2015
DOI: 10.1080/02564602.2015.1094383
|View full text |Cite
|
Sign up to set email alerts
|

Security and Trust in Opportunistic Networks – A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
2
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 22 publications
(9 citation statements)
references
References 20 publications
0
9
0
Order By: Relevance
“…Model. In OppNets, the malicious node may modify or change the content of the messages [28,29,30]. To secure an opportunistic network from such type of attacks, we proposed an NTRU algorithm that shall eradicate the malicious nodes and useful in secure message communication.…”
Section: Systemmentioning
confidence: 99%
“…Model. In OppNets, the malicious node may modify or change the content of the messages [28,29,30]. To secure an opportunistic network from such type of attacks, we proposed an NTRU algorithm that shall eradicate the malicious nodes and useful in secure message communication.…”
Section: Systemmentioning
confidence: 99%
“…One way to preserve the confidentiality of messages is to encrypt them so that they can only be read by the intended parties. Encryption [3] in OppNets is a challenging oper-ation. Conventional encryption schemes [4] both symmetric and asymmetric techniques are resource-intensive and nodes in OppNet are usually resource-constrained.…”
Section: Introductionmentioning
confidence: 99%
“…Route maintenance process is initiated during link failures or disconnections. MANETs' routing protocols may be categorized on the base of topology-based [1,13,18] and position-based [11,10,6,2]. Information transmits in different ways between these protocols over the network depend on many factors.To shrink the consequence of link breakage on the network service leads to enhance the routingperformance.…”
Section: Introductionmentioning
confidence: 99%