This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Security in Mobile Ad Hoc Networks
March/April 2008 (vol. 6 no. 2)
pp. 72-75
Marco Carvalho, Florida Institute for Human and Machine Cognition
One of the most critical roles security researchers have is keeping up with new technologies and considering the security implications that go along with them—essentially, ensuring that security is "baked in" to new ideas from the earliest possible moment. Because of this, researchers have had significant interest in the field of mobile ad hoc networks (Manets). Such networks are frequently viewed as a key communications technology enabler for network-centric warfare and disaster relief operations, and as the technology matures, Manets are increasingly reaching many other applications in areas such as intelligent transportation systems and fault-tolerant mobile sensor grids. Manets can operate in isolation or in coordination with a wired infrastructure, often through a gateway node participating in both networks for traffic relay. This flexibility, along with their self-organizing capabilities, are some of Manet's biggest strengths, as well as their biggest security weaknesses.

1. IEEE Std. 802.11, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE, 1997.
2. S. Fluhrer, I. Mantin, and A. Shamir, "Weakness in the Key Scheduling Algorithm of RC4," Selected Areas in Cryptography, LNCS 2259, Springer, 2001, pp. 1–24.
3. P. Kyasanur and N. Vaidya, "Detection and Handling of MAC Layer Misbehavior in Wireless Networks," Proc. Int'l Conf. Dependable Systems and Networks, 2003, p. 173.
4. A. Shamir, "How to Share a Secret," Comm. ACM, vol. 22, Nov. 1979, pp. 612–613.
5. G Hahn, "Cluster-Based Certificate Chain for Mobile Ad Hoc Networks," Proc. Comp. Science and Its Applications (ICCSA 06), 2006, pp. 769–778.
6. U. Aickelin et al., "Danger Theory: The Link between AIS and IDS?," Proc. 2nd Int'l Conf.. Artificial Immune Systems (ICARIS 03), Springer, pp. 147–155.
7. L.N. de Castro and J.I. Timmis, Artificial Immune Systems: A New Computational Intelligence Approach, Springer-Verlag, 2002, p. 357.

Index Terms:
MANETs, mobiler ad hoc networks, warfare, security, Basic Training
Citation:
Marco Carvalho, "Security in Mobile Ad Hoc Networks," IEEE Security & Privacy, vol. 6, no. 2, pp. 72-75, March-April 2008, doi:10.1109/MSP.2008.44
Usage of this product signifies your acceptance of the Terms of Use.