SECURING RESOURCE-CONSTRAINED WIRELESS AD HOC NETWORKS

被引:14
作者
Fang, Yuguang [1 ,2 ]
Zhu, Xiaoyan [2 ]
Zhang, Yanchao [3 ]
机构
[1] Univ Florida, Dept Elect & Comp Engn, Gainesville, FL 32611 USA
[2] Xidian Univ, Xian, Peoples R China
[3] New Jersey Inst Technol, Dept Elect & Comp Engn, Newark, NJ 07102 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/MWC.2009.4907556
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Huge interest in and demand for services over the information superhighway have pressed various telecommunications research fronts and led to a new form of future Internet consisting of wired and wireless segments where resource-constrained devices such as mobile devices, smart phones, palm pilots, and wireless sensors may become integral parts of the Internet rather than access-only platforms. One of the key design problems is the security in such heterogeneous networks, particularly over wireless networks with resource constraints. In this tutorial article we discuss a novel approach to addressing security issues, and articulate why and how 1D-based cryptography can be effectively applied to address various security problems in resource-constrained wireless networks.
引用
收藏
页码:24 / 29
页数:6
相关论文
共 14 条
[1]   A survey on sensor networks [J].
Akyildiz, IF ;
Su, WL ;
Sankarasubramaniam, Y ;
Cayirci, E .
IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (08) :102-114
[2]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[3]  
[Anonymous], ELSEVIER AD HOC NET
[4]  
Barreto PSLM, 2004, LECT NOTES COMPUT SC, V3006, P17
[5]  
Barreto PSLM, 2002, LECT NOTES COMPUT SC, V2442, P354
[6]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[7]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613
[8]  
Shamir A., 1984, LECT NOTES COMPUTER, P47, DOI [DOI 10.1007/3-540-39568-7, 10.1007/3-540-39568-7_5]
[9]   Security in mobile ad hoc networks: Challenges and solutions [J].
Yang, H ;
Luo, HY ;
Ye, F ;
Lu, SW ;
Zhang, LX .
IEEE WIRELESS COMMUNICATIONS, 2004, 11 (01) :38-47
[10]   A secure incentive protocol for mobile ad hoc networks [J].
Zhang, Yanchao ;
Lou, Wenjing ;
Liu, Wei ;
Fang, Yuguang .
WIRELESS NETWORKS, 2007, 13 (05) :569-582