Encyclopedia of Big Data Technologies

Living Edition
| Editors: Sherif Sakr, Albert Zomaya

Network Big Data Security Issues

  • Niranjan K. Ray
  • Biswaranjan Acharya
  • Anil Kumar Swain
Living reference work entry
DOI: https://doi.org/10.1007/978-3-319-63962-8_240-1
  • 335 Downloads

Definitions

  • Mobile ad hoc network (MANET): It is a type of wireless networks which is most suitable for environment where establishing other types of networks are neither possible nor advisable. A node in MANETs performs the role of both host as well as router.

  • Cloud computing: It is a type of Internet-based computing platform, where different services such as storage, database, integration, security, and management are delivered to computers and devices through the internet. It stores and maintains the data in a cloud data center. Cloud center usually supports more numbers of users, applications, and data.

  • Internet of things (IoT): It is the collection of different things (physical gadgets, vehicles, home machines, etc.) inserted with hardware, programming, sensors, and actuators. It can be acknowledged in three standards: web situated (middleware), things arranged (sensors), and semantic-arranged (information).

Introduction

Today a wide range of wireless products are available in the...

Keywords

Black Hole Attack Wormhole Link Multiple Distributed Databases SaaS Service Providers Incoming RREQs 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in to check access.

References

  1. Abdelhaq M, Serhan S, Alsaqour R, Hassan R (2011) A local intrusion detection routing security over MANET network. In: Electrical engineering and informatics (ICEEI), 2011 international conference on, IEEE, pp 1–6Google Scholar
  2. Hidano S, Pecovsky M, Kiyomoto S (2015) New security challenges in the 5g network. In: International symposium on intelligence computation and applications, Springer, pp 619–630Google Scholar
  3. Joshi P (2011) Security issues in routing protocols in MANETs at network layer. Procedia Comput Sci 3:954–960.  https://doi.org/10.1016/j.procs.2010.12.156. http://www.sciencedirect.com/science/article/pii/S1877050910005314, world conference on information technologyCrossRefGoogle Scholar
  4. Lacink M, Ristve J (2017) Smart city, safety and security. Procedia Eng 192(Supplement C):522–527CrossRefGoogle Scholar
  5. Mantas G, Komninos N, Rodriuez J, Logota E, Marques H (2015) Security for 5G communications. In: Rodriguez J (ed) Fundamentals of 5G mobile networks. Wiley, pp 207–220. ISBN:9781118867464. https://www.wiley.com/en-gb/Fundamentals+of+5G+Mobile+Networks-p-9781118867525
  6. Matharu GS, Upadhyay P, Chaudhary L (2014) The internet of things: challenges & security issues. In: Emerging technologies (ICET), 2014 international conference on, IEEE, pp 54–59Google Scholar
  7. Mazin A, Davaslioglu K, Gitlin RD (2017) Secure key management for 5g physical layer security. In: Wireless and microwave technology conference (WAMICON), 2017 IEEE 18th, IEEE, pp 1–5Google Scholar
  8. Mohanty SP, Choppali U, Kougianos E (2016) Everything you wanted to know about smart cities. IEEE Consumer Electron Mag 5(3):60–70CrossRefGoogle Scholar
  9. Nguyen KT, Laurent M, Oualha N (2015) Survey on secure communication protocols for the internet of things. Ad Hoc Netw 32:17–31CrossRefGoogle Scholar
  10. Obi OO (2004) Security issues in mobile ad-hoc networks: a survey. In: The 17th White House papers graduate research in informatics at SussexGoogle Scholar
  11. Qin Z, Liu Y, Ding Z, Gao Y, Elkashlan M (2016) Physical layer security for 5g nonorthogonal multiple access in large-scale networks. In: Communications (ICC), 2016 IEEE international conference on, IEEE, pp 1–6Google Scholar
  12. Schneider P, Horn G (2015) Towards 5g security. In: Trustcom/BigDataSE/ISPA, 2015 IEEE, IEEE, vol 1, pp 1165–1170Google Scholar
  13. Shi-Chang L, Hao-Lan Y, Qing-Sheng Z (2010) Research on MANET security architecture design. In: Signal acquisition and processing, 2010. ICSAP’10. International conference on, IEEE, pp 90–93Google Scholar
  14. Sicari S, Rizzardi A, Miorandi D, Cappiello C, Coen-Porisini A (2016) A secure and quality-aware prototypical architecture for the internet of things. Inf Syst 58:43–55CrossRefGoogle Scholar
  15. Sundaravadivel P, Kougianos E, Mohanty SP, Ganapathiraju MK (2018) Everything you wanted to know about smart health care: evaluating the different technologies and components of the internet of things for better health. IEEE Consumer Electron Mag 7(1):18–28.  https://doi.org/10.1109/MCE.2017.2755378CrossRefGoogle Scholar
  16. Weber RH (2010) Internet of things–new security and privacy challenges. Computer Law Sec Rev 26(1):23–30CrossRefGoogle Scholar
  17. Yang N, Wang L, Geraci G, Elkashlan M, Yuan J, Di Renzo M (2015) Safeguarding 5g wireless communication networks using physical layer security. IEEE Commun Mag 53(4):20–27CrossRefGoogle Scholar
  18. Yi P, Tong T, Liu N, Wu Y, Ma J (2009) Security in wireless mesh networks: challenges and solutions. In: Information technology: new generations, 2009. ITNG’09. Sixth international conference on, IEEE, pp 423–428Google Scholar
  19. Zhang Y, Lee W (2005) Security in mobile ad-hoc networks. In: Ad hoc networks, Springer, pp 249–268Google Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  • Niranjan K. Ray
    • 1
  • Biswaranjan Acharya
  • Anil Kumar Swain
  1. 1.Kalinga Institute of Industrial Technology (KIIT), Deemed to be UniversityBhubaneswarIndia

Section editors and affiliations

  • Junjun Chen
    • 1
  • Deepak Puthal
    • 2
  1. 1.Swinburne University of TechnologyMelbourneAustralia
  2. 2.Faculty of Engineering and Information TechnologiesUniversity of Technology Sydney