Abstract
Operating in open and shared media, wireless communication is inherently less secure than wired communication. Even worse, mobile wireless devices usually have limited resources, such as bandwidth, storage space, processing capability, and energy, which makes security enforcement hard. Compared with infrastructure-based wireless networks, security management for wireless ad hoc networks is more challenging due to unreliable communication, intermittent connection, node mobility, and dynamic topology. A complete security solution should include three components of prevention, detection, and reaction, and provides security properties of authentication, confidentiality, non-repudiation, integrity, and availability. It should be adaptive in order to trade-off service performance and security performance under resource limitation. In this chapter, we will focus on the preventive mechanism for key management and broadcast authentication with resource constraints.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
This is exactly the traditional public key management scenario.
- 2.
This may introduce out-of-order packets with large delay variance. We assume that applications will reorder packets if in-order delivery is required.
References
R. Blom. An optimal class of symmetric key generation systems. Lecture Notes in Computer Science, Springer-Verlag, 1985.
S. A. Camtepe and B. Yener. Combinatorial design of key distribution mechanisms for wireless sensor networks. In Proceedings of 9th European Symposium On Research in Computer Security (ESORICS ’04), 2004.
S. Capkun, L. Buttyan and J. P. Hubaux. Self-organized public-key management for mobile ad hoc networks. IEEE Transactions on Mobile Computing, 2003.
H. Chan, A. Perrig and D. Song. Random key predistribution schemes for sensor networks. In IEEE Symposium on Research in Security and Privacy, 2003.
F. Delgosha and F. Fekri. Threshold key-establishment in distributed sensor networks using a multivariate scheme. INFOCOM, 2006.
J. Drissi and Q. Gu. Localized broadcast authentication in large sensor networks. icns, 0:25, 2006.
W. Du, J. Deng, Y. S. Han, S. Chen and P. K. Varshney. A key management scheme for wireless sensor networks using deployment knowledge. IEEE INFOCOM, 2004.
W. Du, J. Deng, Y. Han, P. Varshney. A pairwise key pre-distribution scheme for wireless sensor networks. In Proceedings of 10th ACM Conference on Computer and Communications Security (CCS), 2003.
L. Eschenauer and V. Gligor. A key management scheme for distributed sensor networks. IEEE Symposium on Security and Privacy, 2002.
L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002.
Q. Gu and J. Drissi. Dominating Set based Overhead Reduction for Broadcast Authentication in Large Sensor Networks. ICNS '07: Proceedings of the Third International Conference on Networking and Services, pages 81, Washington, DC, USA, 2007. IEEE Computer Society.
V. Gupta, M. Millard, S. Fung, Y. Zhu, N. Gura, H. Eberle and S. Chang. Sizzle: A standards-based end-to-end security architecture for the embedded internet. In Proceedings of the 3rd IEEE Percom, 2005.
W. He, Y. Huang, K. Nahrstedt, and W.C. Lee. SMOCK: A self-contained public key management scheme for mission-critical wireless Ad Hoc networks. Percom, 201–210, 2007.
Y.-C. Hu, A. Perrig, and D.B. Johnson. Ariadne: A secure on-demand routing protocol for Ad Hoc networks. Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications, 2002.
Y.-C. Hu, A. Perrig and D.B. Johnson. Ariadne: A secure on-demand routing protocol for Ad Hoc networks. Wireless Networks, 2005.
Y. Huang, W. He, K. Nahrstedt, and W.C. Lee. DoS-resistant broadcast authentication protocol with low end-to-end delay. UIUC Technical Report, UIUCDCS-R-2008-2953 March 2008.
G. Gaubatz, J. Kaps and B. Sunar. Public keys cryptography in sensor networks—revisited. In The Proceedings of the 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS), 2004.
B. Karp and H.T. Kung. GPSR: greedy perimeter stateless routing for wireless networks. Mobile Computing and Networking, 243–254, 2000.
S. Kent and T. Polk. Public-key infrastructure (x.509) (pkix) charter. Available at http://www.ietf.org/html.charters/pkix-charter.html.
J. Kong, and P. Zerfos and H. Luo and S. Lu and L. Zhang. Providing robust and ubiquitous security support for mobile ad-hoc networks. In Proceedings of the 9th IEEE International Conference on Network Protocols (ICNP), 2001.
D. Liu and P. Ning. Establishing pairwise keys in distributed sensor networks. In Proc. of 10th ACM Conference on Computer and Communications Security (CCS), 2003.
D. Liu and P. Ning. Improving key predistribution with deployment knowledge in static sensor networks. ACM Transaction Sensor Network,, 1(2):204–239, 2005.
D. Liu, P. Ning, S. Zhu and S. Jajodia. Practical broadcast authentication in sensor networks. MOBIQUITOUS '05, pages 118–132, Washington, DC, USA, 2005. IEEE Computer Society.
D. Liu, P. Ning, S. Zhu and S. Jajodia. Practical broadcast authentication in sensor networks. MOBIQUITOUS '05, pages 118–132, Washington, DC, USA, 2005. IEEE Computer Society.
D.J. Malan, M. Welsh and M.D. Smith. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In The First IEEE International Conference on Sensor and Ad Hoc Communications and Networks, 2004.
A. Perrig, R. Canetti, D. Tygar and D. Song. The TESLA broadcast authentication protocol, 2002.
A. Perrig, J.D. Tygar, D. Song and R. Canetti. Efficient authentication and signing of multicast streams over lossy channels. Proceedings of IEEE Symposium on Security and Privacy'00, pages 56, 2000. IEEE Computer Society.
Y. Sasson, D. Cavin and A. Schiper. Probabilistic broadcast for flooding in wireless mobile ad hoc networks, 2003.
P. Traynor, H. Choi, G. Cao, S. Zhu and T.L. Porta. Establishing pair-wise keys in heterogeneous sensor networks. INFOCOM, 2006.
R. Wang, W. Du and P. Nings. Containing denial-of-service attacks in broadcast authentication in sensor networks. MobiHoc, 2007.
J.E. Wieselthier, G.D. Nguyen and A. Ephremides. On the construction of energy-efficient broadcast and multicast trees in wireless networks. INFOCOM (2), 585–594, 2000.
L. Zhou and Z.J. Haas. Securing Ad Hoc Networks. IEEE Network Magazine, 1999.
S. Zhu, S. Xu, S. Setia and S. Jajodia. Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach. In Proceedings of the 11th IEEE International Conference on Network Protocols (Nov. 04–07, 2003). IEEE Computer Society (Washington, DC), 326.
S. Zhu, S. Xu, S. Setia and S. Jajodia. LHAP: A lightweight hop-by-hop authentication protocol for Ad-Hoc networks, 2003.
S. Zhu, S. Setia and S. Jajodia. LEAP: Efficient security mechanisms for large-scale distributed sensor networks. CCS '03, pages 62–72, New York, USA, 2003. ACM Press.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag London Limited
About this chapter
Cite this chapter
Nahrstedt, K., He, W., Huang, Y. (2009). Security in Wireless Ad Hoc Networks. In: Misra, S., Woungang, I., Chandra Misra, S. (eds) Guide to Wireless Ad Hoc Networks. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-84800-328-6_16
Download citation
DOI: https://doi.org/10.1007/978-1-84800-328-6_16
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-84800-327-9
Online ISBN: 978-1-84800-328-6
eBook Packages: Computer ScienceComputer Science (R0)