Relying on time synchronization for security in ad hoc networks

  • Authors:
  • Donald J. Scott

  • Affiliations:
  • Florida State University, Tallahassee, FL

  • Venue:
  • Proceedings of the 43rd annual Southeast regional conference - Volume 2
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Mobile Ad hoc networks are networks composed of mobile computing devices with wireless connections and no fixed infrastructure. The unique attributes of these networks cause new security problems. Some security protocols, such as the Timed, Ef£cient, Streaming, Loss-tolerant Authentication Protocol, TESLA [2], rely on loose time synchronization for security. These protocols have not fully analyzed the implications of relying on time synchronization in this environment. This paper looks into some of the difficulties in time synchronization and points out further areas for research.