Article details

Title: Ad Hoc Networks and Their Security: A Survey
Author(s): Mihai-Lică Pura               

Abstract: Ad hoc networks are a new and very promising technology focusing on assuring connectivity between devices. The fact that these networks do not need any kind of infrastructure in order to operate makes them very useful in special scenarios. Military scenarios can also take advantage of this kind of networks. NATO has already taken them into consideration and some military forces use them as backup communication networks. This paper is intended to be an introduction to the ad hoc network concept and to the special security issues that this paradigm raises. There are presented: the networking paradigm on which this type of networks is based on, a general classification of the ad hoc networks, with an emphasis on what are the military applications of each of the classes, the possible ways in which ad hoc capability can be implemented, and the major security aspects and the most important results for them.

Keywords: ad hoc networks, secure ad hoc routing protocols, ad hoc network security.

References:

[1] RTO-TR-IST-035: Awareness of Emerging Wireless Technologies: Ad-Hoc and Personal Area Networks Standards and Emerging Technologies, NATO Research and Technology Organisation, Neuilly-sur-Seine, France, Apr. 2007
[2] L. ZHOU, Z.J. HAAS – Securing Ad Hoc Networks, IEEE Network: Special Issue on Network Security, Vol. 13, No. 6, pp. 24-30, Nov.-Dec. 1999
[3] P. MICHIARDI, R. MOLVA – Ad Hoc Network Security, In H. Bidgoli (Ed.), “Handbook of Information Security. Vol. 1: Key Concepts, Infrastructure, Standards, and Protocols”, pp. 787-806, John Wiley & Sons, Hoboken, NJ, 2006
[4] Distributed Transient Network, http://p2pfoundation.net/Distributed_Transient_Network, 2007
[5] R. BHASKAR – Cryptographic Protocols for Mobile Ad Hoc Networks, Ph.D. Thesis, École Polytechnique, Palaiseau, France, 2006
[6] DAWOUD D.S., R.L. GORDON, A. SULIMAN, KAS! MIR RAJA S.V. – Trust Establishment in Mobile Ad Hoc Networks: Direct Trust Distribution-Performance and Simulation, In X. Wang (Ed.), “Mobile Ad-Hoc Networks: Protocol Design”, pp. 513-564, InTech, Rijeka, Croatia, 2011
[7] L. BUTTYÁN, J.-P. HUBAUX – Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing, Cambridge University Press, New York, NY, 2008
[8] K. KULADINITHI, A.D. UDUGAMA, C. GÖRG – On-Demand Self Organizing Ad Hoc Networks: Implementation Architectures, Proc. of the 12th Meeting of the Wireless World Research Forum “The Convergence of Digital Industries”, WWRF12, Toronto, Canada, Nov. 4-5, 2004
[9] A.A. PIRZADA, C. MCDONALD – Kerberos Assisted Authentication in Mobile Ad-Hoc Networks, Proc. of the 27th Australasian Computer Science Conference, ACSC 2004, pp. 41-46, Dunedin, New Zealand, Jan. 18-22, 2004
[10] A.K. BAYYA, S. GUPTE, Y.K. SHUKLA, A. GARIKAPATI – Security in Ad-Hoc Networks, Term Paper, University of Kentucky, Lexington, KY, 2002
[11] K. HOEPER, G. GONG – Models of Authentication in Ad Hoc Networks and Their Related Network Properties, Technical Report CACR 2004-03, Centre for Applied Cryptographic Research, University of Waterloo, Ontario, Canada, 2004
[12] P. NICOPOLITIDIS, M.S. OBAIDAT, G.I. PAPADIMITRIOU, A.S. POMPORTSIS – Wireless Networks, John Wiley & Sons, Chichester, England, 2003
[13] K.M.J. HAATAJA – Security in Bluetooth, WLAN and IrDA: A Comparison, Report A/2006/1, University of Kuopio, Finland, 2006
[14] V. BOYKO, P. MACKENZIE, S. PATEL – Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman, Proc. of the 19th International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT 2000, pp. 156-171, Bruges, Belgium, May 14-18, 2000
[15] A. RAJARAM, S. PALANISWAMI – A High Certificate Authority Scheme for Aut! henticat ion in Mobile Ad Hoc Networks, International Journal of Computer Science Issues, Vol. 7, No. 4, pp. 37-45, Jul. 2010
[16] M. GE, K.-Y. LAM – Self-Initialized Distributed Certificate Authority for Mobile Ad Hoc Network, Proc. of the 3rd International Conference and Workshops, ISA 2009, pp. 392-401, Seoul, Korea, Jun. 25-27, 2009
[17] S.S.M. CHOW – Certificateless Encryption, In M. Joye and G. Neven (Eds.), “Identity-Based Cryptography”, pp. 135-155, IOS Press, Amsterdam, The Netherlands, 2009
[18] S. BALFE, K.D. BOKLAN, Z. KLAGSBRUN, K.G. PATERSON – Key Refreshing in Identity-Based Cryptography and Its Applications in MANETs, Proc. of the 2007 Military Communications Conference, MILCOM 2007, pp. 1-8, Orlando, FL, Oct. 29-31, 2007