Security and trust management in opportunistic networks: a survey

@article{Wu2015SecurityAT,
  title={Security and trust management in opportunistic networks: a survey},
  author={Yue Wu and Yimeng Zhao and Michel Riguidel and Guanghao Wang and Ping Yi},
  journal={Security and Communication Networks},
  year={2015},
  volume={8},
  pages={1812-1827}
}
As a new networking paradigm, opportunistic networking communications have great vision in animal migration tracking, mobile social networking, network communications in remote areas and intelligent transportation, and so on. Opportunistic networks are one of the evolutionary mobile ad hoc networks, whose communication links often suffer from frequent disruption and long communication delays. Therefore, many opportunistic forwarding protocols present major security issues, and the design of… CONTINUE READING
Highly Cited
This paper has 35 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 16 extracted citations

Unmasking non-simultaneous sybils in mobile opportunistic networks

2016 Ninth International Conference on Contemporary Computing (IC3) • 2016
View 11 Excerpts
Highly Influenced

Policy-Based Approach for Securing Message Dissemination in Mobile Ad Hoc Networks

2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech) • 2018
View 2 Excerpts

A survey of attacks in mobile ad hoc networks

2017 International Conference on Engineering & MIS (ICEMIS) • 2017
View 1 Excerpt

Authentication using trust framework in opportunistic networks

2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT) • 2017
View 1 Excerpt

Context-Aware Configuration and Management of WiFi Direct Groups for Real Opportunistic Networks

2017 IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems (MASS) • 2017
View 2 Excerpts

Game-based secure sensing for the mobile cognitive radio network

2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) • 2017
View 1 Excerpt

References

Publications referenced by this paper.
Showing 1-10 of 79 references

Performance analysis of the CONFIDANT protocol, Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing (MobiHoc02)

S Buchegger, Boudec JYL
Lausanne, Switzerland, • 2002
View 5 Excerpts
Highly Influenced

On Trust Establishment in Mobile Ad-Hoc Networks

Security Protocols Workshop • 2002
View 10 Excerpts
Highly Influenced

A secure incentive scheme for delay tolerant networks

2008 Third International Conference on Communications and Networking in China • 2008
View 4 Excerpts
Highly Influenced

Assessment of Access Control Systems Using Mutation Testing

2015 IEEE/ACM 1st International Workshop on TEchnical and LEgal aspects of data pRivacy and SEcurity • 2015
View 1 Excerpt

15274–15278

Pentland AS Lazer D. Inferring friendship network structure Eagle N, 10636
Security Comm. Networks • 2014