security ad hoc nokia - Security within Ad hoc Networks...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Security within Ad hoc Networks Position Paper, PAMPAS Workshop, Sept. 16/17 2002, London Author: Preetida Vinayakray-Jani [email protected] Nokia Research Center, Helsinki, Finland 1. WHAT IS AD HOC NETWORK? With the advancement in radio technologies like Bluetooth, IEEE 802.11 or Hiperlan, a new concept of networking has emerged. This is known as ad hoc networking where potential mobile users arrive within the common perimeter of radio link and participate in setting up the network topology for communication. Nodes within ad hoc are mobile and they communicate with each other within radio range through direct wireless links or multihop routing. 2. LACK OF SECURITY WITHIN AD HOC NETWORK The build up of ad hoc network can be envisaged where support of wireless access or wired backbone is not feasible. Ad hoc wireless network does not have any predefined infrastructure and all network services are configured and created on the fly. Thus it is obvious that with lack of infrastructural support and susceptible wireless link attacks, security in ad hoc network becomes inherent weakness. Achieving security within ad hoc networking is challenging due to following reasons [2]: Dynamic Topologies and Membership o A network topology of ad hoc network is very dynamic as mobility of nodes or membership of nodes is very random and rapid. This emphasizes the need for secure solutions to be dynamic Vulnerable wireless link o Passive/Active link attacks like eavesdropping, spoofing, denial of service, masquerading, impersonation are possible Roaming in dangerous environment o Any malicious node or misbehaving node can create hostile attack or deprive all other
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.
  • Spring '12
  • SINGH
  • Computer network, Public key infrastructure, Wireless network, Public-key cryptography, Certificate authority

{[ snackBarMessage ]}

Page1 / 2

security ad hoc nokia - Security within Ad hoc Networks...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online