Secure communications in ad hoc networks

被引:3
作者
Burmester, M [1 ]
Van Le, T [1 ]
机构
[1] Florida State Univ, Dept Comp Sci, Tallahassee, FL 32306 USA
来源
PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP | 2004年
关键词
D O I
10.1109/IAW.2004.1437822
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ad hoc networks are collections of mobile nodes with links that are made or broken in an arbitrary way. They have no fixed infrastructure and may have constrained resources. The next generation of IT applications is expected to rely heavily on such networks. However, before they can be successfully deployed several major security threats must be addressed. These threats are due mainly to the ad hoc nature of these networks. Consequently it may be much harder (or even impossible) to establish a secure communication channel that can tolerate malicious faults. In this paper we first propose a general model for ad hoc networks based on Bayesian inferences that satisfies the basic mobility requirements of such networks and formally define our requirements for secure communication. We then propose a secure communication protocol that will trace malicious faults.
引用
收藏
页码:234 / 241
页数:8
相关论文
共 37 条
[1]  
Aho A.V., 1974, The Design and Analysis of Computer Algorithms
[2]  
[Anonymous], 2002, P 1 INT WORKSH PEER
[3]  
[Anonymous], P ACM IEEE MOBICOM 9
[4]  
[Anonymous], 1996, Mobile Computing
[5]  
AWERBUCH B, 2002, ACM WORKSH WIR SEC W
[6]  
BELLARE M, 1908, LECT NOTES COMPUTER, V773, P94
[7]  
Bengio S., 1991, Journal of Cryptology, V4, P175, DOI 10.1007/BF00196726
[8]  
Broch J., 1998, MobiCom'98. Proceedings of Fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking, P85, DOI 10.1145/288235.288256
[9]  
Burmester M, 1999, LECT NOTES COMPUT SC, V1716, P274
[10]  
BURMESTER M, 2004, UNPUB INT C INF TECH