Ad hoc networks are a new wireless networking paradigm for mobile
hosts. Unlike traditional mobile wireless networks, ad hoc networks
do not rely on any fixed infrastructure. Instead, hosts rely on each
other to keep the network connected. Military tactical and other
security-sensitive operations are still the main applications of
ad hoc networks, although there is a trend to adopt ad hoc networks
for commercial uses due to their unique properties. One main challenge
in the design of these networks is their vulnerability to security
attacks. In this article, we study the threats on ad hoc network
faces and the security goals to be achieved. We identify the new
challenges and opportunities posed by this new networking environment
and explore new approaches to secure its communication. In particular,
we take advantage of the inherent redundancy in ad hoc networks-multiple
routes between nodes-to defend routing against denial-of-service
attacks. We also use replication and new cryptographic schemes, such
as threshold cryptography, to build a highly secure and highly available
key management service, which terms the core of our security framework
%0 Journal Article
%1 Zhou99
%A Zhou, Lidong
%A Haas, Z.J.
%D 1999
%J Network, IEEE
%K ad-hoc attack cryptographic_schemes cryptography denial-of-service key_management_service land_mobile_radio military_tactical_operations mobile_hosts mobile_wireless_networks network network_design network_redundancy networking_environment public_key_cryptography public_key_infrastructure radio_networks replication routing secure security security-sensitive_operations security_attacks seminal telecommunication threshold_cryptography wireless_networking_paradigm
%N 6
%P 24 -30
%R 10.1109/65.806983
%T Securing ad hoc networks
%V 13
%X Ad hoc networks are a new wireless networking paradigm for mobile
hosts. Unlike traditional mobile wireless networks, ad hoc networks
do not rely on any fixed infrastructure. Instead, hosts rely on each
other to keep the network connected. Military tactical and other
security-sensitive operations are still the main applications of
ad hoc networks, although there is a trend to adopt ad hoc networks
for commercial uses due to their unique properties. One main challenge
in the design of these networks is their vulnerability to security
attacks. In this article, we study the threats on ad hoc network
faces and the security goals to be achieved. We identify the new
challenges and opportunities posed by this new networking environment
and explore new approaches to secure its communication. In particular,
we take advantage of the inherent redundancy in ad hoc networks-multiple
routes between nodes-to defend routing against denial-of-service
attacks. We also use replication and new cryptographic schemes, such
as threshold cryptography, to build a highly secure and highly available
key management service, which terms the core of our security framework
@article{Zhou99,
abstract = {Ad hoc networks are a new wireless networking paradigm for mobile
hosts. Unlike traditional mobile wireless networks, ad hoc networks
do not rely on any fixed infrastructure. Instead, hosts rely on each
other to keep the network connected. Military tactical and other
security-sensitive operations are still the main applications of
ad hoc networks, although there is a trend to adopt ad hoc networks
for commercial uses due to their unique properties. One main challenge
in the design of these networks is their vulnerability to security
attacks. In this article, we study the threats on ad hoc network
faces and the security goals to be achieved. We identify the new
challenges and opportunities posed by this new networking environment
and explore new approaches to secure its communication. In particular,
we take advantage of the inherent redundancy in ad hoc networks-multiple
routes between nodes-to defend routing against denial-of-service
attacks. We also use replication and new cryptographic schemes, such
as threshold cryptography, to build a highly secure and highly available
key management service, which terms the core of our security framework},
added-at = {2011-07-15T15:18:02.000+0200},
author = {Zhou, Lidong and Haas, Z.J.},
biburl = {https://www.bibsonomy.org/bibtex/2bd14b7651e98ad2f3cc77e7afba30116/msteele},
doi = {10.1109/65.806983},
file = {:I\:\\My Documents\\Thesis\\Research\\Zhou99.pdf:PDF},
interhash = {b65f5c175e470b71d38ff585382b3b6d},
intrahash = {bd14b7651e98ad2f3cc77e7afba30116},
issn = {0890-8044},
journal = {Network, IEEE},
keywords = {ad-hoc attack cryptographic_schemes cryptography denial-of-service key_management_service land_mobile_radio military_tactical_operations mobile_hosts mobile_wireless_networks network network_design network_redundancy networking_environment public_key_cryptography public_key_infrastructure radio_networks replication routing secure security security-sensitive_operations security_attacks seminal telecommunication threshold_cryptography wireless_networking_paradigm},
month = nov,
number = 6,
owner = {msteele},
pages = {24 -30},
review = {Cited in Karlof03 as an enumerator of ad hoc network attacks. Need
to verify.},
timestamp = {2011-07-15T21:24:30.000+0200},
title = {Securing ad hoc networks},
volume = 13,
year = 1999
}