Affiliation:
1. School of Business, Lebanese American University, Beirut 1102 2801, Lebanon
2. SATIE Laboratory CNRS–UMR 8029, CY Tech, CY Cergy Paris University, 95000 Cergy, France
Abstract
The intersection of cybersecurity and opportunistic networks has ushered in a new era of innovation in the realm of wireless communications. In an increasingly interconnected world, where seamless data exchange is pivotal for both individual users and organizations, the need for efficient, reliable, and sustainable networking solutions has never been more pressing. Opportunistic networks, characterized by intermittent connectivity and dynamic network conditions, present unique challenges that necessitate innovative approaches for optimal performance and sustainability. This paper introduces a groundbreaking paradigm that integrates the principles of cybersecurity with opportunistic networks. At its core, this study presents a novel routing protocol meticulously designed to significantly outperform existing solutions concerning key metrics such as delivery probability, overhead ratio, and communication delay. Leveraging cybersecurity’s inherent strengths, our protocol not only fortifies the network’s security posture but also provides a foundation for enhancing efficiency and sustainability in opportunistic networks. The overarching goal of this paper is to address the inherent limitations of conventional opportunistic network protocols. By proposing an innovative routing protocol, we aim to optimize data delivery, minimize overhead, and reduce communication latency. These objectives are crucial for ensuring seamless and timely information exchange, especially in scenarios where traditional networking infrastructures fall short. By large-scale simulations, the new model proves its effectiveness in the different scenarios, especially in terms of message delivery probability, while ensuring reasonable overhead and latency.
Reference37 articles.
1. Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System, HN Publishing.
2. Blockchain Challenges and Opportunities: A Survey;Zheng;Int. J. Web Grid Serv.,2018
3. Cybersecurity Measures for Critical Infrastructure Protection;Doe;IEEE Trans. Inf. Forensics Secur.,2015
4. Ruoti, S., Rodrigues, B., and Gkantsidis, C. (2018). Identity, Identification, and Identifiability: The Language of Self-Sovereign Identity. arXiv.
5. Security and Trust in Opportunistic Networks—A Survey;Alajeely;IETE Tech. Rev.,2015
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献