|国家预印本平台
首页|Security of Ad Hoc Networks

Security of Ad Hoc Networks

Security of Ad Hoc Networks

中文摘要英文摘要

he wireless ad hoc nature of Mobile Ad hoc Network brought a new security challenges to the network design. Vulnerability of channels and nodes, absence of infrastructure, and dynamically changing topology make ad hoc networks’ security a difficult undertaking. Broadcast wireless channels allow message to be eavesdropping and injection. Wireless networks were generally more vulnerable to information and physical security threats than fixed wired networks. The absence of infrastructure makes the classic security solutions based on certification authorities and online servers inapplicable. This paper on ad hoc networking illustrates that many of the new generation ad hoc networking proposals are not yet able to address the unique security problems of this specialized system. Environment-specific implications on the required approaches in implementing security in such dynamically changing networks have not yet been fully realized. There are many ongoing ad-hoc programming attempts to address the problem. Include Optimized Link State Routing, Ad-hoc On-demand Distance Vector, and Hazy Sighted Link State .We attempt to analyze the demands of Ad-hoc environment. We focus on three routing of Ad-hoc networks attempts to address the problem.

he wireless ad hoc nature of Mobile Ad hoc Network brought a new security challenges to the network design. Vulnerability of channels and nodes, absence of infrastructure, and dynamically changing topology make ad hoc networks’ security a difficult undertaking. Broadcast wireless channels allow message to be eavesdropping and injection. Wireless networks were generally more vulnerable to information and physical security threats than fixed wired networks. The absence of infrastructure makes the classic security solutions based on certification authorities and online servers inapplicable. This paper on ad hoc networking illustrates that many of the new generation ad hoc networking proposals are not yet able to address the unique security problems of this specialized system. Environment-specific implications on the required approaches in implementing security in such dynamically changing networks have not yet been fully realized. There are many ongoing ad-hoc programming attempts to address the problem. Include Optimized Link State Routing, Ad-hoc On-demand Distance Vector, and Hazy Sighted Link State .We attempt to analyze the demands of Ad-hoc environment. We focus on three routing of Ad-hoc networks attempts to address the problem.

申智勇、马利克、李春林、王博

无线通信通信电子对抗

MANETRouting Protocolsecuritywireless networksODV

MANETRouting Protocolsecuritywireless networksODV

申智勇,马利克,李春林,王博.Security of Ad Hoc Networks[EB/OL].(2009-12-25)[2025-08-02].http://www.paper.edu.cn/releasepaper/content/200912-965.点此复制

评论