A Survey on the Security of Multihop Ad Hoc Network

  • Yuan De-yu
  • Liu Tong
  • Wei Geng-yu
  • Wang Zhi-zhao
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 320)


With the development of wireless network, mobile Ad Hoc networks have been applied in many fields. But the security problem of Ad Hoc network has not been solved very well, and the security system of Ad Hoc network is more difficult to design than other networks because of its particularity. Ad Hoc network’s security is a key problem of the Ad Hoc network applications. This article studied Ad Hoc network’s security issues from the aspects of key management, routing security, intrusion detection, and trusted computing.


Ad Hoc network network security trusted computing 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Stajano, F., Anderson, R.: The Resurrecting Deckling: Security Issues for Ad Hoc Networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 172–182. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  2. 2.
    Zhou, L., Hass, Z.J.: Securing ad hoc networks. IEEE Network Magazine 13(6), 24–30 (1999)CrossRefGoogle Scholar
  3. 3.
    Asokan, N., Ginzboorg, P.: Key agreement in ad hoc networks. Computer Communications 23, 1627–1637 (2000)CrossRefGoogle Scholar
  4. 4.
    Camp, T., Boleng, J., Davies, V.: Mobility models for ad hoc network research. Wireless Communications and Mobile Computing (WCMC), Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications (2002)Google Scholar
  5. 5.
    Sufatrio, Lam, K.Y.: Scalable authentication framework for mobile-IP(SAFe-MIP). Internet draft, IETF (November 1999)Google Scholar
  6. 6.
    Herzberg, A., Jakobsson, M., et al.: Proactive public key and signature systems. In: ACM Security 1997 (1997)Google Scholar
  7. 7.
    Fasbender, A., et al.: Variable and scalable security: protection of location information in mobile IP. In: IEEE 46th Vehicular Technology Conference on Mobile Technology for the Human Race (1996)Google Scholar
  8. 8.
    Hauser, R., et al.: Lowering security overhead in link state routing. Computer Networks (1999)Google Scholar
  9. 9.
    Zapata, M.G.: Secure ad hoc on-demand distance vector(AODV), Routing. Mobile Ad Hoe Networking Group, Internet Draft (August 2001)Google Scholar
  10. 10.
    Hu, Y.-C., Johnson, D.B., Perrig, A.: SEAD: Secure efficient distancevector routing for mobile wireless ad hoc networks. In: Proceeding of the 4th IEEE Workshop on Mobile Computing Systems and Applications, Calicoon, NX (June 2002)Google Scholar
  11. 11.
    Papadimitratos, P., Hass, Z.J.: Secure routing for mobile ad hoc networks. In: SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San AntonioTX (January 2002)Google Scholar
  12. 12.
    Yi, S., Naldurg, P., Kravets, R.: A security aware routing protocol for wireless ad hoc networks. In: he 6th World Multi-Conference on Systems, Cybernetics Andinfornatics, SCl 2002 (2002)Google Scholar
  13. 13.
    Buchegger, S., Le Boudec, J.-Y.: Nodes bearing grudges:towards routing security,fairness, and robustness in mobile ad hoc networks. In: Proceedings of 10th Euromicro Workshop on Parallel, Distributes and Network-based Processing (2002)Google Scholar
  14. 14.
    Zhang, Y., Lee, W.: Intrusion detection in wireless ad hoc networks. In: IEEE Workshop International Conference on Mobile Computing and Networking (MobiCom 2000), Boston, MA, pp. 275–283 (2000)Google Scholar
  15. 15.
    Kachirski, O., Guha, R.: Intrusion detection using mobile agents in wireless ad hoc networks. In: IEEE Workshop on Knowledge Media Networking (KMN 2002), Kyoto, Japan (2002)Google Scholar
  16. 16.
    Bhargava, S., Agraval, D.P.: Security enhancement in AODV protocol for wirelessad hoc networks. In: Vehicular Technology Conference, Atlantic City, NY (October 2001)Google Scholar
  17. 17.
    Kang, Y., Tao, Z., et al.: An Authentication Scheme for Mobile Ad Hoc Networks Based on Trusted Computing. TN929.5 (2010)Google Scholar
  18. 18.
    Hu, R.-L., Li, R., et al.: Trusted Computing-based Authentication Scheme forAd hoc Networks. Computer Engineering 36(12) (June 2010)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Yuan De-yu
    • 1
    • 2
  • Liu Tong
    • 1
    • 2
  • Wei Geng-yu
    • 1
    • 2
  • Wang Zhi-zhao
    • 1
    • 2
  1. 1.School of Computer ScienceBeijing University of Posts and TelecommunicationsBeijingChina
  2. 2.Key Laboratory of Trustworthy Distributed Computing and Service (BUPT)Ministry of EducationBeijingChina

Personalised recommendations