Abstract
With the development of wireless network, mobile Ad Hoc networks have been applied in many fields. But the security problem of Ad Hoc network has not been solved very well, and the security system of Ad Hoc network is more difficult to design than other networks because of its particularity. Ad Hoc network’s security is a key problem of the Ad Hoc network applications. This article studied Ad Hoc network’s security issues from the aspects of key management, routing security, intrusion detection, and trusted computing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Stajano, F., Anderson, R.: The Resurrecting Deckling: Security Issues for Ad Hoc Networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 172–182. Springer, Heidelberg (2000)
Zhou, L., Hass, Z.J.: Securing ad hoc networks. IEEE Network Magazine 13(6), 24–30 (1999)
Asokan, N., Ginzboorg, P.: Key agreement in ad hoc networks. Computer Communications 23, 1627–1637 (2000)
Camp, T., Boleng, J., Davies, V.: Mobility models for ad hoc network research. Wireless Communications and Mobile Computing (WCMC), Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications (2002)
Sufatrio, Lam, K.Y.: Scalable authentication framework for mobile-IP(SAFe-MIP). Internet draft, IETF (November 1999)
Herzberg, A., Jakobsson, M., et al.: Proactive public key and signature systems. In: ACM Security 1997 (1997)
Fasbender, A., et al.: Variable and scalable security: protection of location information in mobile IP. In: IEEE 46th Vehicular Technology Conference on Mobile Technology for the Human Race (1996)
Hauser, R., et al.: Lowering security overhead in link state routing. Computer Networks (1999)
Zapata, M.G.: Secure ad hoc on-demand distance vector(AODV), Routing. Mobile Ad Hoe Networking Group, Internet Draft (August 2001)
Hu, Y.-C., Johnson, D.B., Perrig, A.: SEAD: Secure efficient distancevector routing for mobile wireless ad hoc networks. In: Proceeding of the 4th IEEE Workshop on Mobile Computing Systems and Applications, Calicoon, NX (June 2002)
Papadimitratos, P., Hass, Z.J.: Secure routing for mobile ad hoc networks. In: SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San AntonioTX (January 2002)
Yi, S., Naldurg, P., Kravets, R.: A security aware routing protocol for wireless ad hoc networks. In: he 6th World Multi-Conference on Systems, Cybernetics Andinfornatics, SCl 2002 (2002)
Buchegger, S., Le Boudec, J.-Y.: Nodes bearing grudges:towards routing security,fairness, and robustness in mobile ad hoc networks. In: Proceedings of 10th Euromicro Workshop on Parallel, Distributes and Network-based Processing (2002)
Zhang, Y., Lee, W.: Intrusion detection in wireless ad hoc networks. In: IEEE Workshop International Conference on Mobile Computing and Networking (MobiCom 2000), Boston, MA, pp. 275–283 (2000)
Kachirski, O., Guha, R.: Intrusion detection using mobile agents in wireless ad hoc networks. In: IEEE Workshop on Knowledge Media Networking (KMN 2002), Kyoto, Japan (2002)
Bhargava, S., Agraval, D.P.: Security enhancement in AODV protocol for wirelessad hoc networks. In: Vehicular Technology Conference, Atlantic City, NY (October 2001)
Kang, Y., Tao, Z., et al.: An Authentication Scheme for Mobile Ad Hoc Networks Based on Trusted Computing. TN929.5 (2010)
Hu, R.-L., Li, R., et al.: Trusted Computing-based Authentication Scheme forAd hoc Networks. Computer Engineering 36(12) (June 2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
De-yu, Y., Tong, L., Geng-yu, W., Zhi-zhao, W. (2013). A Survey on the Security of Multihop Ad Hoc Network. In: Yuan, Y., Wu, X., Lu, Y. (eds) Trustworthy Computing and Services. ISCTCS 2012. Communications in Computer and Information Science, vol 320. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35795-4_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-35795-4_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35794-7
Online ISBN: 978-3-642-35795-4
eBook Packages: Computer ScienceComputer Science (R0)