The Study on AD HOC Networks Security Solution

Article Preview

Abstract:

In this paper, we elaborated on preventive mechanisms either based on cryptographic solutions or trust based infrastructure Moreover, both the localized and ACK-based detection techniques were discussed. Global and local end node reaction mechanisms against ongoing intrusions and threads in order to avoid persistent adverse effects were further discussed. Finally, this paper highlighted open challenges which need to be addressed to secure Ad Hoc networks of the future.

You might also be interested in these eBooks

Info:

Periodical:

Key Engineering Materials (Volumes 474-476)

Pages:

1451-1457

Citation:

Online since:

April 2011

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] M. Azer, S. EI-Kassas, and M. EI Soudani, Security in Ad Hoc Networks: From Vulnerability to Risk Maagement, in Third Interational Conference on Emerging Securit Information, Systems and Technologies, Greece, 2009 , pp.203-209.

DOI: 10.1109/securware.2009.38

Google Scholar

[2] D. Wang, M. Hu, and H. Zhi, A Survey of Secure Routing in Ad Hoc Networks, in The Ninth International Conference on Web­Age Information Management, 2008, pp.482-486.

DOI: 10.1109/waim.2008.79

Google Scholar

[3] V. Karpijoki, Security in Ad Hoc Networks, in Proceedings of the Helsinki Universit of Technolog, Seminars on Netork Securit, (2000).

Google Scholar

[4] H. Yang, H.Y. Luo, F. Ye, S.W. Lu, and L. Zhang . Security in Mobile Ad Hoc Networks: Challenges and Solutions, IEEE Wireless Communications Magaine. Vol. II Issue 2, 2004, pp.37-47.

DOI: 10.1109/mwc.2004.1269716

Google Scholar

[5] M. Zapata, and N. Asokan, Securing Ad Hoc routing Protocols, Proceedings of ACM Workshop on Wireless Securit, USA, 2002, pp. I-IO.

DOI: 10.1145/570681.570682

Google Scholar

[6] P. Papadimitratos, and Z. Haas, Secure Routing for Mobile Ad Hoc Networks, Proceedings of the SCS Communication Netorks and Distributed Systems Modelling and Simulation Corerence, (2002).

Google Scholar

[7] Y. Hu, and A. Perrig, A Survey of Secure Wireless Ad Hoc Routing, IE Securit and Privac Magazine, May/June 2004, pp.28-39.

Google Scholar

[8] M. Azer, S. EI-Kassas, M. EI Soudani, and A. Hassan, A Survey on Trust ad Reputation Schemes in Ad Hoc Networks, Te Third International Conference on Availabilit, Reliabilit and Securit, Poland, 2006, pp.881-886.

DOI: 10.1109/ares.2008.180

Google Scholar