Title :
Security Inopportunistic Networks
Author :
Xi, Chen ; Guangsong, Li ; Youliang, Tian ; Jianfeng, Ma
Author_Institution :
Minist. of Educ. Key Lab. of Comput., Xidian Univ., Xi´´an, China
Abstract :
Opportunistic Networks is an evolution of delay-tolerant networks and mobile ad-hoc networks which has a widespread uses in both of civilian and military. However, the security problems in opportunistic networks are increasingly serious due to its natural characteristics of extreme intermittent and self-organized. In this paper, we present the key issues and challenges in opportunistic networks at different network layers. Then we analyze the related security schemes including the key management, security routing, privacy and trust management. Based on these discussions, finally we point out the potential future research directions on the security in opportunistic networks.
Keywords :
data privacy; delay tolerant networks; mobile ad hoc networks; mobile computing; telecommunication network management; telecommunication network routing; telecommunication security; delay-tolerant networks; key management; mobile ad-hoc networks; network layers; opportunistic networks; personal mobile computing devices; privacy; security routing; security schemes; trust management; Ad hoc networks; Communities; Cryptography; Mobile communication; Mobile computing; Routing; Community; Key Management; OpportunisticNetworks; Privacy; Security Routing; Trust Management;
Conference_Titel :
Industrial Control and Electronics Engineering (ICICEE), 2012 International Conference on
Conference_Location :
Xi´an
Print_ISBN :
978-1-4673-1450-3
DOI :
10.1109/ICICEE.2012.533