Main Article Content

Abstract

Opportunistic networks is a new and fast emerging paradigm, spontaneously formed by mobile devices equipped with short range wireless technologies such as Bluetooth, WiMax, and can communicate with other devices with in short range. Unlike other delay tolerant networks such as mobile Adhoc networks, nodes in opportunistic networks follow Store, Carry and Forward mechanism to enable communication with other nodes. Further, a fixed path between the source and destination never exists. Neighbor discovery, connection establishment and data dissemination are challenging tasks in these networks due to frequent disruption of communication links and topology changes. The characteristics of these networks are high mobility of nodes, limited power, low density and long communication delays. These nodes suffer from different kinds of attacks by suspicious nodes making them more complex and challenging networks. Security issues such as confidentiality of data, routing security, cooperation, non-repudiation, access control, availability, authentication and trust management are to be exclusively addressed so as make these networks reliable. This paper discusses various routing protocols in opportunistic networks, types of security attacks, their mitigation strategies and the necessity of further enhancements. 

Article Details

How to Cite
Swathi, V., Sumedha , K., & Sunitha , S. (2019). An Empirical Study on Security Issues and Mitigation Techniques in Opportunistic Networks . Think India Journal, 22(41), 250-257. Retrieved from https://thinkindiaquarterly.org/index.php/think-india/article/view/19415