The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Opportunistic networks (OppNets) are networks that can be used in situations of sparse network connectivity. Strategies for implementing secure transmission of messages in OppNets offer complex and distinctive problems that are wholly different from traditional networks using TCP/IP protocols for data transmission. In this paper, a security protocol named FuzzyPT is proposed which combats black hole...
Cloud computing has recently become an extremely useful facet of modern distributed systems. Some of its many applications lie in the development of web services, its federation with the Internet of Things (IoT) and services for users in the form of storage, computing and networking facilities. However, as more services start utilizing the Cloud as a viable option, security concerns regarding user...
Opportunistic Networks (OppNets) are a sub-class of wireless Delay Tolerant Networks (DTNs) that can be utilized in areas of sporadic network connectivity. OppNets consist of a network of mobile devices that cooperate with each other to forward messages from the source to the destination. However, in a practical real-world setting, nodes behave selfishly and do not choose to be cooperative all throughout...
Opportunistic Networks, a subset of Delay Tolerant Networks (DTNs), do not have a predefined source to destination end-to-end path and hence, offer a multitude of challenges with regard to security. In this paper a Potential Threat (PT) based security protocol has been developed which models the characters of the incoming nodes on the basis of swift delivery of messages, their reputation and history...
There have been many recent developments in integrating the Cloud with the Internet of Τhings (IoT) which comprise of up and coming technologies such as Smart Cities and Smart devices. This federation has resulted in research being directed towards further integration of Big Data with the Cloud, as IoT devices consisting of such technologies generate a continuous stream of sensor data. Thus, in this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.