A hierarchical key management scheme for secure group communications in mobile ad hoc networks
Journal of Systems and Software
Hi-index | 0.00 |
Abstract: Network security technology generally concentrates on protection of the network infrastructure and, by implication, the protection of the user. While this is true for the larger public network, the local network environment of the user is very vulnerable to denial-of-service, "man-in-the-middle," and other attacks that can be devastating. In this paper, we examine the issues of wireless security from the perspective of the user and the local network. We will look at airlink attacks by specialized transmitters and intercept receivers. Examples will be taken from the technologies used in IS-95 CDMA cellular radiotelephone and IEEE 802.11 wireless LANs.