|Total results: 955||
|Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications
Danda B. Rawat, Bhed B. Bista, Gongjun Yan.
While security is of vital importance to ensure the integrity of communications in wireless and mobile networks, most businesses which rely on these networks expect a high level of security and privacy to ensure the integrity and confidentiality of communications among terminals, networks...
Trust Management in Mobile Environments: Autonomic and Usable Models
In a digital context, trust is a multifaceted concept, including trust in application usability, trust in information security, and trust in fellow users. Mobile technologies have compounded the impact of such considerations.
Trust Management in Mobile Environments: Autonomic and Usable Models...
“Yeah, There’s an App for That”: Using Mobile Applications in Public Speaking Instruction
Matthew H. Barton, Kevin A. Stein.
To help students: 1) learn to use mobile applications as the basis for speech topic selection; 2) identify new outlets for using technology to acquire information and solve problems; 3) learn to use cloud based information management tools to identify and organize research; 4) explore public speaking...
Introduction to Mobile and Wireless Communications Networks
Danda B. Rawat, Bhed Bahadur Bista, Gongjun Yan.
Wireless communication networks offer transmission of signals, such as voice, data, and multimedia, without using wires, which is the crucial part of mobile communications. After successful deployment of wireless cellular networks in licensed bands and Wi-Fi networks in unlicensed bands, such as...
Security in Wireless Metropolitan Area Networks: WiMAX and LTE
Lei Chen, Cihan Varol, Qingzhong Liu, Bing Zhou.
Thanks to the much larger geographical coverage and pleasing bandwidth of data transmissions, Wireless Metropolitan Area Networks (WMANs) have become widely accepted in many countries for everyday communications. Two of the main wireless technologies used in WMANs, the Worldwide Interoperability for...
Physical Layer Security and Its Applications: A Survey
Rajesh K. Sharma.
This chapter provides a survey of physical layer security and key generation methods. This includes mainly an overview of ongoing research in physical layer security in the present and next generation communication networks. Although higher layer security mechanisms and protocols address wireless...
Physical Layer Security in Wireless Communication Networks
Özge Cepheli, Günes Karabulut Kurt.
Physical layer (PHY) security has become an emerging area of research recently. Wireless networks use unguided medium as communication channels, so gathering wireless data transmission is easier when compared to traditional cable systems. With the rise of new security challenges, many different...
Security and Connectivity Analysis in Vehicular Communication Networks
Hamada Alshaer, Sami Muhaidat, Raed Shubair, Moein Shayegannia.
Reliable Vehicular Ad-Hoc Networks (VANETs) require secured uninterrupted uplink and downlink connectivity to guarantee secure ubiquitous vehicular communications. VANET mobility, multi-fading wireless, and radio channels could result in unsecured and disrupted vehicular communications, isolating some...
Location Security in Vehicular Wireless Networks
Gongjun Yan, Danda B. Rawat, Bhed Bahadur Bista, Lei Chen.
In Vehicular Ad-Hoc Networks (VANETs), applications are based on one fundamental piece of information: location. Therefore, attackers will exploit location information to launch attacks. The authors present an in-depth survey of location security methods that have been recently proposed in literature....
Misbehavior Detection in VANET: A Survey
Shefali Jain, Anish Mathuria, Manik Lal Das.
Vehicular Networks (VANETs) have received increased attention from researchers in recent years. VANETs facilitate various safety measures that help in controlling traffic and saving human lives. As VANETs consist of multiple entities, effective measures for VANET safety are to be addressed as per...
Intrusion Detection in Vehicular Ad-Hoc Networks on Lower Layers
Chong Han, Sami Muhaidat, Ibrahim Abualhaol, Mehrdad Dianati, Rahim Tafazolli.
Vehicular Ad-Hoc Networks (VANETs) are a critical component of the Intelligent Transportation Systems (ITS), which involve the applications of advanced information processing, communications, sensing, and controlling technologies in an integrated manner to improve the functionality and the safety of...
Security Issues in Mobile Ad Hoc Networks: A Survey
Sunil Kumar, Kamlesh Dutta.
A Mobile Ad hoc NETwork (MANET) is a self-organizing, infrastructure-less network of mobile nodes connecting by wireless links. In operation, the nodes of MANETs do not have a central control mechanism. It is known for its properties of routable network, where each node acts as a router to forward...
Security and Privacy in Mobile Ad hoc Social Networks
Mohamed Amine Ferrag, Mehdi Nafa, Salim Ghanemi.
In this chapter, first, the authors briefly introduce the two new systems “MASN-OLSR” (Mobile Ad Hoc Social Networks with OLSR) and “MASN-AODV” (Mobile Ad Hoc Social Networks with AODV). Then they choose wormhole and black hole attack methods, because they are not completely solved, especially in a...
A Multi-Parameter Trust Framework for Mobile Ad Hoc Networks
Ji Guo, Alan Marshall, Bosheng Zhou.
This chapter presents a novel trust model called Multi-Parameter Trust Framework for Mobile ad hoc networks (MTFM). A key feature of this proposed framework is its use of multiple rather than a single parameter to decide the resulting trust value, applying Grey theory. Results presented here...
Trust Management and Modeling Techniques in Wireless Communications
Revathi Venkataraman, M. Pushpalatha, T. Rama Rao.
Trust management is an emerging technology to facilitate secure interactions between two communicating entities in distributed environments where the traditional security mechanisms are insufficient due to incomplete knowledge about the remote entities. With the development of ubiquitous computing and...
Privacy Protection in Vehicular Ad-Hoc Networks
Gongjun Yan, Danda B. Rawat, Bhed Bahadur Bista, Wu He, Awny Alnusair.
The first main contribution of this chapter is to take a non-trivial step towards providing a robust and scalable solution to privacy protection in vehicular networks. To promote scalability and robustness the authors employ two strategies. First, they view vehicular networks as consisting of...
Security Challenges in Wireless Sensor Network
Meenakshi Tripathi, M.S. Gaur, V.Laxmi.
Wireless Sensor Networks are a subset of ad hoc networks. Their unique characteristics are smaller node size, high node density, unattended operation in remote areas. Dynamic topology and wireless communication make them vulnerable to numerous types of attacks. In addition to that, memory, processing...
Mobile Cloud Computing and Its Security and Privacy Challenges
Hassan Takabi, Saman Taghavi Zargar, James B. D. Joshi.
Mobile cloud computing has grown out of two hot technology trends, mobility and cloud. The emergence of cloud computing and its extension into the mobile domain creates the potential for a global, interconnected mobile cloud computing environment that will allow the entire mobile ecosystem to enrich...
State of the Art for Near Field Communication: Security and Privacy Within the Field
This chapter provides an overview of Near Field Communication (NFC) technology. It first introduces the technology and gives a brief history. It examines what the technology is and how it works. It looks at the various operation modes and hardware architectures available for the technology. This is...
Seamless Mobility Management: A Need for Next Generation All-IP Wireless Networks
The next generation wireless networks will be heterogeneous wireless environments because of the coexistence of a large variety of wireless access technologies. The different networks have different architectures and protocols. So it is difficult for a user to roam from one radio system to another...
900MHz Spectrum Refarming Analysis for UMTS900 Deployment
Chitra Singh Budhathoki Magar.
Refarming means re-arrangement of the traditionally allotted spectrum for a technology/application/service and carving out a part of the spectrum for technology/application/service with higher value. The refarming concept can be used for 3G network deployment in 2G bands or for 4G network deployment in...
Trust Modeling and Computational Trust: Digitalizing Trust
The trust model is the method to specify, evaluate, setup, and ensure trust relationships. It is the way to assist the process of trust in a digital system. This chapter introduces the technologies of trust modeling. The authors classify existing trust models based on different criteria and introduce a...