SF-APP

2018 ◽  
Vol 15 (2) ◽  
pp. 47-66
Author(s):  
Prashant Kumar ◽  
Naveen Chauhan ◽  
Narottam Chand ◽  
Lalit K. Awasthi

Opportunistic networks are the special class of ad hoc networks where permanent link among the nodes are almost absent and communication occurs when an “opportunity” is found. The opportunistic networks have more diverse features than traditional ad hoc networks, like self-organized nature, intermittent connectivity, store-carry-forward routing mechanism, etc. All these features make opportunistic networks more prone to security threats. This article discusses security challenges and threats to opportunistic networks. Focusing on the specific security requirements of opportunistic networks, proposed is a secure framework for authentication and privacy preservation (SF-APP) for opportunistic networks. The proposed algorithm takes care of authentication, privacy preservation, and trust management. Within this article is a performed security analysis of SF-APP and simulation results show that the proposed framework is capable of fulfilling the security requirements of opportunistic networks.

2016 ◽  
Vol 2016 ◽  
pp. 1-18
Author(s):  
Eduardo da Silva ◽  
Luiz Carlos Pessoa Albini

As a consequence of the particularities of Mobile Ad Hoc Networks (MANETs), such as dynamic topology and self-organization, the implementation of complex and flexible applications is a challenge. To enable the deployment of these applications, several middleware solutions were proposed. However, these solutions do not completely consider the security requirements of these networks. Based on the limitations of the existing solutions, this paper presents a new secure middleware, called Secure Middleware for Ad Hoc Networks (SEMAN), which provides a set of basic and secure services to MANETs aiming to facilitate the development of distributed, complex, and flexible applications. SEMAN considers the context of applications and organizes nodes into groups, also based on these contexts. The middleware includes three modules: service, processing, and security. Security module is the main part of the middleware. It has the following components: key management, trust management, and group management. All these components were developed and are described in this paper. They are supported by a cryptographic core and behave according to security rules and policies. The integration of these components provides security guarantees against attacks to the applications that usethe middleware services.


Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 2900
Author(s):  
Thokozani Felix Vallent ◽  
Damien Hanyurwimfura ◽  
Chomora Mikeka

Vehicular Ad hoc networks (VANETs) as spontaneous wireless communication technology of vehicles has a wide range of applications like road safety, navigation and other electric car technologies, however its practicability is greatly hampered by cyber-attacks. Due to message broadcasting in an open environment during communication, VANETs are inherently vulnerable to security and privacy attacks. However to address the cyber-security issues with optimal computation overhead is a matter of current security research challenge. So this paper designs a secure and efficient certificate-less aggregate scheme (ECLAS) for VANETs applicable in a smart grid scenario. The proposed scheme is based on elliptic curve cryptography to provide conditional privacy-preservation by incorporating usage of time validated pseudo-identification for communicating vehicles besides sorting out the KGC (Key Generation Center) escrow problem. The proposed scheme is comparatively more efficient to relevant related research work because it precludes expensive computation operations likes bilinear pairings as shown by the performance evaluation. Similarly, communication cost is within the ideal range to most related works while considering the security requirements of VANETs system applicable in a smart grid environment.


Author(s):  
Rafael Timóteo de Sousa Júnior ◽  
Ricardo Staciarini Puttini

Mobile ad hoc networks (MANETs) are wireless networks whose mobile nodes exchange information without the help of a predefined network infrastructure. MANET services, such as auto-configuration and ad hoc routing, must be provided in a distributed and self-organizing manner, by collaboration between network nodes and requiring each participant to both provide its own resources and exploit others’ resources. As the nodes may, continually and at any time, appear, disappear or move around within the network, the structure of a MANET is constructed dynamically and the network topology is subject to frequent and unforeseeable changes. In this situation traditional security solutions are insufficient to exhaustively address all security requirements. The distinctive characteristics of ad hoc networks imply the need for distributed collaboration solutions that are based on some form of trust. In this chapter, the authors survey the modes of utilization of trust as means for providing, with network security mechanisms or as an alternative to them, the necessary services in MANETs.


2015 ◽  
Vol 11 (8) ◽  
pp. 384869 ◽  
Author(s):  
Cándido Caballero-Gil ◽  
Pino Caballero-Gil ◽  
Jezabel Molina-Gil

2003 ◽  
Vol 2 (2) ◽  
pp. 102-113 ◽  
Author(s):  
Zhijun Cai ◽  
Mi Lu ◽  
Xiaodong Wang

Sign in / Sign up

Export Citation Format

Share Document