By Topic

Security of access in hostile environments based on the history of nodes in ad hoc networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Al Otaibi, S. ; Software Technol. Res. Lab., De Montfort Univ., Leicester, UK ; Siewe, F.

Ad hoc wireless networks consist of a number of nodes roaming freely, interconnecting wirelessly without relying on a predefined infrastructure. These nodes have the property of mobility which enables them to join and leave the network as required. This makes ad hoc wireless networks suitable for hostile environments, where security is a major concern. Achieving security in ad hoc networks is challenging because of vulnerable wireless links, hostile environments, cooperative nodes, lack of a clear line of defence and the dynamic nature of such networks. In this paper, we propose a new approach to security of access in hostile environments based on the history and relationships among the nodes and on digital operation certificates.

Published in:

Internet, 2009. AH-ICI 2009. First Asian Himalayas International Conference on

Date of Conference:

3-5 Nov. 2009