• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

DMCA

Securing ad hoc networks

Cached

  • Download as a PDF

Download Links

  • [www.cs.huji.ac.il]
  • [www.cse.fau.edu]
  • [www.cse.fau.edu]
  • [www.cis.temple.edu]
  • [www.cs.uiuc.edu]
  • [www.cis.temple.edu]
  • [www.cse.fau.edu]
  • [www.cse.fau.edu]
  • [www.cis.temple.edu]
  • [www.eis.mdx.ac.uk]
  • [cis-linux1.temple.edu]
  • [wnl.ece.cornell.edu]
  • [www.comm.utoronto.ca]
  • [www.comm.utoronto.ca]
  • [people.ece.cornell.edu]
  • [people.cs.vt.edu]
  • [www.comm.utoronto.ca]
  • [people.ece.cornell.edu]
  • [people.ece.cornell.edu]
  • [people.ece.cornell.edu]
  • [people.ece.cornell.edu]
  • [www.ee.cornell.edu]
  • [ecommons.library.cornell.edu]
  • [ecommons.cornell.edu]
  • [ecommons.cornell.edu]

  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Lidong Zhou , Zygmunt J. Haas
Citations:1062 - 15 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@MISC{Zhou_securingad,
    author = {Lidong Zhou and Zygmunt J. Haas},
    title = {Securing ad hoc networks},
    year = {}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The military tactical and other security-sensitive operations are still the main applications of ad hoc networks, although there is a trend to adopt ad hoc networks for commercial uses due to their unique properties. One main challenge in design of these networks is their vulnerability to security attacks. In this paper, we study the threats an ad hoc network faces and the security goals to be achieved. We identify the new challenges and opportunities posed by this new networking environment and explore new approaches to secure its communication. In particular, we take advantage of the inherent redundancy in ad hoc networks — multiple routes between nodes — to defend routing against denial of service attacks. We also use replication and new cryptographic schemes, such as threshold cryptography, to build a highly secure and highly available key management service, which forms the core of our security framework.

Keyphrases

ad hoc network    new networking environment    main application    new cryptographic scheme    military tactical    new approach    available key management service    ad hoc network multiple route    security goal    mobile host    main challenge    new wireless networking paradigm    inherent redundancy    threshold cryptography    security-sensitive operation    service attack    commercial us    traditional mobile wireless network    fixed infrastructure    new challenge    unique property    security framework    security attack   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University