Reference Hub1
Trust-Based Security Mechanisms for Self-Organized Networks (SONs)

Trust-Based Security Mechanisms for Self-Organized Networks (SONs)

S. Sivagurunathan, K. Prathapchandran
ISBN13: 9781522502395|ISBN10: 1522502394|EISBN13: 9781522502401
DOI: 10.4018/978-1-5225-0239-5.ch004
Cite Chapter Cite Chapter

MLA

Sivagurunathan, S., and K. Prathapchandran. "Trust-Based Security Mechanisms for Self-Organized Networks (SONs)." Self-Organized Mobile Communication Technologies and Techniques for Network Optimization, edited by Ali Diab, IGI Global, 2016, pp. 92-114. https://doi.org/10.4018/978-1-5225-0239-5.ch004

APA

Sivagurunathan, S. & Prathapchandran, K. (2016). Trust-Based Security Mechanisms for Self-Organized Networks (SONs). In A. Diab (Ed.), Self-Organized Mobile Communication Technologies and Techniques for Network Optimization (pp. 92-114). IGI Global. https://doi.org/10.4018/978-1-5225-0239-5.ch004

Chicago

Sivagurunathan, S., and K. Prathapchandran. "Trust-Based Security Mechanisms for Self-Organized Networks (SONs)." In Self-Organized Mobile Communication Technologies and Techniques for Network Optimization, edited by Ali Diab, 92-114. Hershey, PA: IGI Global, 2016. https://doi.org/10.4018/978-1-5225-0239-5.ch004

Export Reference

Mendeley
Favorite

Abstract

Self-Organized Networks (SONs) are an advancement of today's communication that arises to overcome the problems in traditional communications in terms of their planning, configuration, optimization, healing and management since the rate of utilizing communication technology is gradually increasing day by day hence an optimum mechanism is needed to cope up with all the changes in the communication era, the result is self-organized networks. The success of SONs depends on how it is effectively utilized without any compromise in its security. However its unique characteristics offer both opportunities and challenges. The aim of this chapter is to begins with the essential concept of SONs such as Mobile Ad Hoc Networks (MANET), Vehicular Ad Hoc Networks (VANET), Wireless Sensor Networks (WSN), Wireless Mesh Networks (WMN), Peer to Peer Networks (P2P), Cognitive Radio Networks, Bio-Inspired Networks and Internet of Things (IoT) and their limitations in different perspectives. As these networks have penetrated into the human life with an anytime anywhere capability, the security of the data being processed and communicated through these networks become vital. This chapter tries to bring out the issues and challenges in providing a trust based solution mechanisms for this type of networks.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.