期刊文献+

Security of Ad Hoc Network

Security of Ad Hoc Network
下载PDF
导出
摘要 An Ad hoc network is composed of wireless mobile nodes.Because there is no other wired infrastructure such as base stations,the ad hoc network,unlike other wireless networks such as Wireless Local Area Network(WLAN),has to face attacks from both the control plane and the data plane.Ad hoc should ensure the routing security on the control plane,and the secure forwarding of packets on the data plane.The distributed network protocol should operate safely,and peer-to-peer nodes should have trusting relations for each other.For this purpose,a complete security solution should include three parts:security on the control plane,security on the data plane,and security of key management. An Ad hoc network is composed of wireless mobile nodes.Because there is no other wired infrastructure such as base stations,the ad hoc network,unlike other wireless networks such as Wireless Local Area Network(WLAN),has to face attacks from both the control plane and the data plane.Ad hoc should ensure the routing security on the control plane,and the secure forwarding of packets on the data plane.The distributed network protocol should operate safely,and peer-to-peer nodes should have trusting relations for each other.For this purpose,a complete security solution should include three parts:security on the control plane,security on the data plane,and security of key management.
出处 《ZTE Communications》 2007年第4期24-26,共3页 中兴通讯技术(英文版)
基金 This work was funded by the National Basic Research Program (973 Program) of China under Grant 2007CB310704.
  • 相关文献

参考文献7

  • 1况晓辉,胡华平,吕世辉.移动Ad-hoc网络安全[J].小型微型计算机系统,2003,24(10):1861-1864. 被引量:13
  • 2WELCH D,LATHROP S.Wireless security threat taxonomy. Proceedings ofthe 2003 IEEE Workshop on Information Assurance . 2003
  • 3ZHENG Yu.Research on some criticaltechnologies used in 4G wireless network security. . 2006
  • 4YANG H,RICCIATO F,LU S, et al.Securing a wireless world. Proceedings ofthe IEEE . 2006
  • 5M. IIyas.The handbook ofad hoc wireless networks. . 2003
  • 6S. Murphy,and M. Badger.Digitalsignature protection ofthe OSPF routing protocol. Proceedings ofthe Symposium on Network and Distributed System Security (SNDSS’96) . 1996
  • 7KUANG Xiao-hui,HU Hua-ping,LV Shi-hui 1 (School of Computer Science,National University of Defense Technology,Changsha 410007,China) 2 (School of Information Engineering,University of Science and Technology Beijing,Beijing 100080,China).Security in Mobile Ad-hoc Networks. Mini Micro Systems . 2003

二级参考文献11

  • 1Zygmunt J. Haas and Marc R. Pearlman. The zone routing protocol (ZRP) for Ad-hoc networks[Z]. Internet Draft, Work in Progress, 2000.
  • 2Kent S and Atkinson R. IP authentication header [S]. RFC 2402, November 1998.
  • 3Kent S and Atkinson R. IP encapsulating security payload (ESP)[S]. RFC 2406, November 1998.
  • 4Kent S and Atkinson R. Security architecture for the internet protocol[S]. RFC 2401, November 1998.
  • 5Charles E. Perkins, Elizabeth M. Royer and Samir R. Das. Adhoc on-demand distance vector (AODV) routing [Z]. Internet Draft, work in progress, IETF Mobile Ad-hoc Networking Working Group, July 2000.
  • 6Frank Stajano and Ross Anderson. The resurrecting duckling :security issues for Ad-hoc wireless networks [C]. In Security Protocols, 7th International Workshop Pro-ceedings, Lecture Notes in Computer Science, 1999. Springer-Verlag.
  • 7Wang Fei-yi, Brian Vetter and Shyhtsun Wu. Secure routing protocols: theory and practice [M]. North Carolina State University, May 1997.
  • 8Zhou Li-dong and Zygmunt J. Haas. Securing Ad- hoc networks[M]. IEEE Networks, 1999, 13(6):24-30.
  • 9Vesa karpijoki. Security in Ad-hoc networks[M]. Helsinki University of Technology, 2000.
  • 10Vesa karpijoki. Signalling and routing security in mobile and Ad-hoc networks[M]. Helsinki University of Technology, 2000.

共引文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部