Opportunistic Networks: Mobility Models, Protocols, Security, and Privacy, 1st Edition (Hardback) book cover

Opportunistic Networks

Mobility Models, Protocols, Security, and Privacy, 1st Edition

Edited by Khaleel Ahmad, Nur Izura Udzir, Ganesh Chandra Deka

Chapman and Hall/CRC

314 pages | 129 B/W Illus.

Purchasing Options:$ = USD
Hardback: 9781138093188
pub: 2018-09-18
$179.95
x
eBook (VitalSource) : 9780429453434
pub: 2018-10-03
from $28.98


FREE Standard Shipping!

Description

Opportunistic networks allow mobile users to share information without any network infrastructure.This book is suitable for both undergraduates and postgraduates as it discusses various aspects of opportunistic networking including, foundations of ad hoc network; taxonomy of mobility models, etc.

Table of Contents

Preface

Editors

Contributors

1 Foundations of Opportunistic Networks

Musaeed Abouaroek and Khaleel Ahmad

2 Opportunistic Resource Utilization Networks and Related Technologies

Mai A. Alduailij and Leszek T. Lilien

3 Buffer Management in Delay-Tolerant Networks

Sweta Jain

4 Taxonomy of Mobility Models

Jyotsna Verma

5 Taxonomy of Routing Protocols for Opportunistic Networks

Khaleel Ahmad, Muneera Fathima, and Khairol Amali bin Ahmad

6 Congestion-Aware Adaptive Routing for Opportunistic Networks

Thabotharan Kathiravelu and Nalin Ranasinghe

7 Vehicular Ad Hoc Networks

Sara Najafzadeh

8 Energy Management in OppNets

Itu Snigdh and K. Sridhar Patnaik

9 Network Coding Schemes

Amit Singh

10 Taxonomy of Security Attacks in Opportunistic Networks

Gabriel de Biasi and Luiz F. M. Vieira

11 Pervasive Trust Foundation for Security and Privacy in Opportunistic Resource Utilization Networks

Ahmed Al-Gburi, Abduljaleel Al-Hasnawi, Raed Mahdi Salih, and Leszek T. Lilien

12 Future Networks Inspired by Opportunistic Networks

Anshul Verma, Mahatim Singh, K. K. Pattanaik, and B. K. Singh

13 Time and Data-Driven Triggering to Emulate Cross-Layer Feedback in Opportunistic Networks

Rintu Nath

14 Applications of DTN

Rahul Johari, Prachi Garg, Riya Bhatia, Kalpana Gupta, and Afreen Fatimah

15 Performance Evaluation of Social-Aware Routing Protocols in an Opportunistic Network

Makshudur Rahman and Md. Sharif Hossen

16 Hands-On ONE Simulator: Opportunistic Network Environment

Anshuman Chhabra, Vidushi Vashishth, and Deepak Kumar Sharma

Index

About the Editors

Ganesh Chandra Deka: Ganesh Chandra Deka is the Deputy Director(Training)in Directorate General of Training, Ministry of Skill Development and Entrepreneurship (formerly DGE&T, Ministry of Labor & Employment), Government of India. He is a member of the IEEE and IETE, an associate member of the Institution of Engineers (India), and the editor-in-chief of the International Journal of Computing, Communications, and Networking. His research interests include information and communications technology (ICT) in rural development, e-governance, cloud computing, data mining, NoSQL databases, and vocational education and training. He has edited three books on cloud computing and published more than 40 research papers. He earned a PhD in computer science from Ballsbridge University.

Dr. Khaleel Ahmad is currently an Assistant Professor in the School of Computer Science & Information Technology at Maulana Azad National Urdu University, Hyderabad. Prior to this he has worked at prestigious universities and institutions of national repute. He holds a PhD in Computer Science & Engineering and M.Tech in Information Security. His research area is Opportunistic Network, Cyber Security, Cryptography, Cloud Computing. He has over 30 published papers in refereed National/International Journals & Conferences (viz. Elsevier, ACM, IEEE, and Springer), 10 book chapters (CRC Press, Taylor & Francis Group, IGI Global, IGNOU New Delhi).

Assoc. Prof. Dr. Nur Izura Udzir is an academic staff at the Faculty of Computer Science and Information Technology, Universiti Putra Malaysia (UPM) since 1998. She received her Bachelor of Computer Science (1995) and Master of Science (1998) from UPM, and her PhD in Computer Science from the University of York, UK (2006). Her areas of specialization are access control, intrusion detection systems, secure operating systems, coordination models and languages, and distributed systems. She is currently the Head of Department of Computer Science and a member of the Information Security Group (which she led in 2008-2013) at the faculty.

Subject Categories

BISAC Subject Codes/Headings:
COM043000
COMPUTERS / Networking / General
COM059000
COMPUTERS / Computer Engineering
TEC061000
TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications