Skip to main content

Introduction

  • Chapter
  • First Online:
Security for Multi-hop Wireless Networks

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

  • 540 Accesses

Abstract

In multi-hop wireless networks (MWNs), when a mobile node needs to communicate with a remote destination, it relies on the other nodes to relay its packets. MWNs can enable new applications and enhance the network performance. However, the involvement of autonomous and self-interested nodes in packet relaying makes MWNs vulnerable to serious security vulnerabilities that may hinder their practical implementation. In this chapter, we first discuss the main security issues that threaten the MWNs. Then, we discuss the motivations for this work and also the main challenges to secure the network. Finally, we give an overview on our proposals to secure the network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. X. J. Li, B. C. Seet, and P. H. J. Chong. Multihop cellular networks: Technology and economics. Computer Networks, 52:1825–1837, 2008.

    Article  MATH  Google Scholar 

  2. C. Gomes and J. Galtier. Optimal and fair transmission rate allocation problem in multi-hop cellular networks. Lecture Notes in Computer Science, Springer Berlin/Heidelberg, 5793:327–340, Aug. 2009.

    Google Scholar 

  3. H. Wu, C. Qios, S. De, and O. Tonguz. Integrated cellular and ad hoc relaying systems: icar. IEEE Journal of Selected Areas in Communications, 19(10):2105–2115, Oct. 2001.

    Article  Google Scholar 

  4. A. Abdrabou and W. Zhuang. Statistical qos routing for ieee 802.11 multihop ad hoc networks. IEEE Transactions on Wireless Communications, 8(3):1542–1552, Mar. 2009.

    Google Scholar 

  5. S. Bah and R. Glitho and R. Dssouli. Sip servlets for service provisioning in multihop cellular networks: High-level architectural alternatives. Proc. of IEEE CCNC, pages 127–131, 2008.

    Google Scholar 

  6. M. Kubisch, S. Mengesha, D. Hollos, H. Karl, and A. Wolisz. Applying ad-hoc relaying to improve capacity, energy efficiency, and immission in infrastructure-based wlans. Proc. of Kommunikation in Verteilten Systemen, Leipzig, Germany, pages 195–206, 2003.

    Google Scholar 

  7. R. Schoenen, R. Halfmann, and B. H. Walke. Mac performance of a 3gpp-lte multihop cellular network. Proc. of IEEE ICC, pages 4819– 4824, 2008.

    Google Scholar 

  8. P. Gupta and P. Kumar. The capacity of wireless networks. IEEE Transactions on Information Theory, 46(2):388–404, Mar. 2000.

    Article  MATH  MathSciNet  Google Scholar 

  9. C. Chou, D. Wei, C. Kuo, and K. Naik. An efficient anonymous communication protocol for peer-to-peer applications over mobile ad-hoc networks. IEEE Journal on Selected Areas in Communications, 25(1):192 – 203, Jan. 2007.

    Article  Google Scholar 

  10. H. Gharavi. Multichannel mobile ad hoc links for multimedia communications. Proc. of IEEE, 96(1):77–96, Jan. 2008.

    Article  Google Scholar 

  11. D. Johnson, D. Maltz, and Y. Hu. The dynamic source routing protocol for mobile ad hoc networks (dsr). technical report, IETF MANET Working Group, Feb. 2007.

    Google Scholar 

  12. S. Marti, T. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. Proc. of ACM International Conference on Mobile Computing and Networking (MobiCom’00), Boston, Massachusetts, USA, pages 255–265, Aug. 6–11 2000.

    Google Scholar 

  13. P. Michiardi and R. Molva. Simulation-based analysis of security exposures in mobile ad hoc networks. Proc. of European Wireless Conference, Florence, Italy, Feb. 25–28 2002.

    Google Scholar 

  14. J. Hu. Cooperation in mobile ad hoc networks. Technical report TR-050111, Computer Science Department, Florida State University, Tallahassee, Jan. 2005.

    Google Scholar 

  15. G. Marias, P. Georgiadis, D. Flitzanis, and K. Mandalas. Cooperation enforcement schemes for manets: A survey. Wiley’s Journal of Wireless Communications and Mobile Computing, 6(3):319–332, 2006.

    Article  Google Scholar 

  16. Y. Zhang and Y. Fang. A fine-grained reputation system for reliable service selection in peer-to-peer networks. IEEE Transactions on Parallel and Distributed Systems, 18(8):1134–1145, Aug. 2007.

    Article  Google Scholar 

  17. S. Lee, G. Pan, J-S Park, M. Gerla, and S. Lu. Secure incentives for commercial ad dissemination in vehicular networks. Proc. of MobiHoc’07, Sep. 2007.

    Google Scholar 

  18. R. Lu, X. Lin, H. Zhu, C. Zhang, P.H. Ho, and X. Shen. A novel fair incentive protocol for mobile ad hoc networks. Proc. of IEEE WCNC’08, Las Vegas, Nevada, USA, March 31 - April 3 2008.

    Google Scholar 

  19. Y. Zhang and Y. Fang. A secure authentication and billing architecture for wireless mesh networks. ACM Wireless Networks, 13(5):569–582, Oct. 2007.

    Article  Google Scholar 

  20. F. Milan, J. Jaramillo, and R. Srikant. Achieving cooperation in multi-hop wireless networks of selfish nodes. Proc. of workshop on Game Theory for Communications and Networks, Pisa, Italy, Oct. 14 2006.

    Google Scholar 

  21. L. Feeney. An energy-consumption model for performance analysis of routing protocols for mobile ad hoc networks. Mobile Networks and Applications, 3(6):239–249, 2001.

    Article  Google Scholar 

  22. Y. Lin and Y. Hsu. Multihop cellular: A new architecture for wireless communications. Proc. of IEEE INFOCOM’00, 3:1273–1282, Mar. 26–30 2000.

    Google Scholar 

  23. J. Palmer and L. Eriksen. Digital newspapers explore marketing on the internet. ACM Communications, 42(9):33–40, 1999.

    Article  Google Scholar 

  24. G. Iannaccone, C. Chuah, R. Mortier, S. Bhattacharyya, and C. Diot. Analysis of link failures in an ip backbone. Proc. of IMW 2002, ACMPress, Marseille, France, Nov. 2002.

    Google Scholar 

  25. X. Li, Z. Li, M. Stojmenovic, V. Narasimhan, and A. Nayak. Autoregressive trust management in wireless ad hoe networks. Ad hoc and Sensor Wireless Networks, 16:229–242, Feb. 2012.

    Google Scholar 

  26. G. Indirania and K. Selvakumara. A swarm-based efficient distributed intrusion detection system for mobile ad hoc networks (manet). International Journal of Parallel, Emergent and Distributed Systems, 2013.

    Google Scholar 

  27. H. Li and M. Singhal. Trust management in distributed systems. IEEE Computers, 40(2):45–53, Feb. 2007.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2014 The Author(s)

About this chapter

Cite this chapter

Mahmoud, M.M.E.A., Shen, X. (2014). Introduction. In: Security for Multi-hop Wireless Networks. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-04603-7_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-04603-7_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-04602-0

  • Online ISBN: 978-3-319-04603-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics