Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Securing ad hoc networks

Published: 01 November 1999 Publication History

Abstract

Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. Military tactical and other security-sensitive operations are still the main applications of ad hoc networks, although there is a trend to adopt ad hoc networks for commercial uses due to their unique properties. One main challenge in the design of these networks is their vulnerability to security attacks. In this article, we study the threats on ad hoc network faces and the security goals to be achieved. We identify the new challenges and opportunities posed by this new networking environment and explore new approaches to secure its communication. In particular, we take advantage of the inherent redundancy in ad hoc networks-multiple routes between nodes-to defend routing against denial-of-service attacks. We also use replication and new cryptographic schemes, such as threshold cryptography, to build a highly secure and highly available key management service, which terms the core of our security framework

Cited By

View all
  • (2023)Application of Data Collected by Endpoint Detection and Response Systems for Implementation of a Network Security System based on Zero Trust Principles and the EigenTrust AlgorithmACM SIGMETRICS Performance Evaluation Review10.1145/3595244.359524750:4(5-7)Online publication date: 27-Apr-2023
  • (2023)A survey on cryptographic methods to secure communications for UAV traffic managementVehicular Communications10.1016/j.vehcom.2023.10066144:COnline publication date: 1-Dec-2023
  • (2022)Analytical Termination of Malicious Nodes (ATOM): An Intrusion Detection System for Detecting Black Hole attack in Mobile Ad Hoc NetworksWireless Personal Communications: An International Journal10.1007/s11277-021-09418-8124:2(1511-1524)Online publication date: 1-May-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Network: The Magazine of Global Internetworking
IEEE Network: The Magazine of Global Internetworking  Volume 13, Issue 6
November 1999
54 pages

Publisher

IEEE Press

Publication History

Published: 01 November 1999

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Application of Data Collected by Endpoint Detection and Response Systems for Implementation of a Network Security System based on Zero Trust Principles and the EigenTrust AlgorithmACM SIGMETRICS Performance Evaluation Review10.1145/3595244.359524750:4(5-7)Online publication date: 27-Apr-2023
  • (2023)A survey on cryptographic methods to secure communications for UAV traffic managementVehicular Communications10.1016/j.vehcom.2023.10066144:COnline publication date: 1-Dec-2023
  • (2022)Analytical Termination of Malicious Nodes (ATOM): An Intrusion Detection System for Detecting Black Hole attack in Mobile Ad Hoc NetworksWireless Personal Communications: An International Journal10.1007/s11277-021-09418-8124:2(1511-1524)Online publication date: 1-May-2022
  • (2021)Anomaly-Based Intrusion Detection Systems for Mobile Ad Hoc NetworksInternational Journal of Systems and Software Security and Protection10.4018/IJSSSP.202107010212:2(11-32)Online publication date: 1-Jul-2021
  • (2021)DSSAM: digitally signed secure acknowledgement method for mobile ad hoc networkEURASIP Journal on Wireless Communications and Networking10.1186/s13638-021-01894-72021:1Online publication date: 22-Jan-2021
  • (2020)Rank-Based Report Filtering Scheme (RRFS) for Verifying Phoney Reports in Wireless Sensor NetworksWireless Communications & Mobile Computing10.1155/2020/27859602020Online publication date: 1-Jan-2020
  • (2020)Optimized Scheme to Secure IoT Systems Based on Sharing Secret in Multipath ProtocolWireless Communications & Mobile Computing10.1155/2020/14689762020Online publication date: 4-Apr-2020
  • (2020)A guaranteed data transmission system for wireless ad hoc networksTransactions on Emerging Telecommunications Technologies10.1002/ett.400531:12Online publication date: 22-Dec-2020
  • (2019)Implementation and Evaluation of ISDSR in Emulation Environments2019 IEEE Wireless Communications and Networking Conference (WCNC)10.1109/WCNC.2019.8885647(1-6)Online publication date: 15-Apr-2019
  • (2019)Provably Secure Proactive Secret Sharing Without the Adjacent AssumptionProvable Security10.1007/978-3-030-31919-9_14(247-264)Online publication date: 1-Oct-2019
  • Show More Cited By

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media