Security in mobile ad hoc networks: challenges and solutions
Top Cited Papers
- 16 August 2004
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Wireless Communications
- Vol. 11 (1) , 38-47
- https://doi.org/10.1109/mwc.2004.1269716
Abstract
Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. Unlike the wireline networks, the unique characteristics of mobile ad hoc networks pose a number of nontrivial challenges to security design, such as open peer-to-peer network architecture, shared wireless medium, stringent resource constraints, and highly dynamic network topology. These challenges clearly make a case for building multifence security solutions that achieve both broad protection and desirable network performance. In this article we focus on the fundamental security problem of protecting the multihop network connectivity between mobile nodes in a MANET. We identify the security issues related to this problem, discuss the challenges to security design, and review the state-of-the-art security proposals that protect the MANET link- and network-layer operations of delivering packets over the multihop wireless channel. The complete security solution should span both layers, and encompass all three security components of prevention, detection, and reaction.Keywords
This publication has 15 references indexed in Scilit:
- Detection and handling of MAC layer misbehavior in wireless networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Denial of service attacks at the MAC layer in wireless ad hoc networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- SEAD: secure efficient distance vector routing for mobile wireless ad hoc networksAd Hoc Networks, 2003
- Secure link state routing for mobile ad hoc networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- An on-demand secure routing protocol resilient to byzantine failuresPublished by Association for Computing Machinery (ACM) ,2002
- Securing ad hoc routing protocolsPublished by Association for Computing Machinery (ACM) ,2002
- Self-organized network-layer security in mobile ad hoc networksPublished by Association for Computing Machinery (ACM) ,2002
- The quest for security in mobile ad hoc networksPublished by Association for Computing Machinery (ACM) ,2001
- Mitigating routing misbehavior in mobile ad hoc networksPublished by Association for Computing Machinery (ACM) ,2000
- Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computersPublished by Association for Computing Machinery (ACM) ,1994