Ad Hoc Network Security

Pietro Michiardi and Refik Molva, Institut Eurecom, France

Introduction

Routing Security

Secure Routing Proposals

Notes on the Wormhole Attack

Key Management

Public Key Management

Distribution of Symmetric Keys

Context-Aware Key Management

Cooperation Enforcement

Cooperation Enforcement Mechanisms Based on Threshold Cryptography

Cooperation Enforcement Mechanisms Based on Micropayment Schemes

Cooperation Enforcement Mechanisms Based on Reputation

Validation of Cooperation Enforcement Mechanisms through Game Theory

Conclusion

Glossary

Cross References

References

Further Reading

INTRODUCTION

An ad hoc network consists of a set of wireless nodes that act both as data terminals and data transfer equipment to spontaneously form a temporary network without relying on any dedicated infrastructure. Security of ad hoc networks recently received much attention from the research community and a large number of solutions to protect ad hoc networks against various types of attacks have been published. Security in ad hoc networks is a severe problem because of the conjunction of several factors:

  • Vulnerabilities resulting from radio communications: the lack of physical security and the ease of eavesdropping and spoofing call for strong security mechanisms in order to get security that is equivalent to standard wireline communications.
  • Lack of a priori trust: most ad hoc networks consist of a set of nodes that are not part of any shared organization thus classical security ...

Get Handbook of Information Security, Volume 1, Key Concepts, Infrastructure, Standards, and Protocols now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.