Secure Ad Hoc Networking

被引:0
|
作者
Papadimitratos, Panagions [1 ]
机构
[1] Virginia Polytech Inst & State Univ, Blacksburg, VA 24061 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The ad hoc networking technology can enable novel civilian and military applications. However, ad hoc networking protocols are vulnerable to a wide range of attacks. The design of defense mechanisms is a challenging problem, especial v in comparison to securing traditional, fixed-infrastructure networks. In this paper, we discuss challenges and guidelines to secure ad hoc networking protocols, and describe a protocol suite for secure and fault-tolerant communication.
引用
收藏
页码:10 / 14
页数:5
相关论文
共 50 条
  • [41] A secure incentive architecture for ad hoc networks
    He, Qi
    Wu, Dapeng
    Khosla, Pradeep
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2006, 6 (03): : 333 - 346
  • [42] Secure distributed routing in ad hoc networks
    Mir, RN
    Wani, AM
    IEEE TENCON 2003: CONFERENCE ON CONVERGENT TECHNOLOGIES FOR THE ASIA-PACIFIC REGION, VOLS 1-4, 2003, : 1091 - 1095
  • [43] Secure service provision in ad hoc networks
    Handorean, R
    Roman, GC
    SERVICE-ORIENTED COMPUTING - ICSOC 2003, 2003, 2910 : 367 - 383
  • [44] A Model for Secure Mobile Ad Hoc Network
    Singh, Anurag
    Kumar, Manish
    Chauhan, Santosh Kumar
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL (I2C2), 2017,
  • [45] A secure routing protocol for ad hoc networks
    Sanzgiri, K
    Dahill, B
    Levine, BN
    Shields, C
    Belding-Royer, EM
    10TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS, PROCEEDINGS, 2002, : 78 - 87
  • [46] Truthful and Secure Routing in Ad Hoc Networks
    Kargar, Mehdi
    Ghodsi, Mohammad
    CSA 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND ITS APPLICATIONS, PROCEEDINGS, 2008, : 369 - 376
  • [47] A secure architecture for mobile ad hoc networks
    Rachedi, Abderrezak
    Benslimane, Abderrahim
    MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2006, 4325 : 424 - +
  • [48] SECURE ENCRYPTION PROTOCOL FOR AD HOC NETWORKS
    Arora, Shivika
    Nagrath, Preeti
    Aneja, Sandhya
    2017 8TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2017,
  • [49] SASCloud: Ad hoc Cloud as Secure Storage
    Al Noor, Shahid
    Hossain, Md. Mahmud
    Hasan, Ragib
    PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCES ON BIG DATA AND CLOUD COMPUTING (BDCLOUD 2016) SOCIAL COMPUTING AND NETWORKING (SOCIALCOM 2016) SUSTAINABLE COMPUTING AND COMMUNICATIONS (SUSTAINCOM 2016) (BDCLOUD-SOCIALCOM-SUSTAINCOM 2016), 2016, : 37 - 44
  • [50] Secure routing in a vehicular ad hoc network
    Eichler, S
    Dötzer, F
    Schwingenschlögl, C
    Caro, FJF
    Eberspächer, J
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3339 - 3343