Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Security in Wireless Ad Hoc Networks: Protocols, Key Agreement, and Intrusion Detection - , Study Guides, Projects, Research of Cryptography and System Security

The security issues in wireless ad hoc networks, focusing on secure routing protocols, key agreement techniques, and intrusion detection. The authors plan to compare various ad hoc protocols, such as ddm, oslr, and aodv, and investigate security requirements, attacks, and solutions. They also discuss password-based authenticated key exchange, password authenticated diffie-hellman key exchange, and distributed trust models.

Typology: Study Guides, Projects, Research

Pre 2010

Uploaded on 02/10/2009

koofers-user-3rz
koofers-user-3rz 🇺🇸

10 documents

1 / 5

Toggle sidebar

Related documents


Partial preview of the text

Download Security in Wireless Ad Hoc Networks: Protocols, Key Agreement, and Intrusion Detection - and more Study Guides, Projects, Research Cryptography and System Security in PDF only on Docsity! SECURITY IN WIRELESS AD HOC NETWORKS ECE 646 Prof Dr. Kris Gaj Amarnath Reddy Peddareddy Wari Karthikeyan Paramasivam Sundhar Lakshminarasimhan Abstract An ad hoc network is a collection of wireless nodes that dynamically form a temporary network and operates without the use of existing network infrastructure. In the near future, many personal electronic devices will be able to communicate with each other over a short-range wireless channel. We investigate the principal security issues for such an environment. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective. We need to search for new architecture and mechanisms to protect the wireless networks and mobile computing application. List of alternative protocols/algorithms/implementations/laws you are planning to compare: 1. Security in various Ad Hoc Protocols. • Dynamic Destination Multicast protocol (DDM) • Optimized Link State Routing protocol (OSLR) • On-Demand Multicast Routing Protocol (ODMRP) • Ad Hoc On-Demand Distance-Vector routing protocol (AODV) • Topology Broadcast based on Reverse-Path Forwarding (TBRPF) 2. Techniques to key agreement • Password based Authenticated Key Exchange • Password authenticated Deffie-Hellman Key Exchange 3. Basic properties of trust and their role for security: • Distributed trust model • Password-based Key Agreement • Resurrecting Duckling Security Policy • Distributed Public-Key Management 4. Intrusion Detection techniques in Ad-hoc networks Description of problems/hypothesis we are planning to investigate: 1. Attacks and possible solutions to secure routing • Internal attacks • External attacks 2. Security requirements of ad-hoc networks • Availability. • Confidentiality • Integrity • Non-repudiation 3. Security issues in routing protocols for Ad-hoc networks 4. Security issues in Key Management 5. Issues in designing Intrusion Detection for Ad-hoc networks
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved