Typhoon: Resource Sharing Protocol for Metropolitan Vehicular Ad Hoc Networks

Author(s):  
Guey Yun Chang ◽  
Jang-Ping Sheu ◽  
Jyun-Hua Wu
2019 ◽  
pp. 592-620
Author(s):  
Poonam Saini ◽  
Awadhesh Kumar Singh

Resource sharing is the most attractive feature of distributed computing. Information is also a kind of resource. The portable computing devices and wireless networks are playing a dominant role in enhancing the information sharing and thus in the advent of many new variants of distributed computing viz. ubiquitous, grid, cloud, pervasive and mobile. However, the open and distributed nature of Mobile Ad Hoc Networks (MANETs), Vehicular Ad Hoc Networks (VANETs) and cloud computing systems, pose a threat to information that may be coupled from one user (or program) to another. The chapter illustrates the general characteristics of ad hoc networks and computing models that make obligatory to design secure protocols in such environments. Further, we present a generic classification of various threats and attacks. In the end, we describe the security in MANETs, VANETs and cloud computing. The chapter concludes with a description of tools that are popularly used to analyze and access the performance of various security protocols.


Author(s):  
Poonam Saini ◽  
Awadhesh Kumar Singh

Resource sharing is the most attractive feature of distributed computing. Information is also a kind of resource. The portable computing devices and wireless networks are playing a dominant role in enhancing the information sharing and thus in the advent of many new variants of distributed computing viz. ubiquitous, grid, cloud, pervasive and mobile. However, the open and distributed nature of Mobile Ad Hoc Networks (MANETs), Vehicular Ad Hoc Networks (VANETs) and cloud computing systems, pose a threat to information that may be coupled from one user (or program) to another. The chapter illustrates the general characteristics of ad hoc networks and computing models that make obligatory to design secure protocols in such environments. Further, we present a generic classification of various threats and attacks. In the end, we describe the security in MANETs, VANETs and cloud computing. The chapter concludes with a description of tools that are popularly used to analyze and access the performance of various security protocols.


Author(s):  
Bodhy Krishna .S

A wireless ad hoc network is a decentralized type of wireless network. It is a type of temporary computer-to-computer connection. It is a spontaneous network which includes mobile ad-hoc networks (MANET), vehicular ad-hoc networks (VANET) and Flying ad-hoc networks (FANET). A MANET is a network that has many free or autonomous nodes often composed of mobile devices that can operate without strict top-down network administration [1]. A VANET is a sub form of MANET. It is a technology that uses vehicles as nodes in a network to create a mobile network. FANET is an ad-hoc network of flying nodes. They can fly independently or can be operated distantly. This paper discusses the characteristics of these three ad-hoc networks.


Sign in / Sign up

Export Citation Format

Share Document