Ebsco publishing ebook collection ebscohost printed

Info icon This preview shows pages 17–19. Sign up to view the full content.

View Full Document Right Arrow Icon
EBSCO Publishing : eBook Collection (EBSCOhost) - printed on 2/16/2016 3:46 AM via CGC-GROUP OF COLLEGES (GHARUAN) AN: 340572 ; Beyah, Raheem, Corbett, Cherita, McNair, Janise.; Security in Ad Hoc and Sensor Networks Account: ns224671
Image of page 17

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Authentication and Confidentiality in Wireless Ad Hoc Networks 5 Confidentiality ensures that the information transmitted across the net- work is accessable only by the intended recipients. In the example of the preceding paragraph, to ensure the confidentiality of the information, de- vice A encrypts the message using public key of device B. Upon receiving the message, device B decrypts the message using its private key. In this case, a device can decrypt the message successfully only if it is in posses- sion of valid private key of device B. Since the private key of device B is only known to the device itself, only the device B can decrypt the message successfully, ensuring the message confidentiality. Authentication and con- fidentiality are discussed together in this chapter because mostly the same method and keying material is used to provide both services. The rest of the chapter is organized as follows. In Section 2 we high- light the issues associated with authentication and confidentiality in ad hoc networks. Section 3 highlights the characteristics of these services for ad hoc networks. Section 4 and Section 5 detail numerous solutions proposed in literature for the services of authentication and confidentiality in ad hoc networks. We analyse the strenghts, weaknesses and overheads of each so- lution. Section 6 is dedicated to the standardization effort for securing the communication in ad hoc networks. Section 7 enlists the open issues and Section 8 concludes the chapter. 2. Security Issues Relating Authentication and Confidentiality In this section, we highlight the security issues relating authentication and confidentiality that arise from the unique characteristics of wireless ad hoc networks (limited resources, infrastructureless network and high mobility). We also discuss why the solutions proposed for wired networks and wireless local area networks (WLAN) are not feasible for wireless ad hoc networks. Limited resources: The devices participating in a wireless ad hoc network are generally limited in computational and communicational re- sources. Most of the devices are battery operated with limited battery life. In wired networks, the information confidentiality can be achieved through strong asymmetric cryptographic solutions. However, limited com- putational resources and battery power render these solutions infeasible for wireless ad hoc networks. There is a tradeoff between the achievable level of security and the resources required to achieve the desired level. Higher level of confidentiality can only be achieved at the cost of scarce computational and battery resources.
Image of page 18
Image of page 19
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern