Skip to main content

A Survey on the Security of Multihop Ad Hoc Network

  • Conference paper
Trustworthy Computing and Services (ISCTCS 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 320))

Included in the following conference series:

  • 3215 Accesses

Abstract

With the development of wireless network, mobile Ad Hoc networks have been applied in many fields. But the security problem of Ad Hoc network has not been solved very well, and the security system of Ad Hoc network is more difficult to design than other networks because of its particularity. Ad Hoc network’s security is a key problem of the Ad Hoc network applications. This article studied Ad Hoc network’s security issues from the aspects of key management, routing security, intrusion detection, and trusted computing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Stajano, F., Anderson, R.: The Resurrecting Deckling: Security Issues for Ad Hoc Networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 172–182. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  2. Zhou, L., Hass, Z.J.: Securing ad hoc networks. IEEE Network Magazine 13(6), 24–30 (1999)

    Article  Google Scholar 

  3. Asokan, N., Ginzboorg, P.: Key agreement in ad hoc networks. Computer Communications 23, 1627–1637 (2000)

    Article  Google Scholar 

  4. Camp, T., Boleng, J., Davies, V.: Mobility models for ad hoc network research. Wireless Communications and Mobile Computing (WCMC), Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications (2002)

    Google Scholar 

  5. Sufatrio, Lam, K.Y.: Scalable authentication framework for mobile-IP(SAFe-MIP). Internet draft, IETF (November 1999)

    Google Scholar 

  6. Herzberg, A., Jakobsson, M., et al.: Proactive public key and signature systems. In: ACM Security 1997 (1997)

    Google Scholar 

  7. Fasbender, A., et al.: Variable and scalable security: protection of location information in mobile IP. In: IEEE 46th Vehicular Technology Conference on Mobile Technology for the Human Race (1996)

    Google Scholar 

  8. Hauser, R., et al.: Lowering security overhead in link state routing. Computer Networks (1999)

    Google Scholar 

  9. Zapata, M.G.: Secure ad hoc on-demand distance vector(AODV), Routing. Mobile Ad Hoe Networking Group, Internet Draft (August 2001)

    Google Scholar 

  10. Hu, Y.-C., Johnson, D.B., Perrig, A.: SEAD: Secure efficient distancevector routing for mobile wireless ad hoc networks. In: Proceeding of the 4th IEEE Workshop on Mobile Computing Systems and Applications, Calicoon, NX (June 2002)

    Google Scholar 

  11. Papadimitratos, P., Hass, Z.J.: Secure routing for mobile ad hoc networks. In: SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San AntonioTX (January 2002)

    Google Scholar 

  12. Yi, S., Naldurg, P., Kravets, R.: A security aware routing protocol for wireless ad hoc networks. In: he 6th World Multi-Conference on Systems, Cybernetics Andinfornatics, SCl 2002 (2002)

    Google Scholar 

  13. Buchegger, S., Le Boudec, J.-Y.: Nodes bearing grudges:towards routing security,fairness, and robustness in mobile ad hoc networks. In: Proceedings of 10th Euromicro Workshop on Parallel, Distributes and Network-based Processing (2002)

    Google Scholar 

  14. Zhang, Y., Lee, W.: Intrusion detection in wireless ad hoc networks. In: IEEE Workshop International Conference on Mobile Computing and Networking (MobiCom 2000), Boston, MA, pp. 275–283 (2000)

    Google Scholar 

  15. Kachirski, O., Guha, R.: Intrusion detection using mobile agents in wireless ad hoc networks. In: IEEE Workshop on Knowledge Media Networking (KMN 2002), Kyoto, Japan (2002)

    Google Scholar 

  16. Bhargava, S., Agraval, D.P.: Security enhancement in AODV protocol for wirelessad hoc networks. In: Vehicular Technology Conference, Atlantic City, NY (October 2001)

    Google Scholar 

  17. Kang, Y., Tao, Z., et al.: An Authentication Scheme for Mobile Ad Hoc Networks Based on Trusted Computing. TN929.5 (2010)

    Google Scholar 

  18. Hu, R.-L., Li, R., et al.: Trusted Computing-based Authentication Scheme forAd hoc Networks. Computer Engineering 36(12) (June 2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

De-yu, Y., Tong, L., Geng-yu, W., Zhi-zhao, W. (2013). A Survey on the Security of Multihop Ad Hoc Network. In: Yuan, Y., Wu, X., Lu, Y. (eds) Trustworthy Computing and Services. ISCTCS 2012. Communications in Computer and Information Science, vol 320. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35795-4_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35795-4_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35794-7

  • Online ISBN: 978-3-642-35795-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics