Reference Hub2
SF-APP: A Secure Framework for Authentication and Privacy Preservation in Opportunistic Networks

SF-APP: A Secure Framework for Authentication and Privacy Preservation in Opportunistic Networks

Prashant Kumar, Naveen Chauhan, Narottam Chand, Lalit K. Awasthi
Copyright: © 2018 |Volume: 15 |Issue: 2 |Pages: 20
ISSN: 1545-7362|EISSN: 1546-5004|EISBN13: 9781522542452|DOI: 10.4018/IJWSR.2018040103
Cite Article Cite Article

MLA

Kumar, Prashant, et al. "SF-APP: A Secure Framework for Authentication and Privacy Preservation in Opportunistic Networks." IJWSR vol.15, no.2 2018: pp.47-66. http://doi.org/10.4018/IJWSR.2018040103

APA

Kumar, P., Chauhan, N., Chand, N., & Awasthi, L. K. (2018). SF-APP: A Secure Framework for Authentication and Privacy Preservation in Opportunistic Networks. International Journal of Web Services Research (IJWSR), 15(2), 47-66. http://doi.org/10.4018/IJWSR.2018040103

Chicago

Kumar, Prashant, et al. "SF-APP: A Secure Framework for Authentication and Privacy Preservation in Opportunistic Networks," International Journal of Web Services Research (IJWSR) 15, no.2: 47-66. http://doi.org/10.4018/IJWSR.2018040103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Opportunistic networks are the special class of ad hoc networks where permanent link among the nodes are almost absent and communication occurs when an “opportunity” is found. The opportunistic networks have more diverse features than traditional ad hoc networks, like self-organized nature, intermittent connectivity, store-carry-forward routing mechanism, etc. All these features make opportunistic networks more prone to security threats. This article discusses security challenges and threats to opportunistic networks. Focusing on the specific security requirements of opportunistic networks, proposed is a secure framework for authentication and privacy preservation (SF-APP) for opportunistic networks. The proposed algorithm takes care of authentication, privacy preservation, and trust management. Within this article is a performed security analysis of SF-APP and simulation results show that the proposed framework is capable of fulfilling the security requirements of opportunistic networks.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.