Copyright 2010 world scientific publishing company

Info icon This preview shows pages 18–20. Sign up to view the full content.

View Full Document Right Arrow Icon
Copyright © 2010. World Scientific Publishing Company. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. EBSCO Publishing : eBook Collection (EBSCOhost) - printed on 2/16/2016 3:46 AM via CGC-GROUP OF COLLEGES (GHARUAN) AN: 340572 ; Beyah, Raheem, Corbett, Cherita, McNair, Janise.; Security in Ad Hoc and Sensor Networks Account: ns224671
Image of page 18

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
6 A. Naveed and S. Kanhere Decentralized and infrastructureless network: The commonly used method of authentication in the Internet is through digital certificates. The certificates are issued by a centralized certification authority to the nodes within the network. A centrally located authentication server is responsible for validiting the certificates presented by a node. The authentication server maintains a list of valid certificates. However, the decentralized nature of wireless ad hoc networks renders these methods impractical. Furthermore, computationally limited and highly mobile devices are incapable of acting as certification authority or the authentication server. High mobility: One of the methods proposed for ad hoc networks to pro- vide the services of certification authority and authentication is by repli- cating these services at different network nodes. Such a replication can reduce the overhead involved. However, only a limited number of highy trusted and secure nodes can be assigned the role of certification author- ity. High mobility of nodes may render such solutions impractical since the service providing nodes can become frequently unreachable by the service requesting nodes. 3. Characteristics of Security Services Based on the issues highlighted in the previous section, the security so- lutions should posses the following characteristics in order to effectively provide the security services of authentication and confidentiality. The security services of authentication and confidentiality should induce minimum computational and communicational overhead. The level of security should be adjustable depending upon the level of resources (computational and battery power) available. The services should be scalable, considering large sized networks with frequent arrival and departure of the network nodes. The security services should not rely on any centralized entity, and no assumption should be made about the availability of any kind of infrastructure. Availability of authentication and confidentiality should be en- sured, keeping in view the high mobility of the nodes. No assumption should be made about the node density while pro- viding the security services. The security services should be robust against multiple malicious, compromised and misbehaving nodes since such scenarios are Copyright © 2010. World Scientific Publishing Company. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law.
Image of page 19
Image of page 20
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern