Abstract
The Wired Equivalent Privacy (WEP) protocol protection technique suggested for ad hoc network falls short of the objective of data privacy, data integrity and authentication. Various security standards such as IEEE 802.11i, WAP, IEEE 802.1X were suggested to address the security issues in 802.11. Despite their efficiency, these standards do not provide any security approach for monitoring the authentication in a distributed architecture. In this paper we present a self monitored security approach for self-monitoring of key authentication for security protocol in ad hoc networks for the efficient monitoring of the authentication issue in ad hoc network. The processing overhead for the suggested approach is evaluated for a threshold based cryptographic approach.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Pfitzmann, A., Pfitzmann, B., Schunter, M., Waidner, M.: Trusting Mobile User Devices and Security Modules. In: IEEE, Information infrastructure for virtual environment (1997)
Zhou, L., Haas, Z.J.: Securing Ad Hoc Networks. IEEE network (November/December 1999)
Papadimitratos, P., Haas, Z.J.: Secure Routing for Mobile Ad hoc Networks. In: SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX, January 27-31 (2002)
Asokan, N., Ginzboorg, P., Seng, C.Y.: Key Agreement in Ad-hoc Networks. (Presentation)
Johnson, D.B.: Routing in Ad Hoc Networks of Mobile Hosts, Computer Science Department, Carnegie Mellon University, Pittsburgh. IEEE, Los Alamitos (1995)
Sayın, E., Levi, A.: Open Trust Scheme for Ad Hoc Networks (2006)
Roberts, N.C., Bradley, R.T.: Research Methodology for New Public Management. In: The International Public Management Network workshop, Siena, Italy, July 28-30 (1999)
Yi, S., Naldurg, P., Kravets, R.: A Security-Aware Routing Protocol for Wireless Ad Hoc Networks, University of Illinois, Urbana-Champaign, Urbana, IL 61801
Vanhala, A.: Security in Ad-hoc Networks. Research seminar on Security in Distributed Systems, University of Helsinki
Stajano, F., Anderson, R.: The Resurrecting Duckling:Security Issues for Ad-hoc Wireless Networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, p. 215. Springer, Heidelberg (2000)
BlaZevit, L., Buttyan, L., Tapkun, S., Giordano, S., Hubaux, J.-P., Le Boudec, J.-Y.: Self-Organization in Mobile Ad Hoc Networks: The Approach of Terminodes. IEEE communication Magazine (June 2001)
Buttyan, L., Hubaux, J.-P.: Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks., Laboratory for Computer Communications and Applications Swiss Federal Institute of Technology EPFL-IC-LCA, CH-1015 Lausanne, Switzerland, March 19. ACM/ Kluwer Mobile Networks and Applications, MONET (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Abbas Ahmad, S.M.K.M., Rajan, E.G., Govardhan, A., Peraiah, J. (2010). Security Enhancement in WEP Mobility. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Networks and Communications. WeST VLSI NeCoM ASUC WiMoN 2010 2010 2010 2010 2010. Communications in Computer and Information Science, vol 90. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14493-6_40
Download citation
DOI: https://doi.org/10.1007/978-3-642-14493-6_40
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14492-9
Online ISBN: 978-3-642-14493-6
eBook Packages: Computer ScienceComputer Science (R0)