Skip to main content
Top
Published in:
Cover of the book

2014 | OriginalPaper | Chapter

1. Introduction

Authors : Mohamed M. E. A. Mahmoud, Xuemin (Sherman) Shen

Published in: Security for Multi-hop Wireless Networks

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In multi-hop wireless networks (MWNs), when a mobile node needs to communicate with a remote destination, it relies on the other nodes to relay its packets. MWNs can enable new applications and enhance the network performance. However, the involvement of autonomous and self-interested nodes in packet relaying makes MWNs vulnerable to serious security vulnerabilities that may hinder their practical implementation. In this chapter, we first discuss the main security issues that threaten the MWNs. Then, we discuss the motivations for this work and also the main challenges to secure the network. Finally, we give an overview on our proposals to secure the network.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference X. J. Li, B. C. Seet, and P. H. J. Chong. Multihop cellular networks: Technology and economics. Computer Networks, 52:1825–1837, 2008.CrossRefMATH X. J. Li, B. C. Seet, and P. H. J. Chong. Multihop cellular networks: Technology and economics. Computer Networks, 52:1825–1837, 2008.CrossRefMATH
2.
go back to reference C. Gomes and J. Galtier. Optimal and fair transmission rate allocation problem in multi-hop cellular networks. Lecture Notes in Computer Science, Springer Berlin/Heidelberg, 5793:327–340, Aug. 2009. C. Gomes and J. Galtier. Optimal and fair transmission rate allocation problem in multi-hop cellular networks. Lecture Notes in Computer Science, Springer Berlin/Heidelberg, 5793:327–340, Aug. 2009.
3.
go back to reference H. Wu, C. Qios, S. De, and O. Tonguz. Integrated cellular and ad hoc relaying systems: icar. IEEE Journal of Selected Areas in Communications, 19(10):2105–2115, Oct. 2001.CrossRef H. Wu, C. Qios, S. De, and O. Tonguz. Integrated cellular and ad hoc relaying systems: icar. IEEE Journal of Selected Areas in Communications, 19(10):2105–2115, Oct. 2001.CrossRef
4.
go back to reference A. Abdrabou and W. Zhuang. Statistical qos routing for ieee 802.11 multihop ad hoc networks. IEEE Transactions on Wireless Communications, 8(3):1542–1552, Mar. 2009. A. Abdrabou and W. Zhuang. Statistical qos routing for ieee 802.11 multihop ad hoc networks. IEEE Transactions on Wireless Communications, 8(3):1542–1552, Mar. 2009.
5.
go back to reference S. Bah and R. Glitho and R. Dssouli. Sip servlets for service provisioning in multihop cellular networks: High-level architectural alternatives. Proc. of IEEE CCNC, pages 127–131, 2008. S. Bah and R. Glitho and R. Dssouli. Sip servlets for service provisioning in multihop cellular networks: High-level architectural alternatives. Proc. of IEEE CCNC, pages 127–131, 2008.
6.
go back to reference M. Kubisch, S. Mengesha, D. Hollos, H. Karl, and A. Wolisz. Applying ad-hoc relaying to improve capacity, energy efficiency, and immission in infrastructure-based wlans. Proc. of Kommunikation in Verteilten Systemen, Leipzig, Germany, pages 195–206, 2003. M. Kubisch, S. Mengesha, D. Hollos, H. Karl, and A. Wolisz. Applying ad-hoc relaying to improve capacity, energy efficiency, and immission in infrastructure-based wlans. Proc. of Kommunikation in Verteilten Systemen, Leipzig, Germany, pages 195–206, 2003.
7.
go back to reference R. Schoenen, R. Halfmann, and B. H. Walke. Mac performance of a 3gpp-lte multihop cellular network. Proc. of IEEE ICC, pages 4819– 4824, 2008. R. Schoenen, R. Halfmann, and B. H. Walke. Mac performance of a 3gpp-lte multihop cellular network. Proc. of IEEE ICC, pages 4819– 4824, 2008.
8.
9.
go back to reference C. Chou, D. Wei, C. Kuo, and K. Naik. An efficient anonymous communication protocol for peer-to-peer applications over mobile ad-hoc networks. IEEE Journal on Selected Areas in Communications, 25(1):192 – 203, Jan. 2007.CrossRef C. Chou, D. Wei, C. Kuo, and K. Naik. An efficient anonymous communication protocol for peer-to-peer applications over mobile ad-hoc networks. IEEE Journal on Selected Areas in Communications, 25(1):192 – 203, Jan. 2007.CrossRef
10.
go back to reference H. Gharavi. Multichannel mobile ad hoc links for multimedia communications. Proc. of IEEE, 96(1):77–96, Jan. 2008.CrossRef H. Gharavi. Multichannel mobile ad hoc links for multimedia communications. Proc. of IEEE, 96(1):77–96, Jan. 2008.CrossRef
11.
go back to reference D. Johnson, D. Maltz, and Y. Hu. The dynamic source routing protocol for mobile ad hoc networks (dsr). technical report, IETF MANET Working Group, Feb. 2007. D. Johnson, D. Maltz, and Y. Hu. The dynamic source routing protocol for mobile ad hoc networks (dsr). technical report, IETF MANET Working Group, Feb. 2007.
12.
go back to reference S. Marti, T. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. Proc. of ACM International Conference on Mobile Computing and Networking (MobiCom’00), Boston, Massachusetts, USA, pages 255–265, Aug. 6–11 2000. S. Marti, T. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. Proc. of ACM International Conference on Mobile Computing and Networking (MobiCom’00), Boston, Massachusetts, USA, pages 255–265, Aug. 6–11 2000.
13.
go back to reference P. Michiardi and R. Molva. Simulation-based analysis of security exposures in mobile ad hoc networks. Proc. of European Wireless Conference, Florence, Italy, Feb. 25–28 2002. P. Michiardi and R. Molva. Simulation-based analysis of security exposures in mobile ad hoc networks. Proc. of European Wireless Conference, Florence, Italy, Feb. 25–28 2002.
14.
go back to reference J. Hu. Cooperation in mobile ad hoc networks. Technical report TR-050111, Computer Science Department, Florida State University, Tallahassee, Jan. 2005. J. Hu. Cooperation in mobile ad hoc networks. Technical report TR-050111, Computer Science Department, Florida State University, Tallahassee, Jan. 2005.
15.
go back to reference G. Marias, P. Georgiadis, D. Flitzanis, and K. Mandalas. Cooperation enforcement schemes for manets: A survey. Wiley’s Journal of Wireless Communications and Mobile Computing, 6(3):319–332, 2006.CrossRef G. Marias, P. Georgiadis, D. Flitzanis, and K. Mandalas. Cooperation enforcement schemes for manets: A survey. Wiley’s Journal of Wireless Communications and Mobile Computing, 6(3):319–332, 2006.CrossRef
16.
go back to reference Y. Zhang and Y. Fang. A fine-grained reputation system for reliable service selection in peer-to-peer networks. IEEE Transactions on Parallel and Distributed Systems, 18(8):1134–1145, Aug. 2007.CrossRef Y. Zhang and Y. Fang. A fine-grained reputation system for reliable service selection in peer-to-peer networks. IEEE Transactions on Parallel and Distributed Systems, 18(8):1134–1145, Aug. 2007.CrossRef
17.
go back to reference S. Lee, G. Pan, J-S Park, M. Gerla, and S. Lu. Secure incentives for commercial ad dissemination in vehicular networks. Proc. of MobiHoc’07, Sep. 2007. S. Lee, G. Pan, J-S Park, M. Gerla, and S. Lu. Secure incentives for commercial ad dissemination in vehicular networks. Proc. of MobiHoc’07, Sep. 2007.
18.
go back to reference R. Lu, X. Lin, H. Zhu, C. Zhang, P.H. Ho, and X. Shen. A novel fair incentive protocol for mobile ad hoc networks. Proc. of IEEE WCNC’08, Las Vegas, Nevada, USA, March 31 - April 3 2008. R. Lu, X. Lin, H. Zhu, C. Zhang, P.H. Ho, and X. Shen. A novel fair incentive protocol for mobile ad hoc networks. Proc. of IEEE WCNC’08, Las Vegas, Nevada, USA, March 31 - April 3 2008.
19.
go back to reference Y. Zhang and Y. Fang. A secure authentication and billing architecture for wireless mesh networks. ACM Wireless Networks, 13(5):569–582, Oct. 2007.CrossRef Y. Zhang and Y. Fang. A secure authentication and billing architecture for wireless mesh networks. ACM Wireless Networks, 13(5):569–582, Oct. 2007.CrossRef
20.
go back to reference F. Milan, J. Jaramillo, and R. Srikant. Achieving cooperation in multi-hop wireless networks of selfish nodes. Proc. of workshop on Game Theory for Communications and Networks, Pisa, Italy, Oct. 14 2006. F. Milan, J. Jaramillo, and R. Srikant. Achieving cooperation in multi-hop wireless networks of selfish nodes. Proc. of workshop on Game Theory for Communications and Networks, Pisa, Italy, Oct. 14 2006.
21.
go back to reference L. Feeney. An energy-consumption model for performance analysis of routing protocols for mobile ad hoc networks. Mobile Networks and Applications, 3(6):239–249, 2001.CrossRef L. Feeney. An energy-consumption model for performance analysis of routing protocols for mobile ad hoc networks. Mobile Networks and Applications, 3(6):239–249, 2001.CrossRef
22.
go back to reference Y. Lin and Y. Hsu. Multihop cellular: A new architecture for wireless communications. Proc. of IEEE INFOCOM’00, 3:1273–1282, Mar. 26–30 2000. Y. Lin and Y. Hsu. Multihop cellular: A new architecture for wireless communications. Proc. of IEEE INFOCOM’00, 3:1273–1282, Mar. 26–30 2000.
23.
go back to reference J. Palmer and L. Eriksen. Digital newspapers explore marketing on the internet. ACM Communications, 42(9):33–40, 1999.CrossRef J. Palmer and L. Eriksen. Digital newspapers explore marketing on the internet. ACM Communications, 42(9):33–40, 1999.CrossRef
24.
go back to reference G. Iannaccone, C. Chuah, R. Mortier, S. Bhattacharyya, and C. Diot. Analysis of link failures in an ip backbone. Proc. of IMW 2002, ACMPress, Marseille, France, Nov. 2002. G. Iannaccone, C. Chuah, R. Mortier, S. Bhattacharyya, and C. Diot. Analysis of link failures in an ip backbone. Proc. of IMW 2002, ACMPress, Marseille, France, Nov. 2002.
25.
go back to reference X. Li, Z. Li, M. Stojmenovic, V. Narasimhan, and A. Nayak. Autoregressive trust management in wireless ad hoe networks. Ad hoc and Sensor Wireless Networks, 16:229–242, Feb. 2012. X. Li, Z. Li, M. Stojmenovic, V. Narasimhan, and A. Nayak. Autoregressive trust management in wireless ad hoe networks. Ad hoc and Sensor Wireless Networks, 16:229–242, Feb. 2012.
26.
go back to reference G. Indirania and K. Selvakumara. A swarm-based efficient distributed intrusion detection system for mobile ad hoc networks (manet). International Journal of Parallel, Emergent and Distributed Systems, 2013. G. Indirania and K. Selvakumara. A swarm-based efficient distributed intrusion detection system for mobile ad hoc networks (manet). International Journal of Parallel, Emergent and Distributed Systems, 2013.
27.
go back to reference H. Li and M. Singhal. Trust management in distributed systems. IEEE Computers, 40(2):45–53, Feb. 2007.CrossRef H. Li and M. Singhal. Trust management in distributed systems. IEEE Computers, 40(2):45–53, Feb. 2007.CrossRef
Metadata
Title
Introduction
Authors
Mohamed M. E. A. Mahmoud
Xuemin (Sherman) Shen
Copyright Year
2014
DOI
https://doi.org/10.1007/978-3-319-04603-7_1

Premium Partner