Skip to Main Content
Ad hoc wireless networks consist of a number of nodes roaming freely, interconnecting wirelessly without relying on a predefined infrastructure. These nodes have the property of mobility which enables them to join and leave the network as required. This makes ad hoc wireless networks suitable for hostile environments, where security is a major concern. Achieving security in ad hoc networks is challenging because of vulnerable wireless links, hostile environments, cooperative nodes, lack of a clear line of defence and the dynamic nature of such networks. In this paper, we propose a new approach to security of access in hostile environments based on the history and relationships among the nodes and on digital operation certificates.