Reference Hub3
A Dynamic Security Scheme for OppNets Using Cognitive Computing

A Dynamic Security Scheme for OppNets Using Cognitive Computing

Seema B. Hegde, B. Sathish Babu, Pallapa Venkatram
Copyright: © 2018 |Volume: 9 |Issue: 3 |Pages: 22
ISSN: 1937-9412|EISSN: 1937-9404|EISBN13: 9781522543305|DOI: 10.4018/IJMCMC.2018070102
Cite Article Cite Article

MLA

Hegde, Seema B., et al. "A Dynamic Security Scheme for OppNets Using Cognitive Computing." IJMCMC vol.9, no.3 2018: pp.23-44. http://doi.org/10.4018/IJMCMC.2018070102

APA

Hegde, S. B., Babu, B. S., & Venkatram, P. (2018). A Dynamic Security Scheme for OppNets Using Cognitive Computing. International Journal of Mobile Computing and Multimedia Communications (IJMCMC), 9(3), 23-44. http://doi.org/10.4018/IJMCMC.2018070102

Chicago

Hegde, Seema B., B. Sathish Babu, and Pallapa Venkatram. "A Dynamic Security Scheme for OppNets Using Cognitive Computing," International Journal of Mobile Computing and Multimedia Communications (IJMCMC) 9, no.3: 23-44. http://doi.org/10.4018/IJMCMC.2018070102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Opportunistic communication in MANET's reduce resource starvation and enhances the stability of a network by decreasing high routing overhead. But the frequent opportunistic contact among the devices is prone to security threats. This article proposes a novel cognitive opportunistic computing-based security scheme (COSS) to ensure secure in opportunistic network. The COSS provides multilevel security with different levels of severity. It recommends the security-collaboration-sensitivity parameter(ScS) with collaboration- sensitivity parameter for route handling. Based on the recommended ScS, the type of security scheme is derived from the database and is implemented for that transaction. The scheme involves the following processes for security: contact analysis, belief formulation and security collaboration logic. A COSS scheme is applied in a military attack scenario in which nodes are constructed as a hierarchical model with an access control for communication. Experimental results show that the scheme improves performance in terms of convergence time, energy efficiency and reliability.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.