Social-context Based Routing and Security in Delay Tolerant Networks

Download Social-context Based Routing and Security in Delay Tolerant Networks PDF Online Free

Author :
Publisher :
ISBN 13 :
Total Pages : 166 pages
Book Rating : 4.:/5 (853 download)

DOWNLOAD NOW!


Book Synopsis Social-context Based Routing and Security in Delay Tolerant Networks by : Roy Alan Cabaniss

Download or read book Social-context Based Routing and Security in Delay Tolerant Networks written by Roy Alan Cabaniss and published by . This book was released on 2013 with total page 166 pages. Available in PDF, EPUB and Kindle. Book excerpt: "Delay Tolerant Networks (DTNs) were originally intended for interplanetary communications and have been applied to a series of difficult environments: wireless sensor networks, unmanned aerial vehicles, and short-range personal communications. There is a class of such environments in which nodes follow semi-predictable social patterns, such as wildlife tracking or personal devices. This work introduces a series of algorithms designed to identify the social patterns present in these environments and apply this data to difficult problems, such as efficient message routing and content distribution. Security is also difficult in a mobile environment. This is especially the case in the event that a large portion of the network is unreliable, or simply unknown. As the network size increases nodes have difficulty in securely distributing keys, especially using low powered nodes with limited keyspace. A series of multi-party security algorithms were designed to securely transmit a message in the event that the sender does not have access to the destinations public key. Messages are routed through a series of nodes, each of which partially decrypts the message. By encrypting for several proxies, the message can only be intercepted if all those nodes have been compromised. Even a highly compromised network has increased security using this algorithm, with a trade-off of reduced delivery ratio and increased delivery time"--Abstract, page iv.

Routing in Opportunistic Networks

Download Routing in Opportunistic Networks PDF Online Free

Author :
Publisher : Springer Science & Business Media
ISBN 13 : 1461435145
Total Pages : 421 pages
Book Rating : 4.4/5 (614 download)

DOWNLOAD NOW!


Book Synopsis Routing in Opportunistic Networks by : Isaac Woungang

Download or read book Routing in Opportunistic Networks written by Isaac Woungang and published by Springer Science & Business Media. This book was released on 2013-09-10 with total page 421 pages. Available in PDF, EPUB and Kindle. Book excerpt: Routing in Opportunistic Networks focuses on the basics of opportunistic networks, modeling and communication in opportunistic networks, routing in opportunistic networks, and collaboration and cooperation in opportunistic networks. The editors will cover such topics as mobility characterization and discovery in opportunistic networks, scheduling and medium access control in opportunistic networks as well as testbed, tools, and measurements for opportunistic networks.

Social-based Routing in Mobile and Delay-tolerant Networks

Download Social-based Routing in Mobile and Delay-tolerant Networks PDF Online Free

Author :
Publisher :
ISBN 13 :
Total Pages : 130 pages
Book Rating : 4.:/5 (812 download)

DOWNLOAD NOW!


Book Synopsis Social-based Routing in Mobile and Delay-tolerant Networks by : Mads Haahr

Download or read book Social-based Routing in Mobile and Delay-tolerant Networks written by Mads Haahr and published by . This book was released on 2012 with total page 130 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Advances in Delay-Tolerant Networks (DTNs)

Download Advances in Delay-Tolerant Networks (DTNs) PDF Online Free

Author :
Publisher : Woodhead Publishing
ISBN 13 : 008102794X
Total Pages : 324 pages
Book Rating : 4.0/5 (81 download)

DOWNLOAD NOW!


Book Synopsis Advances in Delay-Tolerant Networks (DTNs) by : Joel J.P.C. Rodrigues

Download or read book Advances in Delay-Tolerant Networks (DTNs) written by Joel J.P.C. Rodrigues and published by Woodhead Publishing. This book was released on 2020-11-20 with total page 324 pages. Available in PDF, EPUB and Kindle. Book excerpt: Advances in Delay-Tolerant Networks: Architecture and Enhanced Performance, Second Edition provides an important overview of delay-tolerant networks (DTNs) for researchers in electronics, computer engineering, telecommunications and networking for those in academia and R&D in industrial sectors. Part I reviews the technology involved and the prospects for improving performance, including different types of DTN and their applications, such as satellite and deep-space communications and vehicular communications. Part II focuses on how the technology can be further improved, addressing topics, such as data bundling, opportunistic routing, reliable data streaming, and the potential for rapid selection and dissemination of urgent messages. Opportunistic, delay-tolerant networks address the problem of intermittent connectivity in a network where there are long delays between sending and receiving messages, or there are periods of disconnection. Reviews the different types of DTN and shows how they can be applied in satellite and deep-space communications, vehicular communications (including unmanned aerial), and during large-scale disasters Considers security concerns for DTN and potential for rapid selection and dissemination of urgent messages Reviews the breadth of areas in which DTN is already providing solutions Covers the prospects for DTN's wider adoption and development of standards

A Secure Socially-Aware Content Retrieval Framework for Delay Tolerant Networks

Download A Secure Socially-Aware Content Retrieval Framework for Delay Tolerant Networks PDF Online Free

Author :
Publisher :
ISBN 13 :
Total Pages : 183 pages
Book Rating : 4.:/5 (17 download)

DOWNLOAD NOW!


Book Synopsis A Secure Socially-Aware Content Retrieval Framework for Delay Tolerant Networks by : Tuan Vu Le

Download or read book A Secure Socially-Aware Content Retrieval Framework for Delay Tolerant Networks written by Tuan Vu Le and published by . This book was released on 2016 with total page 183 pages. Available in PDF, EPUB and Kindle. Book excerpt: Delay Tolerant Networks (DTNs) are sparse mobile ad-hoc networks in which there is typically no complete path between the source and destination. Content retrieval is an important service in DTNs. It allows peer-to-peer data sharing and access among mobile users in areas that lack a fixed communication infrastructure such as rural areas, inter-vehicle communication, and military environments. There are many applications for content retrieval in DTNs. For example, mobile users can find interesting digital content such as music and images from other network peers for entertainment purposes. Vehicles can access live traffic information to avoid traffic delay. Soldiers with wireless devices can retrieve relevant information such as terrain descriptions, weather, and intelligence information from other nodes in a battlefield. In this dissertation, we propose the design of a secure and scalable architecture for content retrieval in DTNs. Our design consists of five key components: (1) a distributed content discovery service, (2) a routing protocol for message delivery, (3) a buffer management policy to schedule and drop messages in resource-constrained environments, (4) a caching framework to enhance the performance of data access, and (5) a mechanism to detect malicious and selfish behaviors in the network. To cope with the unstable network topology due to the highly volatile movement of nodes in DTNs, we exploit the underlying stable social relationships among nodes for message routing, caching, and placement of the content-lookup service. Specifically, we rely on three key social concepts: social tie, centrality, and social level. Centrality is used to form the distributed content discovery service and the caching framework. Social level guides the forwarding of content requests to a content discovery service node. Once the content provider ID is discovered, social tie is exploited to deliver content requests to the content provider, and content data to the requester node. Furthermore, to reduce the transmission cost, we investigate and propose routing strategies for three dominant communication models in DTNs: unicast (a content is sent to a single node), multicast (a content is sent to multiple nodes), and anycast (a content is sent to any one member in a group of nodes). We also address several security issues for content retrieval in DTNs. In the presence of malicious and selfish nodes, the content retrieval performance can be deteriorated significantly. To address this problem, we use Public Key Cryptography to secure social-tie records and content delivery records during a contact between two nodes. The unforgeable social-tie records prevent malicious nodes from falsifying the social-tie information, which corrupts the content lookup service placement and disrupts the social-tie routing protocol. The delivery records from which the packet forwarding ratio of a node is computed, helps detect selfish behavior. Furthermore, we propose a blacklist distribution scheme that allows nodes to filter out misbehaving nodes from their social contact graph, effectively preventing network traffic from flowing to misbehaving nodes. Through extensive simulation studies using real-world mobility traces, we show that our content retrieval scheme can achieve a high content delivery ratio, low delay, and low transmission cost. In addition, our proposed misbehavior detection method can detect insider attacks efficiently with a high detection ratio and a low false positive rate, thus improving the content retrieval performance.

Opportunistic Networks

Download Opportunistic Networks PDF Online Free

Author :
Publisher : CRC Press
ISBN 13 : 0429842708
Total Pages : 314 pages
Book Rating : 4.4/5 (298 download)

DOWNLOAD NOW!


Book Synopsis Opportunistic Networks by : Khaleel Ahmad

Download or read book Opportunistic Networks written by Khaleel Ahmad and published by CRC Press. This book was released on 2018-10-03 with total page 314 pages. Available in PDF, EPUB and Kindle. Book excerpt: Opportunistic networks allow mobile users to share information without any network infrastructure.This book is suitable for both undergraduates and postgraduates as it discusses various aspects of opportunistic networking including, foundations of ad hoc network; taxonomy of mobility models, etc.

Designing Efficient Routing Protocols in Delay Tolerant Networks

Download Designing Efficient Routing Protocols in Delay Tolerant Networks PDF Online Free

Author :
Publisher :
ISBN 13 :
Total Pages : 177 pages
Book Rating : 4.:/5 (128 download)

DOWNLOAD NOW!


Book Synopsis Designing Efficient Routing Protocols in Delay Tolerant Networks by : Yunsheng Wang

Download or read book Designing Efficient Routing Protocols in Delay Tolerant Networks written by Yunsheng Wang and published by . This book was released on 2013 with total page 177 pages. Available in PDF, EPUB and Kindle. Book excerpt: This thesis presents the design and evaluation of routing protocols for efficient content delivery and dissemination in delay tolerant networks. With the advancement in technology, the communication devices with wireless interfaces become more and more universal. Delay tolerant networks (DTNs) are characterized by intermittent connectivity and limited network capacity. There exist several different application scenarios: connectivity of developing countries, vehicular DTN road communications, and social contact networks. In this thesis, we explore the characteristics in DTNs, such as mobility pattern, contact history information, and social feature information, to design efficient routing schemes. The research reported in this thesis investigates the technical challenges and their solutions of applying different DTN routing protocols. We design multicast schemes to forward the information to a group of destinations in DTN environment. We extend the delegation forwarding scheme in DTN multicasting. An non-replication multicast tree is also studied in this report. We also apply ticket-based and social-tie-based approaches in content distribution systems. We leverage the users' social feature information to study the hypercube-based routing schemes in social contact networks. We also study the resource management problem in DTNs. We design a joint replication-migration-based scheme to solve the storage congestion. These techniques are evaluated comprehensively in realistic simulation studies, by comparing the performance with state-of-the-art approaches in both synthetic and real traces.

2nd International Conference on Wireless Intelligent and Distributed Environment for Communication

Download 2nd International Conference on Wireless Intelligent and Distributed Environment for Communication PDF Online Free

Author :
Publisher : Springer
ISBN 13 : 3030114376
Total Pages : 264 pages
Book Rating : 4.0/5 (31 download)

DOWNLOAD NOW!


Book Synopsis 2nd International Conference on Wireless Intelligent and Distributed Environment for Communication by : Isaac Woungang

Download or read book 2nd International Conference on Wireless Intelligent and Distributed Environment for Communication written by Isaac Woungang and published by Springer. This book was released on 2019-03-27 with total page 264 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2019), sponsored by the University of Milan, Milan, Italy, February 11-13, 2019. The conference deals both with the important core and the specialized issues in the areas of new dependability paradigms design and performance of dependable network computing and mobile systems, as well as issues related to the security of these systems. The WIDECOM proceedings features papers addressing issues related to the design, analysis, and implementation, of infrastructures, systems, architectures, algorithms, and protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and IoT systems. It is a valuable reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. The book’s structure and content is organized in such a manner that makes it useful at a variety of learning levels. Presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2019), Milan, Italy, February 11-13, 2019; Includes an array of topics networking computing, mobile/ubiquitous systems, cloud systems, and IoT systems; Addresses issues related to protecting information security and establishing trust in the digital space.

Delay and Disruption Tolerant Networks

Download Delay and Disruption Tolerant Networks PDF Online Free

Author :
Publisher : CRC Press
ISBN 13 : 1351984217
Total Pages : 387 pages
Book Rating : 4.3/5 (519 download)

DOWNLOAD NOW!


Book Synopsis Delay and Disruption Tolerant Networks by : Aloizio Pereira da Silva

Download or read book Delay and Disruption Tolerant Networks written by Aloizio Pereira da Silva and published by CRC Press. This book was released on 2018-09-04 with total page 387 pages. Available in PDF, EPUB and Kindle. Book excerpt: Delay- and Disruption Tolerant Networks (DTNs) are networks subject to arbitrarily long-lived disruptions in connectivity and therefore cannot guarantee end-to-end connectivity at all times. Consequently DTNs called for novel core networking protocols since most existing Internet protocols rely on the network’s ability to maintain end-to-end communication between participating nodes. This book presents the fundamental principles that underline DTNs. It explains the state-of-the-art on DTNs, their architecture, protocols, and applications. It also explores DTN’s future technological trends and applications. Its main goal is to serve as a reference for researchers and practitioners.

Network and System Security

Download Network and System Security PDF Online Free

Author :
Publisher : Springer
ISBN 13 : 3319256459
Total Pages : 537 pages
Book Rating : 4.3/5 (192 download)

DOWNLOAD NOW!


Book Synopsis Network and System Security by : Meikang Qiu

Download or read book Network and System Security written by Meikang Qiu and published by Springer. This book was released on 2015-11-23 with total page 537 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the proceedings of the 9th International Conference on Network and System Security, NSS 2015, held in New York City, NY, USA, in November 2015. The 23 full papers and 18 short papers presented were carefully reviewed and selected from 110 submissions. The papers are organized in topical sections on wireless security and privacy; smartphone security; systems security; applications security; security management; applied cryptography; cryptosystems; cryptographic mechanisms; security mechanisms; mobile and cloud security; applications and network security.

Opportunistic Networks

Download Opportunistic Networks PDF Online Free

Author :
Publisher : CRC Press
ISBN 13 : 100042975X
Total Pages : 330 pages
Book Rating : 4.0/5 (4 download)

DOWNLOAD NOW!


Book Synopsis Opportunistic Networks by : Anshul Verma

Download or read book Opportunistic Networks written by Anshul Verma and published by CRC Press. This book was released on 2021-08-18 with total page 330 pages. Available in PDF, EPUB and Kindle. Book excerpt: The opportunistic network is an emerging and recent area of research. To make this research area more adaptable for practical and industrial use, there is a need to further investigate several research challenges in all aspects of opportunistic networks. Therefore, Opportunistic Networks: Fundamentals, Applications and Emerging Trends provides theoretical, algorithmic, simulation, and implementation-based research developments related to fundamentals, applications, and emerging research trends in opportunistic networks. The book follows a theoretical approach to describe fundamentals to beginners and incorporates a practical approach depicting the implementation of real-life applications to intermediate and advanced readers. This book is beneficial for academicians, researchers, developers, and engineers who work in or are interested in the fields related to opportunistic networks, delay tolerant networks, and intermittently connected ad hoc networks. This book also serves as a reference book for graduate and postgraduate courses in computer science, computer engineering, and information technology streams.

Proceedings of International Conference on Trends in Computational and Cognitive Engineering

Download Proceedings of International Conference on Trends in Computational and Cognitive Engineering PDF Online Free

Author :
Publisher : Springer Nature
ISBN 13 : 9813346736
Total Pages : 701 pages
Book Rating : 4.8/5 (133 download)

DOWNLOAD NOW!


Book Synopsis Proceedings of International Conference on Trends in Computational and Cognitive Engineering by : M. Shamim Kaiser

Download or read book Proceedings of International Conference on Trends in Computational and Cognitive Engineering written by M. Shamim Kaiser and published by Springer Nature. This book was released on 2020-12-16 with total page 701 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book presents various computational and cognitive modeling approaches in the areas of health, education, finance, environment, engineering, commerce, and industry. It is a collection of selected conference papers presented at the International Conference on Trends in Computational and Cognitive Engineering (TCCE 2020). It shares cutting-edge insights and ideas from mathematicians, engineers, scientists, and researchers and discusses fresh perspectives on problem solving in a range of research areas.

Proceedings of First International Conference on Computing, Communications, and Cyber-Security (IC4S 2019)

Download Proceedings of First International Conference on Computing, Communications, and Cyber-Security (IC4S 2019) PDF Online Free

Author :
Publisher : Springer Nature
ISBN 13 : 9811533695
Total Pages : 886 pages
Book Rating : 4.8/5 (115 download)

DOWNLOAD NOW!


Book Synopsis Proceedings of First International Conference on Computing, Communications, and Cyber-Security (IC4S 2019) by : Pradeep Kumar Singh

Download or read book Proceedings of First International Conference on Computing, Communications, and Cyber-Security (IC4S 2019) written by Pradeep Kumar Singh and published by Springer Nature. This book was released on 2020-04-27 with total page 886 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book features selected research papers presented at the First International Conference on Computing, Communications, and Cyber-Security (IC4S 2019), organized by Northwest Group of Institutions, Punjab, India, Southern Federal University, Russia, and IAC Educational Trust, India along with KEC, Ghaziabad and ITS, College Ghaziabad as an academic partner and held on 12–13 October 2019. It includes innovative work from researchers, leading innovators and professionals in the area of communication and network technologies, advanced computing technologies, data analytics and intelligent learning, the latest electrical and electronics trends, and security and privacy issues.

Social-based Data Routing Strategies in Delay Tolerant Networks

Download Social-based Data Routing Strategies in Delay Tolerant Networks PDF Online Free

Author :
Publisher :
ISBN 13 :
Total Pages : 107 pages
Book Rating : 4.:/5 (931 download)

DOWNLOAD NOW!


Book Synopsis Social-based Data Routing Strategies in Delay Tolerant Networks by :

Download or read book Social-based Data Routing Strategies in Delay Tolerant Networks written by and published by . This book was released on 2014 with total page 107 pages. Available in PDF, EPUB and Kindle. Book excerpt: Delay Tolerant networks (DTNs) are intermittently connected mobile networks in which the end-to-end paths do not exist. Data delivery in such networks relies upon the contacts that use "store-carry-and-forward" paradigm to forward message from one node to another. However, such intuitive methodology encounters low message delivery ratio and high data transmission delay when applying to different data routing strategies. The design of effective and efficient data routing strategies based on limited knowledge of mobile nodes in DTNs is challenging. In this dissertation, we explore several asp...

Context-Based Routing in Dynamic Networks

Download Context-Based Routing in Dynamic Networks PDF Online Free

Author :
Publisher : Springer Science & Business Media
ISBN 13 : 3834897094
Total Pages : 202 pages
Book Rating : 4.8/5 (348 download)

DOWNLOAD NOW!


Book Synopsis Context-Based Routing in Dynamic Networks by : Bernd-Ludwig Wenning

Download or read book Context-Based Routing in Dynamic Networks written by Bernd-Ludwig Wenning and published by Springer Science & Business Media. This book was released on 2010-11-01 with total page 202 pages. Available in PDF, EPUB and Kindle. Book excerpt: Bernd-Ludwig Wenning presents a context-based routing framework which can be applied to routing in different application domains. The routing framework includes the signaling as well as a decision system that is applied for route selection.

Security, Privacy and Reliability in Computer Communications and Networks

Download Security, Privacy and Reliability in Computer Communications and Networks PDF Online Free

Author :
Publisher : CRC Press
ISBN 13 : 1000795276
Total Pages : 444 pages
Book Rating : 4.0/5 (7 download)

DOWNLOAD NOW!


Book Synopsis Security, Privacy and Reliability in Computer Communications and Networks by : Kewei Sha

Download or read book Security, Privacy and Reliability in Computer Communications and Networks written by Kewei Sha and published by CRC Press. This book was released on 2022-09-01 with total page 444 pages. Available in PDF, EPUB and Kindle. Book excerpt: Future communication networks aim to build an intelligent and efficient living environment by connecting a variety of heterogeneous networks to fulfill complicated tasks. These communication networks bring significant challenges in building secure and reliable communication networks to address the numerous threat and privacy concerns. New research technologies are essential to preserve privacy, prevent attacks, and achieve the requisite reliability. Security, Privacy and Reliability in Computer Communications and Networks studies and presents recent advances reflecting the state-of-the-art research achievements in novel cryptographic algorithm design, intrusion detection, privacy preserving techniques and reliable routing protocols. Technical topics discussed in the book include: Vulnerabilities and Intrusion DetectionCryptographic Algorithms and EvaluationPrivacyReliable Routing ProtocolsThis book is ideal for personnel in computer communication and networking industries as well as academic staff and collegial, master, Ph.D. students in computer science, computer engineering, cyber security, information insurance and telecommunication systems.

Trust Management V

Download Trust Management V PDF Online Free

Author :
Publisher : Springer Science & Business Media
ISBN 13 : 3642221998
Total Pages : 347 pages
Book Rating : 4.6/5 (422 download)

DOWNLOAD NOW!


Book Synopsis Trust Management V by : Ian Wakeman

Download or read book Trust Management V written by Ian Wakeman and published by Springer Science & Business Media. This book was released on 2011-06-17 with total page 347 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the refereed proceedings of the 5th IFIP WG 11.11 International Conference, IFIPTM 2011, held in Copenhagen, Denmark, in June/July 2011. The 14 revised full papers and 8 short papers presented together with the abstracts of 4 keynote talks were carefully reviewed and selected from 42 submissions. The papers feature both theoretical research and real-world case studies from academia, business and government focusing on areas such as: trust models, social and behavioral aspects of trust, trust in networks, mobile systems and cloud computation, privacy, reputation systems, and identity management.