Securing Network Resources in Opportunistic and Delay-tolerant Networks

Download Securing Network Resources in Opportunistic and Delay-tolerant Networks PDF Online Free

Author :
Publisher :
ISBN 13 : 9781124208909
Total Pages : 127 pages
Book Rating : 4.2/5 (89 download)

DOWNLOAD NOW!


Book Synopsis Securing Network Resources in Opportunistic and Delay-tolerant Networks by : John Solis

Download or read book Securing Network Resources in Opportunistic and Delay-tolerant Networks written by John Solis and published by . This book was released on 2010 with total page 127 pages. Available in PDF, EPUB and Kindle. Book excerpt: In this thesis we investigate security problems of delay- and disruption-tolerant networks operating in challenged environments. In these settings, providing even basic services presents unique challenges due to environmental and infrastructure constraints. One challenge is to establish a private communication channel when peer security credentials are unknown or unobtainable. A second challenge is to secure personal resource contributions from abusive users when public access is uncontrolled. We investigate the above issues while focusing on two application scenarios: rural-area communication networks and ad-hoc personal device networks. First, we consider a method for establishing an initial security context using casual information that links users to well-known entities. Next, we investigate several secure resource management algorithms for controlling abusive users. Finally, we relax authentication requirements of our resource management algorithms to reduce overhead and support fragmentation. We evaluate proposed techniques through simulations and analysis. The main research contributions of this thesis are: 1. Novel Secure Initial Context Establishment Protocol: We suggest a simple technique for achieving secure communication by leveraging casual information to establish an initial security context. This knowledge links users to a more prominent entity whose security credentials are likely to be well-known. We evaluate the proposed technique by analyzing real-world social network data and simulating intra- and inter-region communication scenarios. 2. Resource Management Schemes: To prevent users from sending more personal data and forwarding less peer data we propose and experimentally evaluate a basic technique based on coarse-grained priority classes. User or node authentication can be the basis for constructing priority classes. We use simulations to show the effectiveness of the basic technique for handling abusive users. We also consider three extensions for handling trusted senders who may become abusive. 3. Impact of Fragmentation on Resource Management Schemes: Fragmentation improves message delivery ratios by optimizing limited contact. However, it negates the benefits of resource management when fragments cannot be authenticated. We extend our previous resource management schemes to support fragmentation and reassess their effectiveness. 4. Best-Effort Authentication: Best-effort relaxes full authentication assumptions required by intermediaries in our previous networking scenarios. We propose two techniques for implementing best-effort authentication and investigate their effectiveness in resource management algorithms. Simulations show that this approach is feasible for our target application scenario even when false positive rates are high. xvi.

Opportunistic Networks

Download Opportunistic Networks PDF Online Free

Author :
Publisher : CRC Press
ISBN 13 : 0429842694
Total Pages : 334 pages
Book Rating : 4.4/5 (298 download)

DOWNLOAD NOW!


Book Synopsis Opportunistic Networks by : Khaleel Ahmad

Download or read book Opportunistic Networks written by Khaleel Ahmad and published by CRC Press. This book was released on 2018-10-03 with total page 334 pages. Available in PDF, EPUB and Kindle. Book excerpt: Opportunistic networks allow mobile users to share information without any network infrastructure.This book is suitable for both undergraduates and postgraduates as it discusses various aspects of opportunistic networking including, foundations of ad hoc network; taxonomy of mobility models, etc.

Security in Delay Tolerant Networks

Download Security in Delay Tolerant Networks PDF Online Free

Author :
Publisher :
ISBN 13 :
Total Pages : 111 pages
Book Rating : 4.:/5 (613 download)

DOWNLOAD NOW!


Book Synopsis Security in Delay Tolerant Networks by : Haojin Zhu

Download or read book Security in Delay Tolerant Networks written by Haojin Zhu and published by . This book was released on 2009 with total page 111 pages. Available in PDF, EPUB and Kindle. Book excerpt: Delay- and Disruption-tolerant wireless networks (DTN), or opportunistic networks, represent a class of networks where continuous end-to-end connectivity may not be possible. DTN is a well recognized area in networking research and has attracted extensive attentions from both network designers and application developers. Applications of this emergent communication paradigm are wide ranging and include sensor networks using scheduled intermittent connectivity, vehicular DTNs for dissemination of location-dependent information (e.g., local ads, traffic reports, parking information, etc.), pocket-switched networks to allow humans to communicate without network infrastructure, and underwater acoustic networks with moderate delays and frequent interruptions due to environmental factors, etc. Security is one of the main barriers to wide-scale deployment of DTNs, but has gained little attention so far. On the one hand, similar to traditional mobile ad hoc networks, the open channel and multi-hop transmission have made DTNs vulnerable to various security threats, such as message modification/injection attack or unauthorized access and utilization of DTN resources. On the other hand, the unique security characteristics of DTNs including: long round-trip delay, frequent disconnectivity, fragmentation, opportunistic routing as well as limited computational and storage capability, make the existing security protocols designed for the conventional ad hoc networks unsuitable for DTNs. Therefore, a series of new security protocols are highly desired to meet stringent security and efficiency requirements for securing DTNs. In this research, we focus on three fundamental security issues in DTNs: efficient DTN message (or bundle) authentication, which is a critical security service for DTN security; incentive issue, which targets at stimulating selfish nodes to forward data for others; and certificate revocation issue, which is an important part of public key management and serves the foundation of any DTN security protocols. We have made the following contributions: First of all, the unique "ore-carry-and-forward" transmission characteristic of DTNs implies that bundles from distinct/common senders may opportunistically be buffered at some common intermediate nodes. Such a "buffering" characteristic distinguishes DTN from any other traditional wireless networks, for which intermediate cache is not supported. To exploit such buffering opportunities, we propose an Opportunistic Batch Bundle Authentication Scheme (OBBA) to dramatically reduce the bundle authentication cost by seamlessly integrating identity-based batch signatures and Merkle tree techniques. Secondly, we propose a secure multi-layer credit based incentive scheme to stimulate bundle forwarding cooperation among DTNs nodes. The proposed scheme can be implemented in a fully distributed manner to thwart various attacks without relying on any tamper-proof hardware. In addition, we introduce several efficiency-optimization techniques to improve the overall efficiency by exploiting the unique characteristics of DTNs. Lastly, we propose a storage-efficient public key certificate validation method. Our proposed scheme exploits the opportunistic propagation to transmit Certificate Revocation List (CRL) list while taking advantage of bloom filter technique to reduce the required buffer size. We also discuss how to take advantage of cooperative checking to minimize false positive rate and storage consumption. For each research issue, detailed simulation results in terms of computational time, transmission overhead and power consumption, are given to validate the efficiency and effectiveness of the proposed security solutions.

Advances in Delay-tolerant Networks (DTNs)

Download Advances in Delay-tolerant Networks (DTNs) PDF Online Free

Author :
Publisher : Elsevier
ISBN 13 : 0857098462
Total Pages : 301 pages
Book Rating : 4.8/5 (57 download)

DOWNLOAD NOW!


Book Synopsis Advances in Delay-tolerant Networks (DTNs) by : Joel J.P.C. Rodrigues

Download or read book Advances in Delay-tolerant Networks (DTNs) written by Joel J.P.C. Rodrigues and published by Elsevier. This book was released on 2014-11-20 with total page 301 pages. Available in PDF, EPUB and Kindle. Book excerpt: Part one looks at delay-tolerant network architectures and platforms including DTN for satellite communications and deep-space communications, underwater networks, networks in developing countries, vehicular networks and emergency communications. Part two covers delay-tolerant network routing, including issues such as congestion control, naming, addressing and interoperability. Part three explores services and applications in delay-tolerant networks, such as web browsing, social networking and data streaming. Part four discusses enhancing the performance, reliability, privacy and security of delay-tolerant networks. Chapters cover resource sharing, simulation and modeling and testbeds. Reviews the different types of DTN and shows how they can be applied in satellite and deep-space communications, vehicular and underwater communications, and during large-scale disasters Considers the potential for rapid selection and dissemination of urgent messages is considered Reviews the breadth of areas in which DTN is already providing solutions and the prospects for its wider adoption

Opportunistic Networks

Download Opportunistic Networks PDF Online Free

Author :
Publisher : CRC Press
ISBN 13 : 100042975X
Total Pages : 330 pages
Book Rating : 4.0/5 (4 download)

DOWNLOAD NOW!


Book Synopsis Opportunistic Networks by : Anshul Verma

Download or read book Opportunistic Networks written by Anshul Verma and published by CRC Press. This book was released on 2021-08-18 with total page 330 pages. Available in PDF, EPUB and Kindle. Book excerpt: The opportunistic network is an emerging and recent area of research. To make this research area more adaptable for practical and industrial use, there is a need to further investigate several research challenges in all aspects of opportunistic networks. Therefore, Opportunistic Networks: Fundamentals, Applications and Emerging Trends provides theoretical, algorithmic, simulation, and implementation-based research developments related to fundamentals, applications, and emerging research trends in opportunistic networks. The book follows a theoretical approach to describe fundamentals to beginners and incorporates a practical approach depicting the implementation of real-life applications to intermediate and advanced readers. This book is beneficial for academicians, researchers, developers, and engineers who work in or are interested in the fields related to opportunistic networks, delay tolerant networks, and intermittently connected ad hoc networks. This book also serves as a reference book for graduate and postgraduate courses in computer science, computer engineering, and information technology streams.

Opportunistic Networks

Download Opportunistic Networks PDF Online Free

Author :
Publisher : Springer Nature
ISBN 13 : 3031478665
Total Pages : 201 pages
Book Rating : 4.0/5 (314 download)

DOWNLOAD NOW!


Book Synopsis Opportunistic Networks by : Anna Förster

Download or read book Opportunistic Networks written by Anna Förster and published by Springer Nature. This book was released on with total page 201 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Mobile Ad Hoc Networking

Download Mobile Ad Hoc Networking PDF Online Free

Author :
Publisher : John Wiley & Sons
ISBN 13 : 1118511239
Total Pages : 690 pages
Book Rating : 4.1/5 (185 download)

DOWNLOAD NOW!


Book Synopsis Mobile Ad Hoc Networking by : Stefano Basagni

Download or read book Mobile Ad Hoc Networking written by Stefano Basagni and published by John Wiley & Sons. This book was released on 2013-02-07 with total page 690 pages. Available in PDF, EPUB and Kindle. Book excerpt: "An excellent book for those who are interested in learning the current status of research and development . . . [and] who want to get a comprehensive overview of the current state-of-the-art." —E-Streams This book provides up-to-date information on research and development in the rapidly growing area of networks based on the multihop ad hoc networking paradigm. It reviews all classes of networks that have successfully adopted this paradigm, pointing out how they penetrated the mass market and sparked breakthrough research. Covering both physical issues and applications, Mobile Ad Hoc Networking: Cutting Edge Directions offers useful tools for professionals and researchers in diverse areas wishing to learn about the latest trends in sensor, actuator, and robot networking, mesh networks, delay tolerant and opportunistic networking, and vehicular networks. Chapter coverage includes: Multihop ad hoc networking Enabling technologies and standards for mobile multihop wireless networking Resource optimization in multiradio multichannel wireless mesh networks QoS in mesh networks Routing and data dissemination in opportunistic networks Task farming in crowd computing Mobility models, topology, and simulations in VANET MAC protocols for VANET Wireless sensor networks with energy harvesting nodes Robot-assisted wireless sensor networks: recent applications and future challenges Advances in underwater acoustic networking Security in wireless ad hoc networks Mobile Ad Hoc Networking will appeal to researchers, developers, and students interested in computer science, electrical engineering, and telecommunications.

Routing in Opportunistic Networks

Download Routing in Opportunistic Networks PDF Online Free

Author :
Publisher : Springer Science & Business Media
ISBN 13 : 1461435145
Total Pages : 421 pages
Book Rating : 4.4/5 (614 download)

DOWNLOAD NOW!


Book Synopsis Routing in Opportunistic Networks by : Isaac Woungang

Download or read book Routing in Opportunistic Networks written by Isaac Woungang and published by Springer Science & Business Media. This book was released on 2013-09-10 with total page 421 pages. Available in PDF, EPUB and Kindle. Book excerpt: Routing in Opportunistic Networks focuses on the basics of opportunistic networks, modeling and communication in opportunistic networks, routing in opportunistic networks, and collaboration and cooperation in opportunistic networks. The editors will cover such topics as mobility characterization and discovery in opportunistic networks, scheduling and medium access control in opportunistic networks as well as testbed, tools, and measurements for opportunistic networks.

Mobile Opportunistic Networks

Download Mobile Opportunistic Networks PDF Online Free

Author :
Publisher : CRC Press
ISBN 13 : 1420088130
Total Pages : 286 pages
Book Rating : 4.4/5 (2 download)

DOWNLOAD NOW!


Book Synopsis Mobile Opportunistic Networks by : Mieso K. Denko

Download or read book Mobile Opportunistic Networks written by Mieso K. Denko and published by CRC Press. This book was released on 2016-04-19 with total page 286 pages. Available in PDF, EPUB and Kindle. Book excerpt: From fundamentals to advanced concepts, this book provides comprehensive technical coverage of this rapidly emerging communications technology. The first section focuses on modeling, networking architecture, and routing problems. The second section examines opportunistic networking technologies and applications. Supplying detailed discussions of key research challenges and open issues, this comprehensive resource provides a clear understanding of industrial and professional standards, communication architectures, network algorithms and protocols, emerging applications, and the latest experimental studies-including simulation tools and implementation test beds.

Design and Implementation of Applications Over Delay Tolerant Networks for Disaster and Battlefield Environment

Download Design and Implementation of Applications Over Delay Tolerant Networks for Disaster and Battlefield Environment PDF Online Free

Author :
Publisher :
ISBN 13 :
Total Pages : 65 pages
Book Rating : 4.:/5 (113 download)

DOWNLOAD NOW!


Book Synopsis Design and Implementation of Applications Over Delay Tolerant Networks for Disaster and Battlefield Environment by : Karthikeyan Sachidanandam

Download or read book Design and Implementation of Applications Over Delay Tolerant Networks for Disaster and Battlefield Environment written by Karthikeyan Sachidanandam and published by . This book was released on 2019 with total page 65 pages. Available in PDF, EPUB and Kindle. Book excerpt: "In disaster/battlefield applications, there may not be any centralized network that provides a mechanism for different nodes to connect with each other to share important data. In such cases, we can take advantage of an opportunistic network involving a substantial number of mobile devices that can communicate with each other using Bluetooth and Google Nearby Connections API(it uses Bluetooth, Bluetooth Low Energy (BLE), and Wi-Fi hotspots) when they are close to each other. These devices referred to as nodes form a Delay Tolerant Network (DTN), also known as an opportunistic network. As suggested by its name, DTN can tolerate delays and significant loss of data while forwarding a message from source to destination using store and forward paradigm. In DTN, it is of critical importance that the network is not completely flooded and also the message is not tampered or corrupted and readable only to the destined node. Three algorithms have been implemented in the Android platform. The first algorithm [1] focuses on intelligent data transfer based on each node's interest and encourages each node to participate in data transfer by providing incentives and keeping track of the trustworthiness of each node. The second algorithm [2] focuses on the security of the transferred data by fragmenting both data- and key-shares with some redundancy and the destination node can resurrect the original data from the predefined minimum key- and data-shares. The third algorithm focusses on using object detection models and interest-based authorization using [3] to securely transfer and access data across DTN. The corrupted nodes are identified by using one-way keychain hashes created by source/relay nodes for a message which are validated at the destination node"--Abstract, page iii.

Delay- and Disruption-tolerant Networking

Download Delay- and Disruption-tolerant Networking PDF Online Free

Author :
Publisher : Artech House Publishers
ISBN 13 :
Total Pages : 256 pages
Book Rating : 4.3/5 (97 download)

DOWNLOAD NOW!


Book Synopsis Delay- and Disruption-tolerant Networking by : Stephen Farrell

Download or read book Delay- and Disruption-tolerant Networking written by Stephen Farrell and published by Artech House Publishers. This book was released on 2006 with total page 256 pages. Available in PDF, EPUB and Kindle. Book excerpt: Delay and disruption networking (DTN) is an up-and-coming technology that enables networking in extreme environments. This complete reference on DTN covers applications requirements, DTN protocols, and network implementation. Thoroughly examining the causes of delay and disruption, the book shows how to engineer a robust network that can survive the harshest conditions.

Security for Multihop Wireless Networks

Download Security for Multihop Wireless Networks PDF Online Free

Author :
Publisher : CRC Press
ISBN 13 : 1466578033
Total Pages : 540 pages
Book Rating : 4.4/5 (665 download)

DOWNLOAD NOW!


Book Synopsis Security for Multihop Wireless Networks by : Shafiullah Khan

Download or read book Security for Multihop Wireless Networks written by Shafiullah Khan and published by CRC Press. This book was released on 2014-04-15 with total page 540 pages. Available in PDF, EPUB and Kindle. Book excerpt: Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks. Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, and security issues in applications. It identifies vulnerabilities in the physical, MAC, network, transport, and application layers and details proven methods for strengthening security mechanisms in each layer. The text explains how to deal with black hole attacks in mobile ad hoc networks and describes how to detect misbehaving nodes in vehicular ad hoc networks. It identifies a pragmatic and energy efficient security layer for wireless sensor networks and covers the taxonomy of security protocols for wireless sensor communications. Exploring recent trends in the research and development of multihop network security, the book outlines possible defenses against packet-dropping attacks in wireless multihop ad hoc networks.Complete with expectations for the future in related areas, this is an ideal reference for researchers, industry professionals, and academics. Its comprehensive coverage also makes it suitable for use as a textbook in graduate-level electrical engineering programs.

Design and Performance Analysis of Opportunistic Routing Protocols for Delay Tolerant Networks

Download Design and Performance Analysis of Opportunistic Routing Protocols for Delay Tolerant Networks PDF Online Free

Author :
Publisher :
ISBN 13 :
Total Pages : 122 pages
Book Rating : 4.:/5 (827 download)

DOWNLOAD NOW!


Book Synopsis Design and Performance Analysis of Opportunistic Routing Protocols for Delay Tolerant Networks by : Tamer Abdel-kader

Download or read book Design and Performance Analysis of Opportunistic Routing Protocols for Delay Tolerant Networks written by Tamer Abdel-kader and published by . This book was released on 2012 with total page 122 pages. Available in PDF, EPUB and Kindle. Book excerpt: Delay Tolerant Networks (DTNs) are characterized by the lack of continuous end-to-end connections because of node mobility, constrained power sources, and limited data storage space of some or all of its nodes. Applications of DTNs include vehicular networks and sensor networks in suburban and rural areas. The intermittent connection in DTNs creates a new and challenging environment that has not been tackled before in wireless and wired networks. Traditional routing protocols fail to deliver data packets because they assume the existence of continuous end-to-end connections. To overcome the frequent disconnections, a DTN node is required to store data packets for long periods of time until it becomes in the communication range of other nodes. In addition, to increase the delivery probability, a DTN node spreads multiple copies of the same packet on the network so that one of the copies reaches the destination. Given the limited storage and energy resources of DTN nodes, there is a trade off between maximizing delivery and minimizing storage and energy consumption. DTN routing protocols can be classified as either blind routing, in which no information is provided to select the next node in the path, or guided routing, in which some network information is used to guide data packets to their destinations. In addition they differ in the amount of overhead they impose on the network and its nodes. The objective of DTN routing protocols is to deliver as many packets as possible. Acquiring network information helps in maximizing packet delivery probability and minimizing the network overhead resulting from replicating many packet copies. Network information could be node contact times and durations, node buffer capacities, packet lifetimes, and many others. The more information acquired, the higher performance could be achieved. However, the cost of acquiring the network information in terms of delay and storage could be high to the degree that render the protocol impractical. In designing a DTN routing protocol, the trade-off between the benefits of acquiring information and its costs should be considered. In this thesis, we study the routing problem in DTN with limited resources. Our objective is to design and implement routing protocols that effectively handles the intermittent connection in DTNs to achieve high packet delivery ratios with lower delivery cost.

Delay Tolerant Networks

Download Delay Tolerant Networks PDF Online Free

Author :
Publisher : Springer
ISBN 13 : 3319181084
Total Pages : 90 pages
Book Rating : 4.3/5 (191 download)

DOWNLOAD NOW!


Book Synopsis Delay Tolerant Networks by : Longxiang Gao

Download or read book Delay Tolerant Networks written by Longxiang Gao and published by Springer. This book was released on 2015-05-14 with total page 90 pages. Available in PDF, EPUB and Kindle. Book excerpt: This brief presents emerging and promising communication methods for network reliability via delay tolerant networks (DTNs). Different from traditional networks, DTNs possess unique features, such as long latency and unstable network topology. As a result, DTNs can be widely applied to critical applications, such as space communications, disaster rescue, and battlefield communications. The brief provides a complete investigation of DTNs and their current applications, from an overview to the latest development in the area. The core issue of data forward in DTNs is tackled, including the importance of social characteristics, which is an essential feature if the mobile devices are used for human communication. Security and privacy issues in DTNs are discussed, and future work is also discussed.

Proceedings of Second International Conference on Computing, Communications, and Cyber-Security

Download Proceedings of Second International Conference on Computing, Communications, and Cyber-Security PDF Online Free

Author :
Publisher : Springer Nature
ISBN 13 : 9811607338
Total Pages : 1027 pages
Book Rating : 4.8/5 (116 download)

DOWNLOAD NOW!


Book Synopsis Proceedings of Second International Conference on Computing, Communications, and Cyber-Security by : Pradeep Kumar Singh

Download or read book Proceedings of Second International Conference on Computing, Communications, and Cyber-Security written by Pradeep Kumar Singh and published by Springer Nature. This book was released on 2021-05-24 with total page 1027 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book features selected research papers presented at the Second International Conference on Computing, Communications, and Cyber-Security (IC4S 2020), organized in Krishna Engineering College (KEC), Ghaziabad, India, along with Academic Associates; Southern Federal University, Russia; IAC Educational, India; and ITS Mohan Nagar, Ghaziabad, India during 3–4 October 2020. It includes innovative work from researchers, leading innovators, and professionals in the area of communication and network technologies, advanced computing technologies, data analytics and intelligent learning, the latest electrical and electronics trends, and security and privacy issues.

Advances in Delay-Tolerant Networks (DTNs)

Download Advances in Delay-Tolerant Networks (DTNs) PDF Online Free

Author :
Publisher : Woodhead Publishing
ISBN 13 : 008102794X
Total Pages : 324 pages
Book Rating : 4.0/5 (81 download)

DOWNLOAD NOW!


Book Synopsis Advances in Delay-Tolerant Networks (DTNs) by : Joel J.P.C. Rodrigues

Download or read book Advances in Delay-Tolerant Networks (DTNs) written by Joel J.P.C. Rodrigues and published by Woodhead Publishing. This book was released on 2020-11-20 with total page 324 pages. Available in PDF, EPUB and Kindle. Book excerpt: Advances in Delay-Tolerant Networks: Architecture and Enhanced Performance, Second Edition provides an important overview of delay-tolerant networks (DTNs) for researchers in electronics, computer engineering, telecommunications and networking for those in academia and R&D in industrial sectors. Part I reviews the technology involved and the prospects for improving performance, including different types of DTN and their applications, such as satellite and deep-space communications and vehicular communications. Part II focuses on how the technology can be further improved, addressing topics, such as data bundling, opportunistic routing, reliable data streaming, and the potential for rapid selection and dissemination of urgent messages. Opportunistic, delay-tolerant networks address the problem of intermittent connectivity in a network where there are long delays between sending and receiving messages, or there are periods of disconnection. Reviews the different types of DTN and shows how they can be applied in satellite and deep-space communications, vehicular communications (including unmanned aerial), and during large-scale disasters Considers security concerns for DTN and potential for rapid selection and dissemination of urgent messages Reviews the breadth of areas in which DTN is already providing solutions Covers the prospects for DTN's wider adoption and development of standards

Reliable Post Disaster Services over Smartphone Based DTN

Download Reliable Post Disaster Services over Smartphone Based DTN PDF Online Free

Author :
Publisher : Springer
ISBN 13 : 9811365733
Total Pages : 176 pages
Book Rating : 4.8/5 (113 download)

DOWNLOAD NOW!


Book Synopsis Reliable Post Disaster Services over Smartphone Based DTN by : Souvik Basu

Download or read book Reliable Post Disaster Services over Smartphone Based DTN written by Souvik Basu and published by Springer. This book was released on 2019-03-28 with total page 176 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book proposes a framework and strategies for reliable end-to-end post-disaster services using smartphone-based delay-tolerant networks, which can operate even in the absence of conventional network connectivity. It explores various aspects of this challenge, ranging from accurate need assessment, to timely need accumulation, efficient resource allocation, and reliable data dissemination. The book offers insightful reading for all technologists and researchers working in the domain of ICT-based disaster management in developing countries, and will help them grasp the challenges involved in providing post-disaster services in an extremely difficult network scenario, while also offering possible solutions. The book will also benefit disaster management authorities, government agencies, NGOs and other stakeholders, helping them enhance their preparedness through the intelligent use of wireless technologies coupled with smart devices.