Security attacks in opportunistic mobile networks: A systematic literature review
Published 2023 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Security attacks in opportunistic mobile networks: A systematic literature review
Authors
Keywords
-
Journal
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
Volume -, Issue -, Pages 103782
Publisher
Elsevier BV
Online
2023-11-05
DOI
10.1016/j.jnca.2023.103782
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- FAPMIC: Fake Packet and Selective Packet Drops Attacks Mitigation by Merkle Hash Tree in Intermittently Connected Networks
- (2023) Waqar Khalid et al. IEEE Access
- Efficient and Secured Mechanisms for Data Link in IoT WSNs: A Literature Review
- (2023) Muhammad Zulkifl Hasan et al. Electronics
- Securing Wireless Sensor Networks Using Machine Learning and Blockchain: A Review
- (2023) Shereen Ismail et al. Future Internet
- Inspecting VANET with Various Critical Aspects – A Systematic Review
- (2023) Muhammet Ali Karabulut et al. Ad Hoc Networks
- Machine Learning for Wireless Sensor Networks Security: An Overview of Challenges and Issues
- (2022) Rami Ahmad et al. SENSORS
- CEBD: Contact-Evidence-Driven Blackhole Detection Based on Machine Learning in OppNets
- (2021) Yang Gao et al. IEEE Transactions on Computational Social Systems
- Selfishness in Vehicular Delay-Tolerant Networks: A Review
- (2020) Ghani-Ur Rehman et al. SENSORS
- Secure Transmission of IoT mHealth Patient Monitoring Data from Remote Areas Using DTN
- (2020) Elias Yaacoub et al. IEEE NETWORK
- Efficient photo crowdsourcing with evolving POIs under delay-tolerant network environment
- (2020) Shudip Datta et al. Pervasive and Mobile Computing
- A taxonomy on misbehaving nodes in delay tolerant networks
- (2018) Waqar Khalid et al. COMPUTERS & SECURITY
- A Survey of Opportunistic Offloading
- (2018) Dianlei Xu et al. IEEE Communications Surveys and Tutorials
- On location-privacy in opportunistic mobile networks, a survey
- (2018) Sameh Zakhary et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A Survey on Mobile Data Offloading Technologies
- (2018) Huan Zhou et al. IEEE Access
- A Privacy-Preserving Message Forwarding Framework for Opportunistic Cloud of Things
- (2018) Xiaojie Wang et al. IEEE Internet of Things Journal
- A Decade of Research in Opportunistic Networks: Challenges, Relevance, and Future Directions
- (2017) Sacha Trifunovic et al. IEEE COMMUNICATIONS MAGAZINE
- Cryptography-Based Misbehavior Detection and Trust Control Mechanism for Opportunistic Network Systems
- (2017) Sanjay K. Dhurandher et al. IEEE Systems Journal
- CAIS: A Copy Adjustable Incentive Scheme in Community-Based Socially Aware Networking
- (2017) Zhaolong Ning et al. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
- Secure opportunistic routing protocols: methods, models, and classification
- (2017) Mahmood Salehi et al. WIRELESS NETWORKS
- nROAR: Near Real-Time Opportunistic Spectrum Access and Management in Cloud-Based Database-Driven Cognitive Radio Networks
- (2017) Danda B. Rawat et al. IEEE Transactions on Network and Service Management
- nROAR: Near Real-Time Opportunistic Spectrum Access and Management in Cloud-Based Database-Driven Cognitive Radio Networks
- (2017) Danda B. Rawat et al. IEEE Transactions on Network and Service Management
- Stalk and lie—The cost of Sybil attacks in opportunistic networks
- (2016) Sacha Trifunovic et al. COMPUTER COMMUNICATIONS
- Detecting Colluding Blackhole and Greyhole Attacks in Delay Tolerant Networks
- (2016) Thi Ngoc Diep Pham et al. IEEE TRANSACTIONS ON MOBILE COMPUTING
- Secure Routing Based on Social Similarity in Opportunistic Networks
- (2016) Lin Yao et al. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
- Design of efficient lightweight strategies to combat DoS attack in delay tolerant network routing
- (2016) Sujoy Saha et al. WIRELESS NETWORKS
- Catabolism attack and Anabolism defense: A novel attack and traceback mechanism in Opportunistic Networks
- (2015) Majeed Alajeely et al. COMPUTER COMMUNICATIONS
- From MANET to people-centric networking: Milestones and open research challenges
- (2015) Marco Conti et al. COMPUTER COMMUNICATIONS
- Trust management and reputation systems in mobile participatory sensing applications: A survey
- (2015) Hayam Mousa et al. Computer Networks
- Mobility Models, Traces and Impact of Mobility on Opportunistic Routing Algorithms: A Survey
- (2015) Suvadip Batabyal et al. IEEE Communications Surveys and Tutorials
- Safety Challenges and Solutions in Mobile Social Networks
- (2015) Yashar Najaflou et al. IEEE Systems Journal
- Security and Trust in Opportunistic Networks – A Survey
- (2015) Majeed Alajeely et al. IETE TECHNICAL REVIEW
- Protocols for mitigating blackhole attacks in delay tolerant networks
- (2015) Preeti Nagrath et al. WIRELESS NETWORKS
- Security in wireless ad-hoc networks – A survey
- (2014) R. Di Pietro et al. COMPUTER COMMUNICATIONS
- Opportunistic networks
- (2014) C. Boldrini et al. COMPUTER COMMUNICATIONS
- Human mobility in opportunistic networks: Characteristics, models and prediction methods
- (2014) Poria Pirozmand et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- DistressNet: A disaster response system providing constant availability cloud-like services
- (2013) Harsha Chenji et al. Ad Hoc Networks
- Social group detection based routing in Delay Tolerant Networks
- (2013) Roy Cabaniss et al. WIRELESS NETWORKS
- SCAMPI
- (2012) Mikko Pitkänen et al. ACM SIGCOMM Computer Communication Review
- Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks
- (2012) Abderrahmane Baadache et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Socio-Geography of Human Mobility: A Study Using Longitudinal Mobile Phone Data
- (2012) Santi Phithakkitnukoon et al. PLoS One
- A trust-based framework for data forwarding in opportunistic networks
- (2011) Na Li et al. Ad Hoc Networks
- Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey
- (2011) Kannan Govindan et al. IEEE Communications Surveys and Tutorials
- Disruption-Tolerant Networking: A Comprehensive Survey on Recent Developments and Persisting Challenges
- (2011) Maurice J. Khabbaz et al. IEEE Communications Surveys and Tutorials
- Mitigating Routing Misbehavior in Disruption Tolerant Networks
- (2011) Qinghua Li et al. IEEE Transactions on Information Forensics and Security
- On the Levy-Walk Nature of Human Mobility
- (2011) Injong Rhee et al. IEEE-ACM TRANSACTIONS ON NETWORKING
- Trace-based mobility modeling for multi-hop wireless networks
- (2010) Nils Aschenbruck et al. COMPUTER COMMUNICATIONS
- DistressNet: a wireless ad hoc and sensor network architecture for situation management in disaster response
- (2010) Stephen George et al. IEEE COMMUNICATIONS MAGAZINE
- Detecting wormhole attacks in delay-tolerant networks [Security and Privacy in Emerging Wireless Networks
- (2010) Yanzhi Ren et al. IEEE WIRELESS COMMUNICATIONS
- Secure Proxy Signature Schemes for Delegation of Signing Rights
- (2010) Alexandra Boldyreva et al. JOURNAL OF CRYPTOLOGY
- Detecting community structure in complex networks via node similarity
- (2010) Ying Pan et al. PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS
- Modeling Spatial and Temporal Dependencies of User Mobility in Wireless Mobile Networks
- (2009) Wei-Jen Hsu et al. IEEE-ACM TRANSACTIONS ON NETWORKING
- Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks
- (2008) Kemal Bicakci et al. COMPUTER STANDARDS & INTERFACES
- Understanding individual human mobility patterns
- (2008) Marta C. González et al. NATURE
Find the ideal target journal for your manuscript
Explore over 38,000 international journals covering a vast array of academic fields.
SearchCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now