Skip to main content

Security Enhancement in WEP Mobility

  • Conference paper
Book cover Recent Trends in Networks and Communications (WeST 2010, VLSI 2010, NeCoM 2010, ASUC 2010, WiMoN 2010)

Abstract

The Wired Equivalent Privacy (WEP) protocol protection technique suggested for ad hoc network falls short of the objective of data privacy, data integrity and authentication. Various security standards such as IEEE 802.11i, WAP, IEEE 802.1X were suggested to address the security issues in 802.11. Despite their efficiency, these standards do not provide any security approach for monitoring the authentication in a distributed architecture. In this paper we present a self monitored security approach for self-monitoring of key authentication for security protocol in ad hoc networks for the efficient monitoring of the authentication issue in ad hoc network. The processing overhead for the suggested approach is evaluated for a threshold based cryptographic approach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Pfitzmann, A., Pfitzmann, B., Schunter, M., Waidner, M.: Trusting Mobile User Devices and Security Modules. In: IEEE, Information infrastructure for virtual environment (1997)

    Google Scholar 

  2. Zhou, L., Haas, Z.J.: Securing Ad Hoc Networks. IEEE network (November/December 1999)

    Google Scholar 

  3. Papadimitratos, P., Haas, Z.J.: Secure Routing for Mobile Ad hoc Networks. In: SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX, January 27-31 (2002)

    Google Scholar 

  4. Asokan, N., Ginzboorg, P., Seng, C.Y.: Key Agreement in Ad-hoc Networks. (Presentation)

    Google Scholar 

  5. Johnson, D.B.: Routing in Ad Hoc Networks of Mobile Hosts, Computer Science Department, Carnegie Mellon University, Pittsburgh. IEEE, Los Alamitos (1995)

    Google Scholar 

  6. Sayın, E., Levi, A.: Open Trust Scheme for Ad Hoc Networks (2006)

    Google Scholar 

  7. Roberts, N.C., Bradley, R.T.: Research Methodology for New Public Management. In: The International Public Management Network workshop, Siena, Italy, July 28-30 (1999)

    Google Scholar 

  8. Yi, S., Naldurg, P., Kravets, R.: A Security-Aware Routing Protocol for Wireless Ad Hoc Networks, University of Illinois, Urbana-Champaign, Urbana, IL 61801

    Google Scholar 

  9. Vanhala, A.: Security in Ad-hoc Networks. Research seminar on Security in Distributed Systems, University of Helsinki

    Google Scholar 

  10. Stajano, F., Anderson, R.: The Resurrecting Duckling:Security Issues for Ad-hoc Wireless Networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, p. 215. Springer, Heidelberg (2000)

    Google Scholar 

  11. BlaZevit, L., Buttyan, L., Tapkun, S., Giordano, S., Hubaux, J.-P., Le Boudec, J.-Y.: Self-Organization in Mobile Ad Hoc Networks: The Approach of Terminodes. IEEE communication Magazine (June 2001)

    Google Scholar 

  12. Buttyan, L., Hubaux, J.-P.: Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks., Laboratory for Computer Communications and Applications Swiss Federal Institute of Technology EPFL-IC-LCA, CH-1015 Lausanne, Switzerland, March 19. ACM/ Kluwer Mobile Networks and Applications, MONET (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Abbas Ahmad, S.M.K.M., Rajan, E.G., Govardhan, A., Peraiah, J. (2010). Security Enhancement in WEP Mobility. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Networks and Communications. WeST VLSI NeCoM ASUC WiMoN 2010 2010 2010 2010 2010. Communications in Computer and Information Science, vol 90. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14493-6_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14493-6_40

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14492-9

  • Online ISBN: 978-3-642-14493-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics