Towards the security of routing in ad hoc networks

Access Full Text

Towards the security of routing in ad hoc networks

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Security for Mobility — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Author(s): P. Yau 1  and  V. Sdralia 2
View affiliations
Source: Security for Mobility,2004
Publication date January 2004

Mobile ad hoc networking is a technology designed to ease the burden of network management through the use of distributed solutions. Whereas in the past the design of such networks was aimed at satisfying military scenarios, recent growing awareness of the scope for commercial use has accelerated research into high-performance, self-configuring ad hoc networks. However, the performance advantages that ad hoc networks offer are counterbalanced by security vulnerabilities, which are not present in conventional networking. This chapter discusses these vulnerabilities, focusing on the network layer, and presents a threat model classifying the types of threats to ad hoc networks. A variety of different security requirements can be extracted from the threat model. The latter part of the chapter discusses security mechanisms which have been proposed to satisfy these requirements, and identifies areas for future research.

Inspec keywords: telecommunication security; telecommunication network routing; mobile ad hoc networks

Other keywords: routing security; mobile ad hoc network technology; network management

Subjects: Mobile radio systems

Preview this chapter:
Zoom in
Zoomout

Towards the security of routing in ad hoc networks, Page 1 of 2

| /docserver/preview/fulltext/books/te/pbte051e/PBTE051E_ch10-1.gif /docserver/preview/fulltext/books/te/pbte051e/PBTE051E_ch10-2.gif

Related content

content/books/10.1049/pbte051e_ch10
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading