Opportunistic Networks Mobility Models, Protocols, Security, And Privacy

E-Book Overview

Opportunistic networks allow mobile users to share information without any network infrastructure.This book is suitable for both undergraduates and postgraduates as it discusses various aspects of opportunistic networking including, foundations of ad hoc network; taxonomy of mobility models, etc.

E-Book Information

  • Year: 2,019

  • Pages: 314

  • Pages In File: 327

  • Language: English

  • Topic: 100

  • Identifier: 0429453434, 1138093181, 9781138093188, 9780429453434

  • Org File Size: 36,539,460

  • Extension: pdf

  • Tags: Ad hoc networks (Computer networks)

  • Toc: Content: PrefaceEditorsContributors1 Foundations of Opportunistic NetworksMusaeed Abouaroek and Khaleel Ahmad2 Opportunistic Resource Utilization Networks and Related TechnologiesMai A. Alduailij and Leszek T. Lilien3 Buffer Management in Delay-Tolerant NetworksSweta Jain4 Taxonomy of Mobility ModelsJyotsna Verma5 Taxonomy of Routing Protocols for Opportunistic NetworksKhaleel Ahmad, Muneera Fathima, and Khairol Amali bin Ahmad6 Congestion-Aware Adaptive Routing for Opportunistic NetworksThabotharan Kathiravelu and Nalin Ranasinghe7 Vehicular Ad Hoc NetworksSara Najafzadeh8 Energy Management in OppNetsItu Snigdh and K. Sridhar Patnaik9 Network Coding SchemesAmit Singh10 Taxonomy of Security Attacks in Opportunistic NetworksGabriel de Biasi and Luiz F. M. Vieira11 Pervasive Trust Foundation for Security and Privacy in Opportunistic Resource Utilization NetworksAhmed Al-Gburi, Abduljaleel Al-Hasnawi, Raed Mahdi Salih, and Leszek T. Lilien12 Future Networks Inspired by Opportunistic NetworksAnshul Verma, Mahatim Singh, K. K. Pattanaik, and B. K. Singh13 Time and Data-Driven Triggering to Emulate Cross-Layer Feedback in Opportunistic NetworksRintu Nath14 Applications of DTNRahul Johari, Prachi Garg, Riya Bhatia, Kalpana Gupta, and Afreen Fatimah15 Performance Evaluation of Social-Aware Routing Protocols in an Opportunistic NetworkMakshudur Rahman and Md. Sharif Hossen16 Hands-On ONE Simulator: Opportunistic Network EnvironmentAnshuman Chhabra, Vidushi Vashishth, and Deepak Kumar SharmaIndex

You might also like

Functional Programming
Authors: Fokker J.    167    0


Image Processing In C
Authors: Dwayne Phillips    157    0


Tex For The Impatient
Authors: Abrahams P.W. , Hargreaves K.A. , Berry K.    155    0


Adobe Golive 6.0
Authors: Adobe Creative Team    126    0


Oracle9i Recovery Manager Reference
Authors: Ashdown L.    220    0


Configuring Windows 2000 Without Active Directory
Authors: Bailey C. , Shinder T. , Shinder T.W.    105    0


Hacking Google Maps And Google Earth
Authors: Martin C. Brown    35    0


Advanced Sql Database Programmer Handbook
Authors: Burleson D.K. , Celko J. , Cook J.P.    94    0


Hack Proofing Coldfusion
Authors: Casco S. , Rusher R. , Meyer G.    13    0


Firewalls And Internet Security: Repelling The Wily Hacker
Authors: William R. Cheswick , Steven M. Bellovin , Aviel D. Rubin    61    0