Authentication using trust framework in opportunistic networks

UP Singh, N Chauhan - 2017 8th International Conference on …, 2017 - ieeexplore.ieee.org
As Opportunistic network refer to a number of wireless nodes opportunistically
communicating with each other in the form of “store-carry-forward” paradigm. There is no …

Authenticating with privacy protection in opportunistic networks

MH Guo, HT Liaw, MY Chiu… - 2015 11th International …, 2015 - ieeexplore.ieee.org
In this study, we propose an authentication mechanism with privacy protection for
opportunistic networks. It is applied for the short-term and limited-time wireless network …

Authentication in opportunistic networks: State and art

M Abouarork, K Ahmad - Journal of Discrete Mathematical …, 2021 - Taylor & Francis
In opportunistic networks, the nodes connect to each other wirelessly and use the store-carry-
forward technique to transmit the data from one node to another node. Opportunistic …

Authentication with privacy preservation in opportunistic networks

P Kumar, N Chauhan, N Chand - … International Conference on …, 2017 - ieeexplore.ieee.org
With the advancement of mobile technologies and devices, a new network paradigm called
“Opportunistic Networks” emerged. Opportunistic networks are based on the spontaneous …

An identity authentication scheme for opportunistic network based on multidimensional scaling

X Cao, Y Yin - … on Cyber-Enabled Distributed Computing and …, 2014 - ieeexplore.ieee.org
This paper proposed an identity authentication scheme for opportunistic networks based on
multidimensional scaling. The scheme provides a method to evaluate the trust relationship …

Trust management in opportunistic networks

MRP Gonçalves, E dos Santos Moreira… - 2010 Ninth …, 2010 - ieeexplore.ieee.org
The increase of people using mobile devices to perform their daily duties has leveraged a
number of innovations in wireless network capabilities. Among these changes, there is the …

SF-APP: A secure framework for authentication and privacy preservation in opportunistic networks

P Kumar, N Chauhan, N Chand… - International Journal of …, 2018 - igi-global.com
Opportunistic networks are the special class of ad hoc networks where permanent link
among the nodes are almost absent and communication occurs when an “opportunity” is …

The research of the route protocols in opportunistic network

Z Sui - 2015 International Conference on Computational …, 2015 - ieeexplore.ieee.org
In the opportunistic network, because of the impact of the sparse network, the mobile nodes,
the range of communication and other factors, in this case network nodes will detach from …

Security and trust in opportunistic networks–a survey

M Alajeely, R Doss, A Ahmad - IETE Technical Review, 2016 - Taylor & Francis
Opportunistic networks or OppNets refer to a number of wireless nodes opportunistically
communicating with each other in a form of “Store–Carry–Forward”. This occurs when they …

Security challenges in opportunistic communication

A Shikfa - 2011 IEEE GCC Conference and Exhibition (GCC), 2011 - ieeexplore.ieee.org
Opportunistic networks requires to revisit all security aspects of communication due to their
specific requirements. In this article, we present the new security challenges of opportunistic …