Security framework for opportunistic networks

P Kumar, N Chauhan, N Chand - … : Proceedings of ICACNI 2016, Volume 2, 2018 - Springer
Opportunistic Networks have evolved as special class of mobile ad hoc and delay tolerant
networks which have a vast range of applications. In opportunistic networks, the permanent …

Authentication in opportunistic networks: State and art

M Abouarork, K Ahmad - Journal of Discrete Mathematical …, 2021 - Taylor & Francis
In opportunistic networks, the nodes connect to each other wirelessly and use the store-carry-
forward technique to transmit the data from one node to another node. Opportunistic …

SF-APP: A secure framework for authentication and privacy preservation in opportunistic networks

P Kumar, N Chauhan, N Chand… - International Journal of …, 2018 - igi-global.com
Opportunistic networks are the special class of ad hoc networks where permanent link
among the nodes are almost absent and communication occurs when an “opportunity” is …

Security in opportunistic networks

M Singh, P Verma, A Verma - Opportunistic networks, 2021 - taylorfrancis.com
The opportunistic network is a result of intensive research of so many years on mobile ad
hoc networks (MANETs), therefore it is called an extension of MANET. In opportunistic …

Security and trust management in opportunistic networks: a survey

Y Wu, Y Zhao, M Riguidel, G Wang… - Security and …, 2015 - Wiley Online Library
As a new networking paradigm, opportunistic networking communications have great vision
in animal migration tracking, mobile social networking, network communications in remote …

Secure and privacy-preserving structure in opportunistic networks

S Rashidibajgan, T Hupperich, R Doss, A Förster - Computers & Security, 2021 - Elsevier
Due to the lack of end to end connection in Opportunistic networks (OppNets), messages are
sent from a node to another, from a source to a destination, opportunistically. The …

Authentication with privacy preservation in opportunistic networks

P Kumar, N Chauhan, N Chand - … International Conference on …, 2017 - ieeexplore.ieee.org
With the advancement of mobile technologies and devices, a new network paradigm called
“Opportunistic Networks” emerged. Opportunistic networks are based on the spontaneous …

Security attacks in opportunistic mobile networks: A systematic literature review

A Altaweel, S Aslam, I Kamel - Journal of Network and Computer …, 2023 - Elsevier
Abstract Opportunistic Mobile Networks (OMNs), also known as Delay Tolerant Networks
(DTNs), refer to wireless networks in which the mobile nodes (eg, smartphones, tablets …

Taxonomy of security attacks in opportunistic networks

G de Biasi, LFM Vieira - Opportunistic Networks, 2018 - taylorfrancis.com
This chapter discusses several security attacks that exist on computer networks that might
directly or indirectly affect all kinds of opportunistic networks. Opportunistic networks have …

Security and trust in opportunistic networks–a survey

M Alajeely, R Doss, A Ahmad - IETE Technical Review, 2016 - Taylor & Francis
Opportunistic networks or OppNets refer to a number of wireless nodes opportunistically
communicating with each other in a form of “Store–Carry–Forward”. This occurs when they …