Network security: private communication in a public world
Network security: private communication in a public world
Secure computing: threats and safeguards
Secure computing: threats and safeguards
Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Intrusion detection in wireless ad-hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Implementing a distributed firewall
Proceedings of the 7th ACM conference on Computer and communications security
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Enforcing service availability in mobile ad-hoc WANs
MobiHoc '00 Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing
Secrets & Lies: Digital Security in a Networked World
Secrets & Lies: Digital Security in a Networked World
Internet and Intranet Security
Internet and Intranet Security
Handbook of Applied Cryptography
Handbook of Applied Cryptography
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Securing Ad Hoc Networks
Security-Aware Ad hoc Routing for Wireless Networks
Security-Aware Ad hoc Routing for Wireless Networks
A Secure Routing Protocol for Ad Hoc Networks TITLE2:
A Secure Routing Protocol for Ad Hoc Networks TITLE2:
Self organization in mobile ad hoc networks: the approach of Terminodes
IEEE Communications Magazine
ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (i)
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Hi-index | 0.00 |
In this chapter, we discuss issues and survey current solutions in securing ad hoc wireless networks. The characteristics of ad hoc networks render the trust a host could place on other hosts and a network more precarious than in a conventional network. Any viable security approach ought to address trust concerns for specific applications. As examples, we look at three specific issues and their current proposed solutions: a transient association as host access control policy for mobile appliances, link-by-link and end-to-end authentication for securing routing in open networks, and split control for a centralized service or distributed services for survivable services in a rapidly changing network.