Definitions
Mobile ad hoc network (MANET): It is a type of wireless networks which is most suitable for environment where establishing other types of networks are neither possible nor advisable. A node in MANETs performs the role of both host as well as router.
Cloud computing: It is a type of Internet-based computing platform, where different services such as storage, database, integration, security, and management are delivered to computers and devices through the internet. It stores and maintains the data in a cloud data center. Cloud center usually supports more numbers of users, applications, and data.
Internet of things (IoT): It is the collection of different things (physical gadgets, vehicles, home machines, etc.) inserted with hardware, programming, sensors, and actuators. It can be acknowledged in three standards: web situated (middleware), things arranged (sensors), and semantic-arranged (information).
Introduction
Today a wide range of wireless products are available in the...
References
Abdelhaq M, Serhan S, Alsaqour R, Hassan R (2011) A local intrusion detection routing security over MANET network. In: Electrical engineering and informatics (ICEEI), 2011 international conference on, IEEE, pp 1–6
Hidano S, Pecovsky M, Kiyomoto S (2015) New security challenges in the 5g network. In: International symposium on intelligence computation and applications, Springer, pp 619–630
Joshi P (2011) Security issues in routing protocols in MANETs at network layer. Procedia Comput Sci 3:954–960. https://doi.org/10.1016/j.procs.2010.12.156. http://www.sciencedirect.com/science/article/pii/S1877050910005314, world conference on information technology
Lacink M, Ristve J (2017) Smart city, safety and security. Procedia Eng 192(Supplement C):522–527
Mantas G, Komninos N, Rodriuez J, Logota E, Marques H (2015) Security for 5G communications. In: Rodriguez J (ed) Fundamentals of 5G mobile networks. Wiley, pp 207–220. ISBN:9781118867464. https://www.wiley.com/en-gb/Fundamentals+of+5G+Mobile+Networks-p-9781118867525
Matharu GS, Upadhyay P, Chaudhary L (2014) The internet of things: challenges & security issues. In: Emerging technologies (ICET), 2014 international conference on, IEEE, pp 54–59
Mazin A, Davaslioglu K, Gitlin RD (2017) Secure key management for 5g physical layer security. In: Wireless and microwave technology conference (WAMICON), 2017 IEEE 18th, IEEE, pp 1–5
Mohanty SP, Choppali U, Kougianos E (2016) Everything you wanted to know about smart cities. IEEE Consumer Electron Mag 5(3):60–70
Nguyen KT, Laurent M, Oualha N (2015) Survey on secure communication protocols for the internet of things. Ad Hoc Netw 32:17–31
Obi OO (2004) Security issues in mobile ad-hoc networks: a survey. In: The 17th White House papers graduate research in informatics at Sussex
Qin Z, Liu Y, Ding Z, Gao Y, Elkashlan M (2016) Physical layer security for 5g nonorthogonal multiple access in large-scale networks. In: Communications (ICC), 2016 IEEE international conference on, IEEE, pp 1–6
Schneider P, Horn G (2015) Towards 5g security. In: Trustcom/BigDataSE/ISPA, 2015 IEEE, IEEE, vol 1, pp 1165–1170
Shi-Chang L, Hao-Lan Y, Qing-Sheng Z (2010) Research on MANET security architecture design. In: Signal acquisition and processing, 2010. ICSAP’10. International conference on, IEEE, pp 90–93
Sicari S, Rizzardi A, Miorandi D, Cappiello C, Coen-Porisini A (2016) A secure and quality-aware prototypical architecture for the internet of things. Inf Syst 58:43–55
Sundaravadivel P, Kougianos E, Mohanty SP, Ganapathiraju MK (2018) Everything you wanted to know about smart health care: evaluating the different technologies and components of the internet of things for better health. IEEE Consumer Electron Mag 7(1):18–28. https://doi.org/10.1109/MCE.2017.2755378
Weber RH (2010) Internet of things–new security and privacy challenges. Computer Law Sec Rev 26(1):23–30
Yang N, Wang L, Geraci G, Elkashlan M, Yuan J, Di Renzo M (2015) Safeguarding 5g wireless communication networks using physical layer security. IEEE Commun Mag 53(4):20–27
Yi P, Tong T, Liu N, Wu Y, Ma J (2009) Security in wireless mesh networks: challenges and solutions. In: Information technology: new generations, 2009. ITNG’09. Sixth international conference on, IEEE, pp 423–428
Zhang Y, Lee W (2005) Security in mobile ad-hoc networks. In: Ad hoc networks, Springer, pp 249–268
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this entry
Cite this entry
Ray, N.K., Acharya, B., Swain, A.K. (2018). Network Big Data Security Issues. In: Sakr, S., Zomaya, A. (eds) Encyclopedia of Big Data Technologies. Springer, Cham. https://doi.org/10.1007/978-3-319-63962-8_240-1
Download citation
DOI: https://doi.org/10.1007/978-3-319-63962-8_240-1
Received:
Accepted:
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-63962-8
Online ISBN: 978-3-319-63962-8
eBook Packages: Springer Reference MathematicsReference Module Computer Science and Engineering