“…In another study, Oh et al (2010) extended the concept of Content-Centric Networking (CCN) (Jacobson et al, 2009) The second group of studies attempted to address cybersecurity concerns in MANET systems. The open and distributed nature of MANET systems may make them more susceptible to malicious activities (Islam & Shaikh, 2013). One example of studies in this group is Bakar et al, (Bakar et al, 2012) which introduced a new MANET architecture that relies on an access control model for facilitating information transmission and preserving the integrity of data exchange operations.…”
Section: Manet Systems and Their Applications In Emergency Managementmentioning
One of the most time‐sensitive and critical tasks for first responders in the aftermath of a disaster is to locate people for effective and successful rescue operations. The existing solutions for large‐scale location detection of citizens depend on expensive equipment that may not be readily available in many urban areas and also cannot cover a vast area quickly. To address this challenge, the present study proposes a novel location estimation method by creating a Mobile Ad Hoc Network (MANET) using citizens' mobile phones. The proposed solution can accurately estimate the location of mobile devices in a MANET based on their Received Signal Strength (RSS) and communicate the estimated location coordinates to first responders without any dependencies on telecommunication infrastructures. This system will help first responders locate and map mobile devices in the affected area in a matter of seconds to improve the efficiency and effectiveness of postdisaster rescue operations. The envisioned solution offers unique capabilities that differentiate it from previously existing methods. The proposed method directly estimates device locations using their basic cellular signal strength without any dependency on GPS and relies only on basic cellphone signals. Therefore, nonsmartphones can also join and function in the envisioned MANET system. It also does not impose any computational operations or requirements for installing an app on citizens' phones. The performance of the proposed system was empirically evaluated using a simulation analysis. The results indicated that the method could efficiently and accurately discover more than 93% of mobile devices and estimate their locations.
“…In another study, Oh et al (2010) extended the concept of Content-Centric Networking (CCN) (Jacobson et al, 2009) The second group of studies attempted to address cybersecurity concerns in MANET systems. The open and distributed nature of MANET systems may make them more susceptible to malicious activities (Islam & Shaikh, 2013). One example of studies in this group is Bakar et al, (Bakar et al, 2012) which introduced a new MANET architecture that relies on an access control model for facilitating information transmission and preserving the integrity of data exchange operations.…”
Section: Manet Systems and Their Applications In Emergency Managementmentioning
One of the most time‐sensitive and critical tasks for first responders in the aftermath of a disaster is to locate people for effective and successful rescue operations. The existing solutions for large‐scale location detection of citizens depend on expensive equipment that may not be readily available in many urban areas and also cannot cover a vast area quickly. To address this challenge, the present study proposes a novel location estimation method by creating a Mobile Ad Hoc Network (MANET) using citizens' mobile phones. The proposed solution can accurately estimate the location of mobile devices in a MANET based on their Received Signal Strength (RSS) and communicate the estimated location coordinates to first responders without any dependencies on telecommunication infrastructures. This system will help first responders locate and map mobile devices in the affected area in a matter of seconds to improve the efficiency and effectiveness of postdisaster rescue operations. The envisioned solution offers unique capabilities that differentiate it from previously existing methods. The proposed method directly estimates device locations using their basic cellular signal strength without any dependency on GPS and relies only on basic cellphone signals. Therefore, nonsmartphones can also join and function in the envisioned MANET system. It also does not impose any computational operations or requirements for installing an app on citizens' phones. The performance of the proposed system was empirically evaluated using a simulation analysis. The results indicated that the method could efficiently and accurately discover more than 93% of mobile devices and estimate their locations.
“…For edge computing, various studies on security of several edge computing archetypes have been reported, e.g. fog computing [6][7][8][9][10], mobile edge computing [10][11][12], mobile cloud computing [13][14][15], and mobile ad-hoc cloud computing [16][17][18]. These preliminary analyses examine security threats that influence the integrity of these edge computing archetypes, together with an overview of the security procedures of defending all functions and infrastructures.…”
“…They also provided complete security solutions for Mobile Ad hoc Networks. Bing Wu et al [27] had a survey on various attacks and their solutions in Mobile Ad hoc Networks. They proposed various solutions to reduce security vulnerabilities.…”
In recent era security is very much desired for the messages transmitted through the network. The study shows that, even though many approaches have been proposed towards security till date, still the security loopholes also emerging, so constant advancement is crucial for data security. Since all nodes in the network work together as a team to transmit the data, the network may prone to active or passive attacks such as Eavesdropping, Jamming, traffic analysis, Denial of Service, monitoring etc. The research paper introduces a new selective encryption method termed as Selective Significant Data Encryption (SSDE). The SSDE presents adequate protection to the data encryption process by picking up only the significant content from the complete message by referring Natural Language Processing (NLP). As a result, the encryption time overhead will get reduced, and overall performance will improve. Symmetric key algorithms are generally proficient and quick cryptosystem compared to other techniques, so Blowfish system is used for encryption/decryption process. The proposed research work is compared with many conventional methods and found that this approach is more superior to other traditional means.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.