Skip to main content
Top

2014 | Book

Security for Multi-hop Wireless Networks

insite
SEARCH

About this book

This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requirements for these networks, explores challenges in securing networks and presents system models. The authors introduce mechanisms to reduce the overhead and identify malicious nodes that drop packets intentionally. Also included is a new, efficient cooperation incentive scheme to stimulate the selfish nodes to relay information packets and enforce fairness. Many examples are provided, along with predictions for future directions of the field. Security for Multi-hop Wireless Networks demonstrates recent research that enhances the efficiency and safety of these key networks. Concise and practical, it is a useful tool for researchers and professionals working in network security. It is also a valuable resource for advanced-level students interested in wireless communications and networking.

Table of Contents

Frontmatter
Chapter 1. Introduction
Abstract
In multi-hop wireless networks (MWNs), when a mobile node needs to communicate with a remote destination, it relies on the other nodes to relay its packets. MWNs can enable new applications and enhance the network performance. However, the involvement of autonomous and self-interested nodes in packet relaying makes MWNs vulnerable to serious security vulnerabilities that may hinder their practical implementation. In this chapter, we first discuss the main security issues that threaten the MWNs. Then, we discuss the motivations for this work and also the main challenges to secure the network. Finally, we give an overview on our proposals to secure the network.
Mohamed M. E. A. Mahmoud, Xuemin (Sherman) Shen
Chapter 2. System Model
Abstract
In this chapter, we discuss the system model including the network and communication models and the threat and trust models
Mohamed M. E. A. Mahmoud, Xuemin (Sherman) Shen
Chapter 3. Efficient Incentive Scheme
Abstract
In this chapter, we first explain the payment model that is specifically tailored to cooperation stimulation in MWNs. Then, we explain and evaluate an efficient and secure communication protocol called ESIP and an efficient payment receipt submission scheme called RACE. Using ESIP, the payment can be secured with limited use of public key cryptography in sending packets from a source node to a destination node. RACE is a scheme to efficiently submit and process the payment data to Tp.
Mohamed M. E. A. Mahmoud, Xuemin (Sherman) Shen
Chapter 4. Secure Routing Protocols
Abstract
In this chapter, we first discuss the trust/reputation system called TRIPO. We will discuss how the payment reports can be processed to calculate the nodes’ trust values and how the irrational packet dropping nodes can be identified. We will also discuss and evaluate two routing protocols to establish routes through the highly trusted nodes having sufficient energy.
Mohamed M. E. A. Mahmoud, Xuemin (Sherman) Shen
Chapter 5. Conclusions and Future Directions
Abstract
In this chapter, we summarize the main ideas and concepts presented in this brief and highlight future research directions.
Mohamed M. E. A. Mahmoud, Xuemin (Sherman) Shen
Metadata
Title
Security for Multi-hop Wireless Networks
Authors
Mohamed M. E. A. Mahmoud
Xuemin (Sherman) Shen
Copyright Year
2014
Electronic ISBN
978-3-319-04603-7
Print ISBN
978-3-319-04602-0
DOI
https://doi.org/10.1007/978-3-319-04603-7

Premium Partner