๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Opportunistic Networks Mobility Models, Protocols, Security, And Privacy

โœ Scribed by Khaleel Ahmad, Nur Izura Udzir, Ganesh Chandra Deka


Publisher
CRC Press
Year
2019
Tongue
English
Leaves
327
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Opportunistic networks allow mobile users to share information without any network infrastructure.This book is suitable for both undergraduates and postgraduates as it discusses various aspects of opportunistic networking including, foundations of ad hoc network; taxonomy of mobility models, etc.

โœฆ Table of Contents


Content: PrefaceEditorsContributors1 Foundations of Opportunistic NetworksMusaeed Abouaroek and Khaleel Ahmad2 Opportunistic Resource Utilization Networks and Related TechnologiesMai A. Alduailij and Leszek T. Lilien3 Buffer Management in Delay-Tolerant NetworksSweta Jain4 Taxonomy of Mobility ModelsJyotsna Verma5 Taxonomy of Routing Protocols for Opportunistic NetworksKhaleel Ahmad, Muneera Fathima, and Khairol Amali bin Ahmad6 Congestion-Aware Adaptive Routing for Opportunistic NetworksThabotharan Kathiravelu and Nalin Ranasinghe7 Vehicular Ad Hoc NetworksSara Najafzadeh8 Energy Management in OppNetsItu Snigdh and K. Sridhar Patnaik9 Network Coding SchemesAmit Singh10 Taxonomy of Security Attacks in Opportunistic NetworksGabriel de Biasi and Luiz F. M. Vieira11 Pervasive Trust Foundation for Security and Privacy in Opportunistic Resource Utilization NetworksAhmed Al-Gburi, Abduljaleel Al-Hasnawi, Raed Mahdi Salih, and Leszek T. Lilien12 Future Networks Inspired by Opportunistic NetworksAnshul Verma, Mahatim Singh, K. K. Pattanaik, and B. K. Singh13 Time and Data-Driven Triggering to Emulate Cross-Layer Feedback in Opportunistic NetworksRintu Nath14 Applications of DTNRahul Johari, Prachi Garg, Riya Bhatia, Kalpana Gupta, and Afreen Fatimah15 Performance Evaluation of Social-Aware Routing Protocols in an Opportunistic NetworkMakshudur Rahman and Md. Sharif Hossen16 Hands-On ONE Simulator: Opportunistic Network EnvironmentAnshuman Chhabra, Vidushi Vashishth, and Deepak Kumar SharmaIndex

โœฆ Subjects


Ad hoc networks (Computer networks)


๐Ÿ“œ SIMILAR VOLUMES


Opportunistic Networks Mobility Models,
โœ Khaleel Ahmad, Nur Izura Udzir, Ganesh Chandra Deka ๐Ÿ“‚ Library ๐Ÿ“… 2019 ๐Ÿ› CRC Press ๐ŸŒ English

Opportunistic networks allow mobile users to share information without any network infrastructure.This book is suitable for both undergraduates and postgraduates as it discusses various aspects of opportunistic networking including, foundations of ad hoc network; taxonomy of mobility models, etc.

Mobile Opportunistic Networks: Architect
โœ Mieso K. Denko ๐Ÿ“‚ Library ๐Ÿ“… 2011 ๐Ÿ› CRC Press ๐ŸŒ English

The widespread availability of mobile devices coupled with recent advancements in networking capabilities make opportunistic networks one of the most promising technologies for next-generation mobile applications. Are you ready to make your mark? Featuring the contributions of prominent researcher

Mobile and Wireless Network Security and
โœ S. Kami Makki, Peter Reiher, Kia Makki, Niki Pissinou, Shamila Makki ๐Ÿ“‚ Library ๐Ÿ“… 2007 ๐Ÿ› Springer ๐ŸŒ English

<P><EM>Mobile and Wireless Network Security and Privacy</EM> analyzes important security and privacy problems in the realms of wireless networks and mobile computing. The material includes a report to the National Science Foundation of the United States which will be used by program managers for the

Mobile and Wireless Network Security and
โœ S. Kami Makki, Peter Reiher, Kia Makki, Niki Pissinou, Shamila Makki ๐Ÿ“‚ Library ๐Ÿ“… 2007 ๐Ÿ› Springer ๐ŸŒ English

This book brings together a number of papers that represent seminal contributions underlying mobile and wireless network security and privacy. It provides a foundation for implementation and standardization as well as further research. The diverse topics and protocols described in this book give the

Security and privacy in mobile social ne
โœ Xiaohui Liang, Rongxing Lu, Xiaodong Lin, Xuemin Shen (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Springer-Verlag New York ๐ŸŒ English

<p><p>This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two users compare their per

Security and Privacy for Mobile Healthca
โœ Kuan Zhang; Xuemin (Sherman) Shen ๐Ÿ“‚ Library ๐Ÿ“… 2015 ๐Ÿ› Springer ๐ŸŒ English

This book examines state-of-art research on designing healthcare applications with the consideration of security and privacy. It explains the Mobile Healthcare Network (MHN) architecture and its diverse applications, and reviews the existing works on security and privacy for MHNs. Critical future ch