Node level security management and authentication in mobile ad hoc networks

Reijo Savola

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    7 Citations (Scopus)

    Abstract

    Self-organization introduces major challenges to security and trust management in mobile ad hoc networks. In addition, security threats and vulnerabilities include lack of proper authentication, insecure routing and complex mobility and identity management needs. If nodes do not have any prior knowledge of each other, trust establishment becomes complicated. For this kind of scenarios, we propose a mechanism that the nodes themselves should be responsible of their own security - or they could trust certain known nodes, "micro-operators." In addition, we compare trust establishment in both operator-controlled and self-organized mobile ad hoc networks using example scenarios. In operator-controlled case, a trusted third partner provides central administration for the network via a decoupling point. In the self-organized case, networks are formed without central administration.
    Original languageEnglish
    Title of host publicationProceedings
    Subtitle of host publicationTenth International Conference on Mobile Data Management: Systems, Services and Middleware, MDM 2009
    Place of PublicationPiscataway, NJ, USA
    PublisherIEEE Institute of Electrical and Electronic Engineers
    Pages449-458
    ISBN (Print)978-0-7695-3650-7, 978-1-4244-4153-2
    DOIs
    Publication statusPublished - 2009
    MoE publication typeA4 Article in a conference publication
    Event2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware, MDM 2009 - Taipei, Taiwan, Province of China
    Duration: 18 May 200920 May 2009

    Conference

    Conference2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware, MDM 2009
    Abbreviated titleMDM 2009
    Country/TerritoryTaiwan, Province of China
    CityTaipei
    Period18/05/0920/05/09

    Fingerprint

    Dive into the research topics of 'Node level security management and authentication in mobile ad hoc networks'. Together they form a unique fingerprint.

    Cite this