DocumentCode
804022
Title
Securing resource-constrained wireless ad hoc networks
Author
Fang, Yuguang ; Zhu, Xiaoyan ; Zhang, Yanchao
Author_Institution
Univ. of Florida, Gainesville, FL
Volume
16
Issue
2
fYear
2009
fDate
4/1/2009 12:00:00 AM
Firstpage
24
Lastpage
30
Abstract
Huge interest in and demand for services over the information superhighway have pressed various telecommunications research fronts and led to a new form of future Internet consisting of wired and wireless segments where resource-constrained devices such as mobile devices, smart phones, palm pilots, and wireless sensors may become integral parts of the Internet rather than access-only platforms. One of the key design problems is the security in such heterogeneous networks, particularly over wireless networks with resource constraints. In this tutorial article we discuss a novel approach to addressing security issues, and articulate why and how ID-based cryptography can be effectively applied to address various security problems in resource-constrained wireless networks.
Keywords
Internet; ad hoc networks; cryptography; mobile radio; ID- based cryptography; Internet; heterogeneous networks; information superhighway; mobile devices; palm pilots; resource-constrained devices; resource-constrained wireless ad hoc networks; security; smart phones; wireless sensors; Authentication; Communication system security; Computer network management; Computer networks; Digital signatures; Identity-based encryption; Mobile ad hoc networks; Public key; Public key cryptography; Wireless sensor networks;
fLanguage
English
Journal_Title
Wireless Communications, IEEE
Publisher
ieee
ISSN
1536-1284
Type
jour
DOI
10.1109/MWC.2009.4907556
Filename
4907556
Link To Document