Skip to main content

An Overview of Ad Hoc Network Security

  • Conference paper
  • First Online:
Applications and Techniques in Information Security (ATIS 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 557))

Abstract

An ad hoc network is formed in haphazard manner. It has many different features from the conventional networks. So the security services applied to the traditional networks are not suitable for the ad hoc networks. In this paper, we will analyze some classical proposals for ad hoc network security and make a comparison on them. From which, we can have a brief idea of the existing circumstances. On the basis of that, we provided two models. Each of those models improves some performance compared to the original.

This work is sponsored by the fundamental research funds for the Central Universities projects.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Xiong, W.-A., Kun, S., Gong, Y.-H.: Ad Hoc Security authentication mechanism overview of Ad hoc network nodes. Comput. Eng. Appl. 44(13) (2008)

    Google Scholar 

  2. Desmedt, Y.: Threshold cryptography. Eur. Trans. Telecommun. 5(4), 449–457 (1994)

    Article  MathSciNet  Google Scholar 

  3. Zhou, L., Hass, Z.J.: Securing ad hoc networks. IEEE Netw. 13(6), 24–30 (1999)

    Article  Google Scholar 

  4. Yi, S., Kravets, R.: MOCA: mobile certificate authority for wireless ad hoc networks. In: Proceedings of the 2nd Annual PKI Research Workshop (PKI 2003), April 2003. http://mobius.cs.uiuc.edu/~seungyi/

  5. Yi, S., Kravets. R.: Key management for heterogeneous ad hoc wireless networks. Poster Presentation, ICNP 2002. http://www-sal.cs.uiuc.edu/~rhk/pubs/tr-2290-1734.pdf

  6. Xia, Y., Xiaozhu, J., Han, Z.: A new key management scheme based on threshold mechanism of Ad Hoc network. Journal of QingDao University (Natural Science Edition) 23(4) (2010)

    Google Scholar 

  7. Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security support for mobile ad-hoc networks. In: Proceedings of the 9th IEEE International Conference on Network Protocols (ICNP 2001) (2001)

    Google Scholar 

  8. Hubaux, J.P., Buttyan, L., Capkun, S.: Self-organzied public-key management for mobile ad hoc networks. Trans. Mobile Comput. 2, 52–64 (2003)

    Article  Google Scholar 

  9. Hubaux, J.P., Buttyan, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: Proceedings of MobiHOC, October 2001

    Google Scholar 

  10. Zimmermann, P.: The Official PGP User’s Guide. MIT Press, Cambridge (1995)

    Google Scholar 

  11. Gokhale, S. Dasgupta, P.: Distributed authentication for peer-to-peer networks. In: Proceedings of the 2003 Symposium on Applications and the Internet Workshops 2003, January 2003

    Google Scholar 

  12. Camenisch, J.L., Michels, M.: Proving in zero-knowledge that a number is the product of two safe primes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 107–121. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  13. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  14. Desmedt, Y.G., Quisquater, J.-J.: Public-key systems based on the difficulty of tampering. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 111–117. Springer, Heidelberg (1987)

    Chapter  Google Scholar 

  15. Tsuji, S., Itoh, T.: An ID-based cryptosystem based on the discrete logarithm problem. IEEE J. Sel. Areas Commun. 7(4), 467–473 (1989)

    Article  Google Scholar 

  16. Maurer, U.M., Yacobi, Y.: Non-interative public-key cryptography. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 498–507. Springer, Heidelberg (1991)

    Chapter  Google Scholar 

  17. Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  18. Khalili, A., Katz, J., Arbaugh, W.A.: Toward secure key distribution in truly ad hoc networks. In: Proceedings of IEEE Workshop on Security and Assurance in Ad hoc Networks (2003)

    Google Scholar 

  19. Lv, X., Cheng, G., Xu, F.: Threshold authentication scheme of ad hoc network based on bilinear pairings. Comput. Eng. 35(1), 147–149 (2009)

    Google Scholar 

  20. Venkatraman, L., Agrawal. D.P.: A novel authentication scheme for ad hoc networks. In: IEEE Conferences on Wireless Communications and networking, WCNC, vol. 3, pp. 1268–1273 (2000)

    Google Scholar 

  21. Li, G.S., Han, W.-B.: Cluster-based key management in ad hoc networks. Comput. Sci. 33(2) (2006)

    Google Scholar 

  22. Li, G.S.: Resarch for Mobile Ad Hoc Security. The PLA Information Engineering University (2005)

    Google Scholar 

  23. Liu, Z.-L., Xin, Y., Zhu, H.-L.: A cluster-based key management scheme for ad hoc networks. Netinfo Secur. 10 (2012)

    Google Scholar 

  24. Lu, W.: An Identity-based Hierarchical Key Management Scheme for Wireless Mesh Network. Xidian Univerity (2013)

    Google Scholar 

  25. Xu, S.: Research of Key Management and Authentication Mechanisms for Ad Hoc Network. Ji’nan University (2013)

    Google Scholar 

  26. Rajamanickam, M., Murugesan, S., Mariappan,V.: A Node Authentication Clustering Based Security for ADHOC Network, 2014ICCSP, 03–05 April 2014

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fan Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yang, F., Zheng, Y., Xiong, P. (2015). An Overview of Ad Hoc Network Security. In: Niu, W., et al. Applications and Techniques in Information Security. ATIS 2015. Communications in Computer and Information Science, vol 557. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-48683-2_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-48683-2_12

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-48682-5

  • Online ISBN: 978-3-662-48683-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics