Title :
Security of access in hostile environments based on the history of nodes in ad hoc networks
Author :
Al Otaibi, S. ; Siewe, Francois
Author_Institution :
Software Technol. Res. Lab., De Montfort Univ., Leicester, UK
Abstract :
Ad hoc wireless networks consist of a number of nodes roaming freely, interconnecting wirelessly without relying on a predefined infrastructure. These nodes have the property of mobility which enables them to join and leave the network as required. This makes ad hoc wireless networks suitable for hostile environments, where security is a major concern. Achieving security in ad hoc networks is challenging because of vulnerable wireless links, hostile environments, cooperative nodes, lack of a clear line of defence and the dynamic nature of such networks. In this paper, we propose a new approach to security of access in hostile environments based on the history and relationships among the nodes and on digital operation certificates.
Keywords :
ad hoc networks; history; telecommunication security; access security; ad hoc wireless networks; history; hostile environments; roaming; Ad hoc networks; Communication system security; Costs; History; Law enforcement; Peer to peer computing; Roaming; Spine; Wireless communication; Wireless networks; NBBN; OSP; SE; UN;
Conference_Titel :
Internet, 2009. AH-ICI 2009. First Asian Himalayas International Conference on
Conference_Location :
Kathmandu
Print_ISBN :
978-1-4244-4569-1
Electronic_ISBN :
978-1-4244-4570-7
DOI :
10.1109/AHICI.2009.5340256