Skip to main content

Security in Wireless Ad Hoc Networks

  • Chapter
  • First Online:
Guide to Wireless Ad Hoc Networks

Part of the book series: Computer Communications and Networks ((CCN))

  • 1584 Accesses

Abstract

Operating in open and shared media, wireless communication is inherently less secure than wired communication. Even worse, mobile wireless devices usually have limited resources, such as bandwidth, storage space, processing capability, and energy, which makes security enforcement hard. Compared with infrastructure-based wireless networks, security management for wireless ad hoc networks is more challenging due to unreliable communication, intermittent connection, node mobility, and dynamic topology. A complete security solution should include three components of prevention, detection, and reaction, and provides security properties of authentication, confidentiality, non-repudiation, integrity, and availability. It should be adaptive in order to trade-off service performance and security performance under resource limitation. In this chapter, we will focus on the preventive mechanism for key management and broadcast authentication with resource constraints.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    This is exactly the traditional public key management scenario.

  2. 2.

    This may introduce out-of-order packets with large delay variance. We assume that applications will reorder packets if in-order delivery is required.

References

  1. R. Blom. An optimal class of symmetric key generation systems. Lecture Notes in Computer Science, Springer-Verlag, 1985.

    Google Scholar 

  2. S. A. Camtepe and B. Yener. Combinatorial design of key distribution mechanisms for wireless sensor networks. In Proceedings of 9th European Symposium On Research in Computer Security (ESORICS ’04), 2004.

    Google Scholar 

  3. S. Capkun, L. Buttyan and J. P. Hubaux. Self-organized public-key management for mobile ad hoc networks. IEEE Transactions on Mobile Computing, 2003.

    Google Scholar 

  4. H. Chan, A. Perrig and D. Song. Random key predistribution schemes for sensor networks. In IEEE Symposium on Research in Security and Privacy, 2003.

    Google Scholar 

  5. F. Delgosha and F. Fekri. Threshold key-establishment in distributed sensor networks using a multivariate scheme. INFOCOM, 2006.

    Google Scholar 

  6. J. Drissi and Q. Gu. Localized broadcast authentication in large sensor networks. icns, 0:25, 2006.

    Google Scholar 

  7. W. Du, J. Deng, Y. S. Han, S. Chen and P. K. Varshney. A key management scheme for wireless sensor networks using deployment knowledge. IEEE INFOCOM, 2004.

    Google Scholar 

  8. W. Du, J. Deng, Y. Han, P. Varshney. A pairwise key pre-distribution scheme for wireless sensor networks. In Proceedings of 10th ACM Conference on Computer and Communications Security (CCS), 2003.

    Google Scholar 

  9. L. Eschenauer and V. Gligor. A key management scheme for distributed sensor networks. IEEE Symposium on Security and Privacy, 2002.

    Google Scholar 

  10. L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002.

    Google Scholar 

  11. Q. Gu and J. Drissi. Dominating Set based Overhead Reduction for Broadcast Authentication in Large Sensor Networks. ICNS '07: Proceedings of the Third International Conference on Networking and Services, pages 81, Washington, DC, USA, 2007. IEEE Computer Society.

    Google Scholar 

  12. V. Gupta, M. Millard, S. Fung, Y. Zhu, N. Gura, H. Eberle and S. Chang. Sizzle: A standards-based end-to-end security architecture for the embedded internet. In Proceedings of the 3rd IEEE Percom, 2005.

    Google Scholar 

  13. W. He, Y. Huang, K. Nahrstedt, and W.C. Lee. SMOCK: A self-contained public key management scheme for mission-critical wireless Ad Hoc networks. Percom, 201–210, 2007.

    Google Scholar 

  14. Y.-C. Hu, A. Perrig, and D.B. Johnson. Ariadne: A secure on-demand routing protocol for Ad Hoc networks. Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications, 2002.

    Google Scholar 

  15. Y.-C. Hu, A. Perrig and D.B. Johnson. Ariadne: A secure on-demand routing protocol for Ad Hoc networks. Wireless Networks, 2005.

    Google Scholar 

  16. Y. Huang, W. He, K. Nahrstedt, and W.C. Lee. DoS-resistant broadcast authentication protocol with low end-to-end delay. UIUC Technical Report, UIUCDCS-R-2008-2953 March 2008.

    Google Scholar 

  17. G. Gaubatz, J. Kaps and B. Sunar. Public keys cryptography in sensor networks—revisited. In The Proceedings of the 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS), 2004.

    Google Scholar 

  18. B. Karp and H.T. Kung. GPSR: greedy perimeter stateless routing for wireless networks. Mobile Computing and Networking, 243–254, 2000.

    Google Scholar 

  19. S. Kent and T. Polk. Public-key infrastructure (x.509) (pkix) charter. Available at http://www.ietf.org/html.charters/pkix-charter.html.

  20. J. Kong, and P. Zerfos and H. Luo and S. Lu and L. Zhang. Providing robust and ubiquitous security support for mobile ad-hoc networks. In Proceedings of the 9th IEEE International Conference on Network Protocols (ICNP), 2001.

    Google Scholar 

  21. D. Liu and P. Ning. Establishing pairwise keys in distributed sensor networks. In Proc. of 10th ACM Conference on Computer and Communications Security (CCS), 2003.

    Google Scholar 

  22. D. Liu and P. Ning. Improving key predistribution with deployment knowledge in static sensor networks. ACM Transaction Sensor Network,, 1(2):204–239, 2005.

    Article  Google Scholar 

  23. D. Liu, P. Ning, S. Zhu and S. Jajodia. Practical broadcast authentication in sensor networks. MOBIQUITOUS '05, pages 118–132, Washington, DC, USA, 2005. IEEE Computer Society.

    Google Scholar 

  24. D. Liu, P. Ning, S. Zhu and S. Jajodia. Practical broadcast authentication in sensor networks. MOBIQUITOUS '05, pages 118–132, Washington, DC, USA, 2005. IEEE Computer Society.

    Google Scholar 

  25. D.J. Malan, M. Welsh and M.D. Smith. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In The First IEEE International Conference on Sensor and Ad Hoc Communications and Networks, 2004.

    Google Scholar 

  26. A. Perrig, R. Canetti, D. Tygar and D. Song. The TESLA broadcast authentication protocol, 2002.

    Google Scholar 

  27. A. Perrig, J.D. Tygar, D. Song and R. Canetti. Efficient authentication and signing of multicast streams over lossy channels. Proceedings of IEEE Symposium on Security and Privacy'00, pages 56, 2000. IEEE Computer Society.

    Google Scholar 

  28. Y. Sasson, D. Cavin and A. Schiper. Probabilistic broadcast for flooding in wireless mobile ad hoc networks, 2003.

    Google Scholar 

  29. P. Traynor, H. Choi, G. Cao, S. Zhu and T.L. Porta. Establishing pair-wise keys in heterogeneous sensor networks. INFOCOM, 2006.

    Google Scholar 

  30. R. Wang, W. Du and P. Nings. Containing denial-of-service attacks in broadcast authentication in sensor networks. MobiHoc, 2007.

    Google Scholar 

  31. J.E. Wieselthier, G.D. Nguyen and A. Ephremides. On the construction of energy-efficient broadcast and multicast trees in wireless networks. INFOCOM (2), 585–594, 2000.

    Google Scholar 

  32. L. Zhou and Z.J. Haas. Securing Ad Hoc Networks. IEEE Network Magazine, 1999.

    Google Scholar 

  33. S. Zhu, S. Xu, S. Setia and S. Jajodia. Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach. In Proceedings of the 11th IEEE International Conference on Network Protocols (Nov. 04–07, 2003). IEEE Computer Society (Washington, DC), 326.

    Google Scholar 

  34. S. Zhu, S. Xu, S. Setia and S. Jajodia. LHAP: A lightweight hop-by-hop authentication protocol for Ad-Hoc networks, 2003.

    Google Scholar 

  35. S. Zhu, S. Setia and S. Jajodia. LEAP: Efficient security mechanisms for large-scale distributed sensor networks. CCS '03, pages 62–72, New York, USA, 2003. ACM Press.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Klara Nahrstedt .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag London Limited

About this chapter

Cite this chapter

Nahrstedt, K., He, W., Huang, Y. (2009). Security in Wireless Ad Hoc Networks. In: Misra, S., Woungang, I., Chandra Misra, S. (eds) Guide to Wireless Ad Hoc Networks. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-84800-328-6_16

Download citation

  • DOI: https://doi.org/10.1007/978-1-84800-328-6_16

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84800-327-9

  • Online ISBN: 978-1-84800-328-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics