Security for Ad Hoc Networks

  • Komninos N
  • Vergados D
  • Douligeris C
N/ACitations
Citations of this article
30Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Ad hoc networks are created dynamically and maintained by individual nodes comprising the network. They do not require a preexisting architecture for communication purposes and they do not rely on any type of wired infrastructure; in an ad hoc network, all communication occurs through a wireless medium. With current technology and the increasing popularity of notebook computers, interest in ad hoc networks has peaked. Future advances in technology will allow us to form small ad hoc networks on campuses, during conferences, and even in our own home environment. Further, the need for easily portable ad hoc networks in rescue missions and in situations in rough terrain are becoming extremely common.In this chapter we investigate the principal security issues for protecting ad hoc networks at the data link and network layers. The security requirements for these two layers are identified and the design criteria for creating secure ad hoc networks using multiple lines of defense against malicious attacks are discussed. Furthermore, we explore challenge–response protocols based on symmetric and asymmetric techniques for multiple authentication purposes through simulations and present our experimental results. In Particular, we implement the Advanced Encryption Standard (AES), RSA, and message digest version 5 (MD5) algorithms in combination with ISO/IEC 9798-2 and ISO/IEC 9798-4, and Needham–Schroeder authentication protocols.

Cite

CITATION STYLE

APA

Komninos, N., Vergados, D. D., & Douligeris, C. (2010). Security for Ad Hoc Networks. In Handbook of Information and Communication Security (pp. 421–432). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-04117-4_22

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free