Security in Ad Hoc Network and Computing Paradigms

2019 ◽  
pp. 592-620
Author(s):  
Poonam Saini ◽  
Awadhesh Kumar Singh

Resource sharing is the most attractive feature of distributed computing. Information is also a kind of resource. The portable computing devices and wireless networks are playing a dominant role in enhancing the information sharing and thus in the advent of many new variants of distributed computing viz. ubiquitous, grid, cloud, pervasive and mobile. However, the open and distributed nature of Mobile Ad Hoc Networks (MANETs), Vehicular Ad Hoc Networks (VANETs) and cloud computing systems, pose a threat to information that may be coupled from one user (or program) to another. The chapter illustrates the general characteristics of ad hoc networks and computing models that make obligatory to design secure protocols in such environments. Further, we present a generic classification of various threats and attacks. In the end, we describe the security in MANETs, VANETs and cloud computing. The chapter concludes with a description of tools that are popularly used to analyze and access the performance of various security protocols.

Author(s):  
Poonam Saini ◽  
Awadhesh Kumar Singh

Resource sharing is the most attractive feature of distributed computing. Information is also a kind of resource. The portable computing devices and wireless networks are playing a dominant role in enhancing the information sharing and thus in the advent of many new variants of distributed computing viz. ubiquitous, grid, cloud, pervasive and mobile. However, the open and distributed nature of Mobile Ad Hoc Networks (MANETs), Vehicular Ad Hoc Networks (VANETs) and cloud computing systems, pose a threat to information that may be coupled from one user (or program) to another. The chapter illustrates the general characteristics of ad hoc networks and computing models that make obligatory to design secure protocols in such environments. Further, we present a generic classification of various threats and attacks. In the end, we describe the security in MANETs, VANETs and cloud computing. The chapter concludes with a description of tools that are popularly used to analyze and access the performance of various security protocols.


2015 ◽  
Vol 22 (1) ◽  
pp. 96-102 ◽  
Author(s):  
Salim Bitam ◽  
Abdelhamid Mellouk ◽  
Sherali Zeadally

Author(s):  
Sawsan Elfatih Ibrahim ◽  
Rashid A. Abd Elhaleem Saeed ◽  
Amitava Mukherjee

Vehicular ad hoc networks are relied upon to essentially enhance movement security and transportation productivity. Accessible correspondence, stockpiling, and calculation assets of the associated vehicles are not well used to meet the administration necessities of canny transportation frameworks. Vehicular cloud computing (VCC) is a promising methodology that makes utilization of the preferences of distributed computing and applies them to vehicular systems. Vehicles have turned out to be prepared with different sensors and assets, making them competent to convey, to share assets, and to carry on helpfully. VC can be depicted from the point of view of uses and administrations offered by vehicles that have a place with a vehicular ad hoc network (VANET) due to the impediment of calculation, stockpiling, and data transfer capacity assets for complex in-vehicle sight and sound amusement applications.


Author(s):  
Sawsan Elfatih Ibrahim ◽  
Rashid A. Abd Elhaleem Saeed ◽  
Amitava Mukherjee

Vehicular ad hoc networks are relied upon to essentially enhance movement security and transportation productivity. Accessible correspondence, stockpiling, and calculation assets of the associated vehicles are not well used to meet the administration necessities of canny transportation frameworks. Vehicular cloud computing (VCC) is a promising methodology that makes utilization of the preferences of distributed computing and applies them to vehicular systems. Vehicles have turned out to be prepared with different sensors and assets, making them competent to convey, to share assets, and to carry on helpfully. VC can be depicted from the point of view of uses and administrations offered by vehicles that have a place with a vehicular ad hoc network (VANET) due to the impediment of calculation, stockpiling, and data transfer capacity assets for complex in-vehicle sight and sound amusement applications.


Sign in / Sign up

Export Citation Format

Share Document