Information is also a kind of resource. The portable computing devices and wireless networks are playing a dominant role in enhancing the information sharing and thus in the advent of many new variants of distributed computing viz. ubiquitous, grid, cloud, pervasive and mobile. However, the open and distributed nature of Mobile Ad Hoc Networks (MANETs), Vehicular Ad Hoc Networks (VANETs) and cloud computing systems, pose a threat to information that may be coupled from one user (or program) to another. The chapter illustrates the general characteristics of ad hoc networks and computing models that make obligatory to design secure protocols in such environments. Further, we present a generic classification of various threats and attacks. In the end, we describe the security in MANETs, VANETs and cloud computing. The chapter concludes with a description of tools that are popularly used to analyze and access the performance of various security protocols.


Author(s):  
Panayotis Antoniadis

The goal of this chapter is to analyze the incentive issues that arise in multi-hop ad hoc networks when their nodes are potentially mobile devices controlled by independent self-interested end-users. The author decomposes the problem into its economic and technological dimensions according to which he categorizes the numerous proposed solutions. He then analyzes certain drawbacks of the economics oriented approach and argues for the need to go beyond the rationality assumption. This is to exploit a variety of powerful more intrinsic, social, human motivations for encouraging participation and resource sharing in ad hoc networks. Existing successful online communities provide a good starting point for designing social software that can provide cross-layer social incentives for resource sharing. In this chapter, the author motivates this novel but challenging approach and provides some insights toward coming closer to its ambitious objective.


Author(s):  
F. Rosa

The widespread availability of network-enabled handheld devices (e.g., PDAs with WiFi) has made pervasive computing environment development an emerging reality. Mobile (or multi-hop) Ad-hoc NETworks (MANETs-Agrawal & Zeng, 2003) are mobile device networks communicating via wireless links without relying on an underlying infrastructure. Each device in a MANET acts as an endpoint and as a router forwarding messages to devices within radio range. MANETs are a sound alternative to infrastructure-based networks whenever the infrastructure is lacking or unusable, for example, military applications, disaster/relief, emergency situations, and communication between vehicles.


Author(s):  
Poonam Saini ◽  
Awadhesh Kumar Singh

Resource sharing is the most attractive feature of distributed computing. Information is also a kind of resource. The portable computing devices and wireless networks are playing a dominant role in enhancing the information sharing and thus in the advent of many new variants of distributed computing viz. ubiquitous, grid, cloud, pervasive and mobile. However, the open and distributed nature of Mobile Ad Hoc Networks (MANETs), Vehicular Ad Hoc Networks (VANETs) and cloud computing systems, pose a threat to information that may be coupled from one user (or program) to another. The chapter illustrates the general characteristics of ad hoc networks and computing models that make obligatory to design secure protocols in such environments. Further, we present a generic classification of various threats and attacks. In the end, we describe the security in MANETs, VANETs and cloud computing. The chapter concludes with a description of tools that are popularly used to analyze and access the performance of various security protocols.


Author(s):  
Varun G. Menon

Opportunistic routing uses the broadcasting nature of the wireless medium to increase the number of potential forwarding nodes in the network. This, in turn improves the delivery rate and reliability of data transmission in the network. Compared to all previous classes of protocols, opportunistic routing offers numerous advantages which is exploited by the latest applications for efficient communication and resource sharing in dynamic ad hoc networks. The objective of this research work is to review and classify all the major opportunistic routing protocols proposed for dynamic ad hoc networks. Further the issues and challenges with each of these existing protocol is discussed and future research directions are put forward.


Sign in / Sign up

Export Citation Format

Share Document