Skip to main content

Network Big Data Security Issues

  • Living reference work entry
  • First Online:
Encyclopedia of Big Data Technologies

Definitions

  • Mobile ad hoc network (MANET): It is a type of wireless networks which is most suitable for environment where establishing other types of networks are neither possible nor advisable. A node in MANETs performs the role of both host as well as router.

  • Cloud computing: It is a type of Internet-based computing platform, where different services such as storage, database, integration, security, and management are delivered to computers and devices through the internet. It stores and maintains the data in a cloud data center. Cloud center usually supports more numbers of users, applications, and data.

  • Internet of things (IoT): It is the collection of different things (physical gadgets, vehicles, home machines, etc.) inserted with hardware, programming, sensors, and actuators. It can be acknowledged in three standards: web situated (middleware), things arranged (sensors), and semantic-arranged (information).

Introduction

Today a wide range of wireless products are available in the...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  • Abdelhaq M, Serhan S, Alsaqour R, Hassan R (2011) A local intrusion detection routing security over MANET network. In: Electrical engineering and informatics (ICEEI), 2011 international conference on, IEEE, pp 1–6

    Google Scholar 

  • Hidano S, Pecovsky M, Kiyomoto S (2015) New security challenges in the 5g network. In: International symposium on intelligence computation and applications, Springer, pp 619–630

    Google Scholar 

  • Joshi P (2011) Security issues in routing protocols in MANETs at network layer. Procedia Comput Sci 3:954–960. https://doi.org/10.1016/j.procs.2010.12.156. http://www.sciencedirect.com/science/article/pii/S1877050910005314, world conference on information technology

    Article  Google Scholar 

  • Lacink M, Ristve J (2017) Smart city, safety and security. Procedia Eng 192(Supplement C):522–527

    Article  Google Scholar 

  • Mantas G, Komninos N, Rodriuez J, Logota E, Marques H (2015) Security for 5G communications. In: Rodriguez J (ed) Fundamentals of 5G mobile networks. Wiley, pp 207–220. ISBN:9781118867464. https://www.wiley.com/en-gb/Fundamentals+of+5G+Mobile+Networks-p-9781118867525

  • Matharu GS, Upadhyay P, Chaudhary L (2014) The internet of things: challenges & security issues. In: Emerging technologies (ICET), 2014 international conference on, IEEE, pp 54–59

    Google Scholar 

  • Mazin A, Davaslioglu K, Gitlin RD (2017) Secure key management for 5g physical layer security. In: Wireless and microwave technology conference (WAMICON), 2017 IEEE 18th, IEEE, pp 1–5

    Google Scholar 

  • Mohanty SP, Choppali U, Kougianos E (2016) Everything you wanted to know about smart cities. IEEE Consumer Electron Mag 5(3):60–70

    Article  Google Scholar 

  • Nguyen KT, Laurent M, Oualha N (2015) Survey on secure communication protocols for the internet of things. Ad Hoc Netw 32:17–31

    Article  Google Scholar 

  • Obi OO (2004) Security issues in mobile ad-hoc networks: a survey. In: The 17th White House papers graduate research in informatics at Sussex

    Google Scholar 

  • Qin Z, Liu Y, Ding Z, Gao Y, Elkashlan M (2016) Physical layer security for 5g nonorthogonal multiple access in large-scale networks. In: Communications (ICC), 2016 IEEE international conference on, IEEE, pp 1–6

    Google Scholar 

  • Schneider P, Horn G (2015) Towards 5g security. In: Trustcom/BigDataSE/ISPA, 2015 IEEE, IEEE, vol 1, pp 1165–1170

    Google Scholar 

  • Shi-Chang L, Hao-Lan Y, Qing-Sheng Z (2010) Research on MANET security architecture design. In: Signal acquisition and processing, 2010. ICSAP’10. International conference on, IEEE, pp 90–93

    Google Scholar 

  • Sicari S, Rizzardi A, Miorandi D, Cappiello C, Coen-Porisini A (2016) A secure and quality-aware prototypical architecture for the internet of things. Inf Syst 58:43–55

    Article  Google Scholar 

  • Sundaravadivel P, Kougianos E, Mohanty SP, Ganapathiraju MK (2018) Everything you wanted to know about smart health care: evaluating the different technologies and components of the internet of things for better health. IEEE Consumer Electron Mag 7(1):18–28. https://doi.org/10.1109/MCE.2017.2755378

    Article  Google Scholar 

  • Weber RH (2010) Internet of things–new security and privacy challenges. Computer Law Sec Rev 26(1):23–30

    Article  Google Scholar 

  • Yang N, Wang L, Geraci G, Elkashlan M, Yuan J, Di Renzo M (2015) Safeguarding 5g wireless communication networks using physical layer security. IEEE Commun Mag 53(4):20–27

    Article  Google Scholar 

  • Yi P, Tong T, Liu N, Wu Y, Ma J (2009) Security in wireless mesh networks: challenges and solutions. In: Information technology: new generations, 2009. ITNG’09. Sixth international conference on, IEEE, pp 423–428

    Google Scholar 

  • Zhang Y, Lee W (2005) Security in mobile ad-hoc networks. In: Ad hoc networks, Springer, pp 249–268

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Ray, N.K., Acharya, B., Swain, A.K. (2018). Network Big Data Security Issues. In: Sakr, S., Zomaya, A. (eds) Encyclopedia of Big Data Technologies. Springer, Cham. https://doi.org/10.1007/978-3-319-63962-8_240-1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-63962-8_240-1

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-63962-8

  • Online ISBN: 978-3-319-63962-8

  • eBook Packages: Springer Reference MathematicsReference Module Computer Science and Engineering

Publish with us

Policies and ethics