Introduction to advances in trust, security, and privacy for wireless networks

نویسندگان

  • Yulei Wu
  • Félix Gómez Mármol
  • Ahmed Yassin Al-Dubai
چکیده

In recent years, wireless networks have become one of the most influential technological accomplishments and pervaded our daily lives in forms of mobile telephony and wireless computing. Due to their rapid development and widespread applications, trust, security, and privacy issues in wireless networks have become very important topics. As a result, there is a grand challenge to build wireless systems and networks in which various applications allow users to enjoy more comprehensive services while preserving trust, security, and privacy at the same time. The accepted papers in this special issue deal with a wide range of important aspects and challenging issues of trust, security, and privacy techniques for wireless networks, and the contents are built on analytical modelling, and experimental and simulation studies. The contributions of these papers are outlined below. In intelligent transportation systems, the cooperation between vehicles and the roadside units is essential to bring these systems to fruition. Vehicular ad hoc networks (VANETs) are a promising technology to enable communications among vehicles, and between vehicles and roadside units. Eiza et al. propose in their work entitled ‘Investigation of routing reliability of vehicular ad hoc networks’ a new vehicular reliability model to facilitate reliable routing in VANETs. Simulation experiments demonstrate that the proposed reliable routing outperforms significantly the well-known ad hoc on-demand distance vector (AODV) routing protocol in terms of better delivery ratio and less link failures while maintaining a reasonable routing control overhead. Wormhole attack is one of the most severe security threats in wireless mesh networks that can disrupt majority of routing communications when strategically placed. In the paper entitled ‘WRSR: wormhole-resistant secure routing for wireless mesh networks’, Matam and Tripathy

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks

Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...

متن کامل

تأثیر حریم خصوصی، امنیت و اعتماد ادراک شده بر رفتار به اشتراک‌گذاری اطلاعات در شبکه‌های اجتماعی موبایل: نقش تعدیل‌کننده متغیر جنسیت

The appearance of social networks has been one of the most important events in recent decades. One of the issues raised in these networks, is how to trust. The purpose of this paper is to examine the impact of security, trust and privacy about information sharing on mobile social networks. The study also describes how users' gender moderates the privacy and security impact on trust. The current...

متن کامل

An efficient solution for management of pre-distribution in wireless sensor networks

A sensor node is composed of different parts including processing units, sensor, transmitter, receiver, and security unit. There are many nodes in a sensor unit. These networks can be used for military, industrial, medicine, environmental, house, and many other applications. These nodes may be established in the lands of enemies to monitor the relations. Hence, it is important to consider conse...

متن کامل

Analyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks

The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...

متن کامل

Trust Key Management Scheme for Wireless Body Area Networks

With recent advances in wireless sensor networks and embedded computing technologies, miniaturized pervasive health monitoring devices have become practically feasible. In addition to providing continuous monitoring and analysis of physiological parameters, the recently proposed Wireless Body Area Networks (WBAN) incorporates context aware sensing for increased sensitivity and specificity. A nu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • EURASIP J. Wireless Comm. and Networking

دوره 2013  شماره 

صفحات  -

تاریخ انتشار 2013