Secret threshold cryptographic solutions can

Info icon This preview shows pages 38–40. Sign up to view the full content.

View Full Document Right Arrow Icon
secret threshold cryptographic solutions can effectively address the prob- lem of unavailability of centralized certification and authentication server. However, the additional overheads involved in key renewal and partial key accumulation to generate the private key make these solutions less attrac- tive. Consequently, the wireless ad hoc networks have yet to meet a com- plete security solution for authentication and data confidentiality that is lightweight, distributed and covers all aspects of the two security services including initial credential distribution and verification. 8. Conclusion In this chapter, we considered the two security services of authentication and data confidentiality in wireless ad hoc networks. The security issues Copyright © 2010. World Scientific Publishing Company. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. EBSCO Publishing : eBook Collection (EBSCOhost) - printed on 2/16/2016 3:46 AM via CGC-GROUP OF COLLEGES (GHARUAN) AN: 340572 ; Beyah, Raheem, Corbett, Cherita, McNair, Janise.; Security in Ad Hoc and Sensor Networks Account: ns224671
Image of page 38

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
26 A. Naveed and S. Kanhere relating to authentication and confidentiality, specific to ad hoc networks, have been identified and the characteristics of these services have been out- lined. The proposed security solutions for the two services of authentication and confidentiality have been categorized into three categories, depending upon the underlying security techniques. The proposed solutions within each category are discussed in detail. Finally, IEEE 802.11i, standard for wireless security is detailed, its vulnerabilities are highlighted and the solu- tions proposed for the vulnerabilities are discussed. The chapter ends with a note on the open issues relating the two security issues of authentication and confidentiality in wireless ad hoc networks. References 1. Arunesh Mishra, William A. Arbaugh, An Initial Security Analysis of the IEEE 802.1X Standard , Technical report, university of Marryland. February 2002. 2. Hao Yang, Shu. J, Xiaoqiao Meng, Songwu Lu. SCAN: self-organized network-layer security in mobile ad hoc networks , Appears in: IEEE Journal on Selected Areas in Communications, Volume: 24, Issue: 2, pages 261-273, Februry 2006. 3. Security Architecture for Open Systems Interconnection for CCITT Appli- cations, ITU-T Recommendation X.800 , March 1991. 4. IEEE Std. 802.11i-2004, Wireless Medium Access Control (MAC) and Phys- ical Layer (PHY) Specifications: Medium Access Control (MAC) Secu- rity Enhancements. http://standards.ieee.org/getieee802/download/802.11i- 2004.pdf. 5. Hamdy S. Soliman, Mohammed Omari. Application of synchronous dynamic encryption system in mobile wireless domains . In Proceedings of the 1st ACM international workshop on Quality of service and security in wireless and mobile networks (Q2SWinet ’05), Pages 24-30, October 2005.
Image of page 39
Image of page 40
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern