Securing ad hoc networks
- 1 January 1999
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Network
- Vol. 13 (6), 24-30
- https://doi.org/10.1109/65.806983
Abstract
Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. Military tactical and other security-sensitive operations are still the main applications of ad hoc networks, although there is a trend to adopt ad hoc networks for commercial uses due to their unique properties. One main challenge in the design of these networks is their vulnerability to security attacks. In this article, we study the threats on ad hoc network faces and the security goals to be achieved. We identify the new challenges and opportunities posed by this new networking environment and explore new approaches to secure its communication. In particular, we take advantage of the inherent redundancy in ad hoc networks-multiple routes between nodes-to defend routing against denial-of-service attacks. We also use replication and new cryptographic schemes, such as threshold cryptography, to build a highly secure and highly available key management service, which terms the core of our security framework.Keywords
This publication has 37 references indexed in Scilit:
- Optimal-resilience proactive public-key cryptosystemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Securing distance-vector routing protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Securing the Nimrod routing architecturePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Non-Interactive and Information-Theoretic Secure Verifiable Secret SharingPublished by Springer Science and Business Media LLC ,2001
- Lowering security overhead in link state routingComputer Networks, 1999
- Proactive RSALecture Notes in Computer Science, 1997
- Integration of security in network routing protocolsACM SIGSAC Review, 1993
- A network architecture providing host migration transparencyPublished by Association for Computing Machinery (ACM) ,1991
- A practical scheme for non-interactive verifiable secret sharingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- Impossibility of distributed consensus with one faulty processJournal of the ACM, 1985