Abstract
In multi-hop wireless networks (MWNs), when a mobile node needs to communicate with a remote destination, it relies on the other nodes to relay its packets. MWNs can enable new applications and enhance the network performance. However, the involvement of autonomous and self-interested nodes in packet relaying makes MWNs vulnerable to serious security vulnerabilities that may hinder their practical implementation. In this chapter, we first discuss the main security issues that threaten the MWNs. Then, we discuss the motivations for this work and also the main challenges to secure the network. Finally, we give an overview on our proposals to secure the network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
X. J. Li, B. C. Seet, and P. H. J. Chong. Multihop cellular networks: Technology and economics. Computer Networks, 52:1825–1837, 2008.
C. Gomes and J. Galtier. Optimal and fair transmission rate allocation problem in multi-hop cellular networks. Lecture Notes in Computer Science, Springer Berlin/Heidelberg, 5793:327–340, Aug. 2009.
H. Wu, C. Qios, S. De, and O. Tonguz. Integrated cellular and ad hoc relaying systems: icar. IEEE Journal of Selected Areas in Communications, 19(10):2105–2115, Oct. 2001.
A. Abdrabou and W. Zhuang. Statistical qos routing for ieee 802.11 multihop ad hoc networks. IEEE Transactions on Wireless Communications, 8(3):1542–1552, Mar. 2009.
S. Bah and R. Glitho and R. Dssouli. Sip servlets for service provisioning in multihop cellular networks: High-level architectural alternatives. Proc. of IEEE CCNC, pages 127–131, 2008.
M. Kubisch, S. Mengesha, D. Hollos, H. Karl, and A. Wolisz. Applying ad-hoc relaying to improve capacity, energy efficiency, and immission in infrastructure-based wlans. Proc. of Kommunikation in Verteilten Systemen, Leipzig, Germany, pages 195–206, 2003.
R. Schoenen, R. Halfmann, and B. H. Walke. Mac performance of a 3gpp-lte multihop cellular network. Proc. of IEEE ICC, pages 4819– 4824, 2008.
P. Gupta and P. Kumar. The capacity of wireless networks. IEEE Transactions on Information Theory, 46(2):388–404, Mar. 2000.
C. Chou, D. Wei, C. Kuo, and K. Naik. An efficient anonymous communication protocol for peer-to-peer applications over mobile ad-hoc networks. IEEE Journal on Selected Areas in Communications, 25(1):192 – 203, Jan. 2007.
H. Gharavi. Multichannel mobile ad hoc links for multimedia communications. Proc. of IEEE, 96(1):77–96, Jan. 2008.
D. Johnson, D. Maltz, and Y. Hu. The dynamic source routing protocol for mobile ad hoc networks (dsr). technical report, IETF MANET Working Group, Feb. 2007.
S. Marti, T. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. Proc. of ACM International Conference on Mobile Computing and Networking (MobiCom’00), Boston, Massachusetts, USA, pages 255–265, Aug. 6–11 2000.
P. Michiardi and R. Molva. Simulation-based analysis of security exposures in mobile ad hoc networks. Proc. of European Wireless Conference, Florence, Italy, Feb. 25–28 2002.
J. Hu. Cooperation in mobile ad hoc networks. Technical report TR-050111, Computer Science Department, Florida State University, Tallahassee, Jan. 2005.
G. Marias, P. Georgiadis, D. Flitzanis, and K. Mandalas. Cooperation enforcement schemes for manets: A survey. Wiley’s Journal of Wireless Communications and Mobile Computing, 6(3):319–332, 2006.
Y. Zhang and Y. Fang. A fine-grained reputation system for reliable service selection in peer-to-peer networks. IEEE Transactions on Parallel and Distributed Systems, 18(8):1134–1145, Aug. 2007.
S. Lee, G. Pan, J-S Park, M. Gerla, and S. Lu. Secure incentives for commercial ad dissemination in vehicular networks. Proc. of MobiHoc’07, Sep. 2007.
R. Lu, X. Lin, H. Zhu, C. Zhang, P.H. Ho, and X. Shen. A novel fair incentive protocol for mobile ad hoc networks. Proc. of IEEE WCNC’08, Las Vegas, Nevada, USA, March 31 - April 3 2008.
Y. Zhang and Y. Fang. A secure authentication and billing architecture for wireless mesh networks. ACM Wireless Networks, 13(5):569–582, Oct. 2007.
F. Milan, J. Jaramillo, and R. Srikant. Achieving cooperation in multi-hop wireless networks of selfish nodes. Proc. of workshop on Game Theory for Communications and Networks, Pisa, Italy, Oct. 14 2006.
L. Feeney. An energy-consumption model for performance analysis of routing protocols for mobile ad hoc networks. Mobile Networks and Applications, 3(6):239–249, 2001.
Y. Lin and Y. Hsu. Multihop cellular: A new architecture for wireless communications. Proc. of IEEE INFOCOM’00, 3:1273–1282, Mar. 26–30 2000.
J. Palmer and L. Eriksen. Digital newspapers explore marketing on the internet. ACM Communications, 42(9):33–40, 1999.
G. Iannaccone, C. Chuah, R. Mortier, S. Bhattacharyya, and C. Diot. Analysis of link failures in an ip backbone. Proc. of IMW 2002, ACMPress, Marseille, France, Nov. 2002.
X. Li, Z. Li, M. Stojmenovic, V. Narasimhan, and A. Nayak. Autoregressive trust management in wireless ad hoe networks. Ad hoc and Sensor Wireless Networks, 16:229–242, Feb. 2012.
G. Indirania and K. Selvakumara. A swarm-based efficient distributed intrusion detection system for mobile ad hoc networks (manet). International Journal of Parallel, Emergent and Distributed Systems, 2013.
H. Li and M. Singhal. Trust management in distributed systems. IEEE Computers, 40(2):45–53, Feb. 2007.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2014 The Author(s)
About this chapter
Cite this chapter
Mahmoud, M.M.E.A., Shen, X. (2014). Introduction. In: Security for Multi-hop Wireless Networks. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-04603-7_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-04603-7_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-04602-0
Online ISBN: 978-3-319-04603-7
eBook Packages: Computer ScienceComputer Science (R0)