Secure Ad Hoc Networking

被引:0
|
作者
Papadimitratos, Panagions [1 ]
机构
[1] Virginia Polytech Inst & State Univ, Blacksburg, VA 24061 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The ad hoc networking technology can enable novel civilian and military applications. However, ad hoc networking protocols are vulnerable to a wide range of attacks. The design of defense mechanisms is a challenging problem, especial v in comparison to securing traditional, fixed-infrastructure networks. In this paper, we discuss challenges and guidelines to secure ad hoc networking protocols, and describe a protocol suite for secure and fault-tolerant communication.
引用
收藏
页码:10 / 14
页数:5
相关论文
共 50 条
  • [21] Wireless ad hoc networking - the art of networking without a network
    Frodigh, Magnus
    Johansson, Per
    Larsson, Peter
    2000, (77):
  • [22] On Secure Mobile Ad hoc Routing
    Li, Xu
    Nayak, Amiya
    Ryl, Isabelle
    Simplot, David
    AD HOC & SENSOR WIRELESS NETWORKS, 2007, 4 (03) : 229 - 254
  • [23] Secure mobile ad hoc routing
    Li, Xu
    Nayao, Amiya
    Ryl, Isabelle
    Simplot, David
    Stojmenovic, Ivan
    21ST INTERNATIONAL CONFERENCE ON ADVANCED NETWORKING AND APPLICATIONS WORKSHOPS/SYMPOSIA, VOL 2, PROCEEDINGS, 2007, : 737 - +
  • [24] Secure communications in ad hoc networks
    Burmester, M
    Van Le, T
    PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 234 - 241
  • [25] Open problems in mobile ad hoc networking
    Vaidya, N
    LCN 2001: 26TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2001, : 516 - 516
  • [26] Termite: Ad-hoc networking with stigmergy
    Roth, M
    Wicker, S
    GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 2937 - 2941
  • [27] Blockchain-Based Internet of Vehicles (IoV): An Efficient Secure Ad Hoc Vehicular Networking Architecture
    Sharma, Sachin
    Ghanshala, Kamal Kumar
    Mohan, Seshadri
    2019 IEEE 2ND 5G WORLD FORUM (5GWF), 2019, : 452 - 457
  • [28] A System-Theoretic Clean Slate Approach to Provably Secure Ad-Hoc Wireless Networking
    Ponniah, Jonathan
    Hu, Yih-Chun
    Kumar, P. R.
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2016, 3 (02): : 206 - 217
  • [29] IKE in ad-hoc IP networking
    Nyberg, K
    SECURITY IN AD-HOC AND SENSOR NETWORKS, 2005, 3313 : 139 - 151
  • [30] Editorial: Ad Hoc Networking and Emerging Applications
    Zhou, Yifeng
    Kunz, Thomas
    Fischer, Stefan
    Zhong, Zhangdui
    MOBILE NETWORKS & APPLICATIONS, 2018, 23 (05): : 1206 - 1207