{"title":"Secure communications in ad hoc networks","authors":"M. Burmester, T. Van Le","doi":"10.1109/IAW.2004.1437822","DOIUrl":null,"url":null,"abstract":"Ad hoc networks are collections of mobile nodes with links that are made or broken in an arbitrary way. They have no fixed infrastructure and may have constrained resources. The next generation of IT applications is expected to rely heavily on such networks. However, before they can be successfully deployed several major security threats must be addressed. These threats are due mainly to the ad hoc nature of these networks. Consequently it may be much harder (or even impossible) to establish a secure communication channel that can tolerate malicious faults. In this paper we first propose a general model for ad hoc networks based on Bayesian inferences that satisfies the basic mobility requirements of such networks and formally define our requirements for secure communication. We then propose a secure communication protocol that trace malicious faults.","PeriodicalId":141403,"journal":{"name":"Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004.","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IAW.2004.1437822","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
Ad hoc networks are collections of mobile nodes with links that are made or broken in an arbitrary way. They have no fixed infrastructure and may have constrained resources. The next generation of IT applications is expected to rely heavily on such networks. However, before they can be successfully deployed several major security threats must be addressed. These threats are due mainly to the ad hoc nature of these networks. Consequently it may be much harder (or even impossible) to establish a secure communication channel that can tolerate malicious faults. In this paper we first propose a general model for ad hoc networks based on Bayesian inferences that satisfies the basic mobility requirements of such networks and formally define our requirements for secure communication. We then propose a secure communication protocol that trace malicious faults.