Branding/Logomark minus Citation Combined Shape Icon/Bookmark-empty Icon/Copy Icon/Collection Icon/Close Copy 7 no author result Created with Sketch. Icon/Back Created with Sketch. Match!

Wireless Network Security

Yang Xiao56
Estimated H-index: 56
(UA: University of Alabama)
Cite
Abstract
Wireless networks technologies have been dramatically improved by the popularity of third generation (3G) wireless networks, wireless LANs, Bluetooth, and sensor networks. However, security is a major concern for wide deployments of such wireless networks. The contributions to this volume identify various vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, and discuss ways to strengthen security mechanisms and services in all these layers. The topics covered in this book include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications/multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking.
  • References (74)
  • Citations (0)
Cite
References74
Newest
Published on Oct 1, 2009in IEEE Communications Magazine 10.36
D. Scott Alexander10
Estimated H-index: 10
(Telcordia Technologies),
Yuu-Heng Cheng9
Estimated H-index: 9
(Telcordia Technologies)
+ 9 AuthorsStephen Schwab1
Estimated H-index: 1
The ZODIAC project has been exploring a security first approach to networking based on a new idea, the dynamic community of interest, based on groups of users with a demonstrable need to know. ZODIAC uses the most challenging network setting (the mobile ad hoc network) as a target, since each node must incorporate functions of both hosts and routers. The realization of the DCoI is a work in progress, but initial implementation results have shown that DCoI concepts can be translated into working ...
Published on Jul 1, 2007
Csaba Kiraly11
Estimated H-index: 11
(University of Trento),
Giuseppe Bianchi61
Estimated H-index: 61
+ 2 AuthorsR. Lo Cigno24
Estimated H-index: 24
(University of Trento)
Protection from statistical traffic analysis attacks calls for effective design of traffic flow confidentiality (TFC) mechanisms. These are devised to alter the traffic pattern in order to hide information about contents transmitted, which, despite encryption, can be revealed by malicious users through statistical analysis. Widespread diffusion of these mechanisms requires embedding them in widely deployed protocols. This paper proposes an IPsec based framework aimed at enforcing TFC. This is ch...
Published on Jan 1, 2007
Tiranuch Anantvalee2
Estimated H-index: 2
(FAU: Florida Atlantic University),
Jie Wu74
Estimated H-index: 74
(FAU: Florida Atlantic University)
In recent years, the use of mobile ad hoc networks (MANETs) has been widespread in many applications, including some mission critical applications, and as such security has become one of the major concerns in MANETs. Due to some unique characteristics of MANETs, prevention methods alone are not sufficient to make them secure; therefore, detection should be added as another defense before an attacker can breach the system. In general, the intrusion detection techniques for traditional wireless ne...
Published on Jan 1, 2005in Wireless Networks 2.40
Yih-Chun Hu21
Estimated H-index: 21
(CMU: Carnegie Mellon University),
Adrian Perrig78
Estimated H-index: 78
(CMU: Carnegie Mellon University),
David B. Johnson57
Estimated H-index: 57
(Rice University)
An ad hoc network is a group of wireless mobile computers (or nodes), in which individual nodes cooperate by forwarding packets for each other to allow nodes to communicate beyond direct wireless transmission range. Prior research in ad hoc networking has generally studied the routing problem in a non-adversarial setting, assuming a trusted environment. In this paper, we present attacks against routing in ad hoc networks, and we present the design and performance evaluation of a new secure on-de...
Published on Jan 1, 2003in IEEE Transactions on Mobile Computing 4.47
Srdjan Capkun51
Estimated H-index: 51
,
Levente Buttyán42
Estimated H-index: 42
,
Jean-Pierre Hubaux70
Estimated H-index: 70
In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they exhibit frequent partitioning due to link and node failures and to node mobility. For these reasons, traditional security solutions that require online trusted authorities or certificate repositories are not well-suited for securing ad hoc networks. We propose a fully self-organized public-key management system that allows users to generat...
Published on Jan 1, 2003
Panagiotis Papadimitratos36
Estimated H-index: 36
(Cornell University),
Zygmunt J. Haas59
Estimated H-index: 59
(Cornell University)
Secure operation of the routing protocol is one of the major challenges to be met for the proliferation of the mobile ad hoc networking (MANET) paradigm. Nevertheless, security enhancements have been proposed mostly for reactive MANET protocols. The proposed secure link state routing protocol (SLSP) provides secure proactive topology discovery, which can be beneficial to network operation in a number of ways. SLSP can be employed as a stand-alone protocol, or fit naturally into a hybrid routing ...
Published on Nov 1, 2002in ACM Transactions on Computer Systems 1.38
Miguel Castro51
Estimated H-index: 51
(Microsoft),
Barbara Liskov67
Estimated H-index: 67
(MIT: Massachusetts Institute of Technology)
Our growing reliance on online services accessible on the Internet demands highly available systems that provide correct service without interruptions. Software bugs, operator mistakes, and malicious attacks are a major cause of service interruptions and they can cause arbitrary behavior, that is, Byzantine faults. This article describes a new replication algorithm, BFT, that can be used to build highly available systems that tolerate Byzantine faults. BFT can be used in practice to implement re...
Published on Sep 26, 2002
Pietro Michiardi13
Estimated H-index: 13
(EURECOM: Institut Eurécom),
Refik Molva30
Estimated H-index: 30
(EURECOM: Institut Eurécom)
Countermeasures for node misbehavior and selfishness are mandatory requirements in MANET. Selfishness that causes lack of node activity cannot be solved by classical security means that aim at verifying the correctness and integrity of an operation. We suggest a generic mechanism based on reputation to enforce cooperation among the nodes of a MANET to prevent selfish behavior. Each network entity keeps track of other entities’ collaboration using a technique called reputation. The reputation is ...
Published on Jan 1, 2002
Sonja Buchegger20
Estimated H-index: 20
(IBM),
Jean-Yves Le Boudec54
Estimated H-index: 54
(EPFL: École Polytechnique Fédérale de Lausanne)
Mobile ad-hoc networking works properly only if the participating nodes cooperate in routing and forwarding. However, it may be advantageous for individual nodes not to cooperate. We propose a protocol, called CONFIDANT, for making misbehavior unattractive; it is based on selective altruism and utilitarianism. It aims at detecting and isolating misbehaving nodes, thus making it unattractive to deny cooperation. Trust relationships and routing decisions are based on experienced, observed, or repo...
Published on Jan 1, 2002 in ICNP (International Conference on Network Protocols)
Kimaya Sanzgiri9
Estimated H-index: 9
(UCSB: University of California, Santa Barbara),
Bridget Dahill6
Estimated H-index: 6
+ 2 AuthorsElizabeth M. Belding-Royer32
Estimated H-index: 32
Most recent ad hoc network research has focused on providing routing services without considering security. We detail security threats against ad hoc routing protocols, specifically examining AODV and DSR. In light of these threats, we identify three different environments with distinct security requirements. We propose a solution to one, the managed-open scenario where no network infrastructure is pre-deployed, but a small amount of prior security coordination is expected. Our protocol, authent...
Cited By0
Newest