2006
DOI: 10.1002/dac.840
|View full text |Cite
|
Sign up to set email alerts
|

Ad hoc network routing and security: A review

Abstract: SUMMARYAd hoc network is a collection of wireless mobile nodes dynamically forming a local area network without the use of any existing network infrastructure or centralized administration. One problem in the design of such network is its wireless vulnerabilities and limited physical security. This paper considers the security attributes and goals of ad hoc network, reviews the latest developments of current routing and security mechanissm including encryption, protocols, user authentication, and physical secu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2007
2007
2023
2023

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 33 publications
(12 citation statements)
references
References 54 publications
0
12
0
Order By: Relevance
“…Future work is to develop an ILWN tool based on the existing Petri net tools and analysis techniques and apply it to industrial ECWs and other event-driven systems [16,[21][22][23][24][25][26][27][28][29][30]. …”
Section: Resultsmentioning
confidence: 99%
“…Future work is to develop an ILWN tool based on the existing Petri net tools and analysis techniques and apply it to industrial ECWs and other event-driven systems [16,[21][22][23][24][25][26][27][28][29][30]. …”
Section: Resultsmentioning
confidence: 99%
“…Several works describe the challenges in the field of secure ad hoc networks and the requirements for adapting traditional security mechanisms to ad hoc networks [12], [13], [14]. In [13], it is stated that a combination of cryptographic mechanisms can prevent the majority of attacks in ad hoc networks.…”
Section: Related Workmentioning
confidence: 99%
“…This allows further optimizations of the MI intruder behavior based on known security principles [15,20,21,22,23], as well as implementation of custom behavior that will enable model checking requirements beyond those expressed as safety guarantees (i.e. secrecy and authentication).…”
Section: The MI Intruder Model In Usementioning
confidence: 99%