Abstract
An ad hoc network is formed in haphazard manner. It has many different features from the conventional networks. So the security services applied to the traditional networks are not suitable for the ad hoc networks. In this paper, we will analyze some classical proposals for ad hoc network security and make a comparison on them. From which, we can have a brief idea of the existing circumstances. On the basis of that, we provided two models. Each of those models improves some performance compared to the original.
This work is sponsored by the fundamental research funds for the Central Universities projects.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Xiong, W.-A., Kun, S., Gong, Y.-H.: Ad Hoc Security authentication mechanism overview of Ad hoc network nodes. Comput. Eng. Appl. 44(13) (2008)
Desmedt, Y.: Threshold cryptography. Eur. Trans. Telecommun. 5(4), 449–457 (1994)
Zhou, L., Hass, Z.J.: Securing ad hoc networks. IEEE Netw. 13(6), 24–30 (1999)
Yi, S., Kravets, R.: MOCA: mobile certificate authority for wireless ad hoc networks. In: Proceedings of the 2nd Annual PKI Research Workshop (PKI 2003), April 2003. http://mobius.cs.uiuc.edu/~seungyi/
Yi, S., Kravets. R.: Key management for heterogeneous ad hoc wireless networks. Poster Presentation, ICNP 2002. http://www-sal.cs.uiuc.edu/~rhk/pubs/tr-2290-1734.pdf
Xia, Y., Xiaozhu, J., Han, Z.: A new key management scheme based on threshold mechanism of Ad Hoc network. Journal of QingDao University (Natural Science Edition) 23(4) (2010)
Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security support for mobile ad-hoc networks. In: Proceedings of the 9th IEEE International Conference on Network Protocols (ICNP 2001) (2001)
Hubaux, J.P., Buttyan, L., Capkun, S.: Self-organzied public-key management for mobile ad hoc networks. Trans. Mobile Comput. 2, 52–64 (2003)
Hubaux, J.P., Buttyan, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: Proceedings of MobiHOC, October 2001
Zimmermann, P.: The Official PGP User’s Guide. MIT Press, Cambridge (1995)
Gokhale, S. Dasgupta, P.: Distributed authentication for peer-to-peer networks. In: Proceedings of the 2003 Symposium on Applications and the Internet Workshops 2003, January 2003
Camenisch, J.L., Michels, M.: Proving in zero-knowledge that a number is the product of two safe primes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 107–121. Springer, Heidelberg (1999)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Desmedt, Y.G., Quisquater, J.-J.: Public-key systems based on the difficulty of tampering. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 111–117. Springer, Heidelberg (1987)
Tsuji, S., Itoh, T.: An ID-based cryptosystem based on the discrete logarithm problem. IEEE J. Sel. Areas Commun. 7(4), 467–473 (1989)
Maurer, U.M., Yacobi, Y.: Non-interative public-key cryptography. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 498–507. Springer, Heidelberg (1991)
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Khalili, A., Katz, J., Arbaugh, W.A.: Toward secure key distribution in truly ad hoc networks. In: Proceedings of IEEE Workshop on Security and Assurance in Ad hoc Networks (2003)
Lv, X., Cheng, G., Xu, F.: Threshold authentication scheme of ad hoc network based on bilinear pairings. Comput. Eng. 35(1), 147–149 (2009)
Venkatraman, L., Agrawal. D.P.: A novel authentication scheme for ad hoc networks. In: IEEE Conferences on Wireless Communications and networking, WCNC, vol. 3, pp. 1268–1273 (2000)
Li, G.S., Han, W.-B.: Cluster-based key management in ad hoc networks. Comput. Sci. 33(2) (2006)
Li, G.S.: Resarch for Mobile Ad Hoc Security. The PLA Information Engineering University (2005)
Liu, Z.-L., Xin, Y., Zhu, H.-L.: A cluster-based key management scheme for ad hoc networks. Netinfo Secur. 10 (2012)
Lu, W.: An Identity-based Hierarchical Key Management Scheme for Wireless Mesh Network. Xidian Univerity (2013)
Xu, S.: Research of Key Management and Authentication Mechanisms for Ad Hoc Network. Ji’nan University (2013)
Rajamanickam, M., Murugesan, S., Mariappan,V.: A Node Authentication Clustering Based Security for ADHOC Network, 2014ICCSP, 03–05 April 2014
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yang, F., Zheng, Y., Xiong, P. (2015). An Overview of Ad Hoc Network Security. In: Niu, W., et al. Applications and Techniques in Information Security. ATIS 2015. Communications in Computer and Information Science, vol 557. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-48683-2_12
Download citation
DOI: https://doi.org/10.1007/978-3-662-48683-2_12
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-48682-5
Online ISBN: 978-3-662-48683-2
eBook Packages: Computer ScienceComputer Science (R0)