Opportunistic networks allow mobile users to share information without any network infrastructure.This book is suitable for both undergraduates and postgraduates as it discusses various aspects of opportunistic networking including, foundations of ad hoc network; taxonomy of mobility models, etc.
Opportunistic Networks Mobility Models, Protocols, Security, And Privacy
โ Scribed by Khaleel Ahmad, Nur Izura Udzir, Ganesh Chandra Deka
- Publisher
- CRC Press
- Year
- 2019
- Tongue
- English
- Leaves
- 327
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Opportunistic networks allow mobile users to share information without any network infrastructure.This book is suitable for both undergraduates and postgraduates as it discusses various aspects of opportunistic networking including, foundations of ad hoc network; taxonomy of mobility models, etc.
โฆ Table of Contents
Content: PrefaceEditorsContributors1 Foundations of Opportunistic NetworksMusaeed Abouaroek and Khaleel Ahmad2 Opportunistic Resource Utilization Networks and Related TechnologiesMai A. Alduailij and Leszek T. Lilien3 Buffer Management in Delay-Tolerant NetworksSweta Jain4 Taxonomy of Mobility ModelsJyotsna Verma5 Taxonomy of Routing Protocols for Opportunistic NetworksKhaleel Ahmad, Muneera Fathima, and Khairol Amali bin Ahmad6 Congestion-Aware Adaptive Routing for Opportunistic NetworksThabotharan Kathiravelu and Nalin Ranasinghe7 Vehicular Ad Hoc NetworksSara Najafzadeh8 Energy Management in OppNetsItu Snigdh and K. Sridhar Patnaik9 Network Coding SchemesAmit Singh10 Taxonomy of Security Attacks in Opportunistic NetworksGabriel de Biasi and Luiz F. M. Vieira11 Pervasive Trust Foundation for Security and Privacy in Opportunistic Resource Utilization NetworksAhmed Al-Gburi, Abduljaleel Al-Hasnawi, Raed Mahdi Salih, and Leszek T. Lilien12 Future Networks Inspired by Opportunistic NetworksAnshul Verma, Mahatim Singh, K. K. Pattanaik, and B. K. Singh13 Time and Data-Driven Triggering to Emulate Cross-Layer Feedback in Opportunistic NetworksRintu Nath14 Applications of DTNRahul Johari, Prachi Garg, Riya Bhatia, Kalpana Gupta, and Afreen Fatimah15 Performance Evaluation of Social-Aware Routing Protocols in an Opportunistic NetworkMakshudur Rahman and Md. Sharif Hossen16 Hands-On ONE Simulator: Opportunistic Network EnvironmentAnshuman Chhabra, Vidushi Vashishth, and Deepak Kumar SharmaIndex
โฆ Subjects
Ad hoc networks (Computer networks)
๐ SIMILAR VOLUMES
The widespread availability of mobile devices coupled with recent advancements in networking capabilities make opportunistic networks one of the most promising technologies for next-generation mobile applications. Are you ready to make your mark? Featuring the contributions of prominent researcher
<P><EM>Mobile and Wireless Network Security and Privacy</EM> analyzes important security and privacy problems in the realms of wireless networks and mobile computing. The material includes a report to the National Science Foundation of the United States which will be used by program managers for the
This book brings together a number of papers that represent seminal contributions underlying mobile and wireless network security and privacy. It provides a foundation for implementation and standardization as well as further research. The diverse topics and protocols described in this book give the
<p><p>This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two users compare their per
This book examines state-of-art research on designing healthcare applications with the consideration of security and privacy. It explains the Mobile Healthcare Network (MHN) architecture and its diverse applications, and reviews the existing works on security and privacy for MHNs. Critical future ch