Skip to main content
Top

2015 | OriginalPaper | Chapter

An Overview of Ad Hoc Network Security

Authors : Fan Yang, Yulan Zheng, Ping Xiong

Published in: Applications and Techniques in Information Security

Publisher: Springer Berlin Heidelberg

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

An ad hoc network is formed in haphazard manner. It has many different features from the conventional networks. So the security services applied to the traditional networks are not suitable for the ad hoc networks. In this paper, we will analyze some classical proposals for ad hoc network security and make a comparison on them. From which, we can have a brief idea of the existing circumstances. On the basis of that, we provided two models. Each of those models improves some performance compared to the original.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Xiong, W.-A., Kun, S., Gong, Y.-H.: Ad Hoc Security authentication mechanism overview of Ad hoc network nodes. Comput. Eng. Appl. 44(13) (2008) Xiong, W.-A., Kun, S., Gong, Y.-H.: Ad Hoc Security authentication mechanism overview of Ad hoc network nodes. Comput. Eng. Appl. 44(13) (2008)
3.
go back to reference Zhou, L., Hass, Z.J.: Securing ad hoc networks. IEEE Netw. 13(6), 24–30 (1999)CrossRef Zhou, L., Hass, Z.J.: Securing ad hoc networks. IEEE Netw. 13(6), 24–30 (1999)CrossRef
6.
go back to reference Xia, Y., Xiaozhu, J., Han, Z.: A new key management scheme based on threshold mechanism of Ad Hoc network. Journal of QingDao University (Natural Science Edition) 23(4) (2010) Xia, Y., Xiaozhu, J., Han, Z.: A new key management scheme based on threshold mechanism of Ad Hoc network. Journal of QingDao University (Natural Science Edition) 23(4) (2010)
7.
go back to reference Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security support for mobile ad-hoc networks. In: Proceedings of the 9th IEEE International Conference on Network Protocols (ICNP 2001) (2001) Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security support for mobile ad-hoc networks. In: Proceedings of the 9th IEEE International Conference on Network Protocols (ICNP 2001) (2001)
8.
go back to reference Hubaux, J.P., Buttyan, L., Capkun, S.: Self-organzied public-key management for mobile ad hoc networks. Trans. Mobile Comput. 2, 52–64 (2003)CrossRef Hubaux, J.P., Buttyan, L., Capkun, S.: Self-organzied public-key management for mobile ad hoc networks. Trans. Mobile Comput. 2, 52–64 (2003)CrossRef
9.
go back to reference Hubaux, J.P., Buttyan, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: Proceedings of MobiHOC, October 2001 Hubaux, J.P., Buttyan, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: Proceedings of MobiHOC, October 2001
10.
go back to reference Zimmermann, P.: The Official PGP User’s Guide. MIT Press, Cambridge (1995) Zimmermann, P.: The Official PGP User’s Guide. MIT Press, Cambridge (1995)
11.
go back to reference Gokhale, S. Dasgupta, P.: Distributed authentication for peer-to-peer networks. In: Proceedings of the 2003 Symposium on Applications and the Internet Workshops 2003, January 2003 Gokhale, S. Dasgupta, P.: Distributed authentication for peer-to-peer networks. In: Proceedings of the 2003 Symposium on Applications and the Internet Workshops 2003, January 2003
12.
go back to reference Camenisch, J.L., Michels, M.: Proving in zero-knowledge that a number is the product of two safe primes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 107–121. Springer, Heidelberg (1999)CrossRef Camenisch, J.L., Michels, M.: Proving in zero-knowledge that a number is the product of two safe primes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 107–121. Springer, Heidelberg (1999)CrossRef
13.
go back to reference Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRef Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRef
14.
go back to reference Desmedt, Y.G., Quisquater, J.-J.: Public-key systems based on the difficulty of tampering. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 111–117. Springer, Heidelberg (1987)CrossRef Desmedt, Y.G., Quisquater, J.-J.: Public-key systems based on the difficulty of tampering. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 111–117. Springer, Heidelberg (1987)CrossRef
15.
go back to reference Tsuji, S., Itoh, T.: An ID-based cryptosystem based on the discrete logarithm problem. IEEE J. Sel. Areas Commun. 7(4), 467–473 (1989)CrossRef Tsuji, S., Itoh, T.: An ID-based cryptosystem based on the discrete logarithm problem. IEEE J. Sel. Areas Commun. 7(4), 467–473 (1989)CrossRef
16.
go back to reference Maurer, U.M., Yacobi, Y.: Non-interative public-key cryptography. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 498–507. Springer, Heidelberg (1991)CrossRef Maurer, U.M., Yacobi, Y.: Non-interative public-key cryptography. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 498–507. Springer, Heidelberg (1991)CrossRef
17.
go back to reference Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRef Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRef
18.
go back to reference Khalili, A., Katz, J., Arbaugh, W.A.: Toward secure key distribution in truly ad hoc networks. In: Proceedings of IEEE Workshop on Security and Assurance in Ad hoc Networks (2003) Khalili, A., Katz, J., Arbaugh, W.A.: Toward secure key distribution in truly ad hoc networks. In: Proceedings of IEEE Workshop on Security and Assurance in Ad hoc Networks (2003)
19.
go back to reference Lv, X., Cheng, G., Xu, F.: Threshold authentication scheme of ad hoc network based on bilinear pairings. Comput. Eng. 35(1), 147–149 (2009) Lv, X., Cheng, G., Xu, F.: Threshold authentication scheme of ad hoc network based on bilinear pairings. Comput. Eng. 35(1), 147–149 (2009)
20.
go back to reference Venkatraman, L., Agrawal. D.P.: A novel authentication scheme for ad hoc networks. In: IEEE Conferences on Wireless Communications and networking, WCNC, vol. 3, pp. 1268–1273 (2000) Venkatraman, L., Agrawal. D.P.: A novel authentication scheme for ad hoc networks. In: IEEE Conferences on Wireless Communications and networking, WCNC, vol. 3, pp. 1268–1273 (2000)
21.
go back to reference Li, G.S., Han, W.-B.: Cluster-based key management in ad hoc networks. Comput. Sci. 33(2) (2006) Li, G.S., Han, W.-B.: Cluster-based key management in ad hoc networks. Comput. Sci. 33(2) (2006)
22.
go back to reference Li, G.S.: Resarch for Mobile Ad Hoc Security. The PLA Information Engineering University (2005) Li, G.S.: Resarch for Mobile Ad Hoc Security. The PLA Information Engineering University (2005)
23.
go back to reference Liu, Z.-L., Xin, Y., Zhu, H.-L.: A cluster-based key management scheme for ad hoc networks. Netinfo Secur. 10 (2012) Liu, Z.-L., Xin, Y., Zhu, H.-L.: A cluster-based key management scheme for ad hoc networks. Netinfo Secur. 10 (2012)
24.
go back to reference Lu, W.: An Identity-based Hierarchical Key Management Scheme for Wireless Mesh Network. Xidian Univerity (2013) Lu, W.: An Identity-based Hierarchical Key Management Scheme for Wireless Mesh Network. Xidian Univerity (2013)
25.
go back to reference Xu, S.: Research of Key Management and Authentication Mechanisms for Ad Hoc Network. Ji’nan University (2013) Xu, S.: Research of Key Management and Authentication Mechanisms for Ad Hoc Network. Ji’nan University (2013)
26.
go back to reference Rajamanickam, M., Murugesan, S., Mariappan,V.: A Node Authentication Clustering Based Security for ADHOC Network, 2014ICCSP, 03–05 April 2014 Rajamanickam, M., Murugesan, S., Mariappan,V.: A Node Authentication Clustering Based Security for ADHOC Network, 2014ICCSP, 03–05 April 2014
Metadata
Title
An Overview of Ad Hoc Network Security
Authors
Fan Yang
Yulan Zheng
Ping Xiong
Copyright Year
2015
Publisher
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-662-48683-2_12

Premium Partner