The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - March/April (2008 vol.6)
pp: 72-75
Marco Carvalho , Florida Institute for Human and Machine Cognition
ABSTRACT
One of the most critical roles security researchers have is keeping up with new technologies and considering the security implications that go along with them—essentially, ensuring that security is "baked in" to new ideas from the earliest possible moment. Because of this, researchers have had significant interest in the field of mobile ad hoc networks (Manets). Such networks are frequently viewed as a key communications technology enabler for network-centric warfare and disaster relief operations, and as the technology matures, Manets are increasingly reaching many other applications in areas such as intelligent transportation systems and fault-tolerant mobile sensor grids. Manets can operate in isolation or in coordination with a wired infrastructure, often through a gateway node participating in both networks for traffic relay. This flexibility, along with their self-organizing capabilities, are some of Manet's biggest strengths, as well as their biggest security weaknesses.
INDEX TERMS
MANETs, mobiler ad hoc networks, warfare, security, Basic Training
CITATION
Marco Carvalho, "Security in Mobile Ad Hoc Networks", IEEE Security & Privacy, vol.6, no. 2, pp. 72-75, March/April 2008, doi:10.1109/MSP.2008.44
REFERENCES
1. IEEE Std. 802.11, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE, 1997.
2. S. Fluhrer, I. Mantin, and A. Shamir, "Weakness in the Key Scheduling Algorithm of RC4," Selected Areas in Cryptography, LNCS 2259, Springer, 2001, pp. 1–24.
3. P. Kyasanur and N. Vaidya, "Detection and Handling of MAC Layer Misbehavior in Wireless Networks," Proc. Int'l Conf. Dependable Systems and Networks, 2003, p. 173.
4. A. Shamir, "How to Share a Secret," Comm. ACM, vol. 22, Nov. 1979, pp. 612–613.
5. G Hahn, "Cluster-Based Certificate Chain for Mobile Ad Hoc Networks," Proc. Comp. Science and Its Applications (ICCSA 06), 2006, pp. 769–778.
6. U. Aickelin et al., "Danger Theory: The Link between AIS and IDS?," Proc. 2nd Int'l Conf.. Artificial Immune Systems (ICARIS 03), Springer, pp. 147–155.
7. L.N. de Castro and J.I. Timmis, Artificial Immune Systems: A New Computational Intelligence Approach, Springer-Verlag, 2002, p. 357.
34 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool