Affiliation:
1. PEC University of Technology, India
2. National Institute of Technology Kurukshetra, India
Abstract
Resource sharing is the most attractive feature of distributed computing. Information is also a kind of resource. The portable computing devices and wireless networks are playing a dominant role in enhancing the information sharing and thus in the advent of many new variants of distributed computing viz. ubiquitous, grid, cloud, pervasive and mobile. However, the open and distributed nature of Mobile Ad Hoc Networks (MANETs), Vehicular Ad Hoc Networks (VANETs) and cloud computing systems, pose a threat to information that may be coupled from one user (or program) to another. The chapter illustrates the general characteristics of ad hoc networks and computing models that make obligatory to design secure protocols in such environments. Further, we present a generic classification of various threats and attacks. In the end, we describe the security in MANETs, VANETs and cloud computing. The chapter concludes with a description of tools that are popularly used to analyze and access the performance of various security protocols.
Reference95 articles.
1. Application of artificial neural network in detection of probing attacks
2. Armando & Alessandro. (2005). The AVISPA tool for the automated validation of internet security protocols and applications. In Computer Aided Verification. Springer Berlin Heidelberg.
3. Armando, Alessandro, & Luca. (2005). An optimized intruder model for SAT-based model-checking of security protocols. In Electronic Notes in Theoretical Computer Science (pp. 91-108). Academic Press.
4. Azogu, I. K., Ferreira, M.T., Larcom, J.A., & Liu, H. (2013). A new anti-jamming strategy for VANET metrics directed security defense. In IEEE Globecom Workshops (vol. 913, pp. 1344-1349). IEEE.
5. A security metric for VANET content delivery