Routing Security in Wireless Ad Hoc Networks

Routing Security in Wireless Ad Hoc Networks -...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
Routing Security in Wireless Ad  Hoc Networks Hongmei Deng Wei Li Dharma P. Agrawal IEEE Communications Magazine   October 2002
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Outline Introduction Routing security in MANETs Routing protocols in MANETs Routing security in MANETs The black hole problem in current AODV  protocol A proposed solution to the black hole problem Conclusion and future work
Background image of page 2
Introduction Mobile ad hoc network (MANET) MANET is particularly vulnerable due to its  fundamental characteristics, such as open  medium, dynamic topology, distributed  cooperation, and constrained capability. Each mobile node operates not only as a host  but also as a router.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Introduction (cont.) Routing plays an important role in the security  of the entire network.  MANET can be established extremely flexibly  without any fixed base station in battlefields,  military applications, and other emergency  and disaster situation. (Figure 1) The features of MANET All signals go through bandwidth-constrained  wireless links in a MANET, which makes it more  prone to physical security threats than fixed  landline networks.
Background image of page 4
Introduction (cont.) Mobile nodes are roaming independently and are  able to move in any direction. Decentralized decision making in the MANET  relies on the cooperative participation of all nodes. Nodes may rely on batteries or other exhaustible 
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 20

Routing Security in Wireless Ad Hoc Networks -...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online