Security

Efficient and Secure Authentication by Using 3-Path Transmission in Ad Hoc Networks

Free registration required

Executive Summary

Ad hoc networks are created dynamically and maintained by the individual nodes comprising the network. They do not require a pre-existing architecture for communication purposes and do not rely on any form of wired infrastructure; in an ad hoc network all communication occurs through a wireless median. The design and management of ad-hoc networks is significantly a challenging one when compared to contemporary networks. Authenticating the multicast session is an important one. To authenticate several factors should be considered, major issue are resource constraints and the wireless links. In addition to being resource efficient and robust, security solution must be provides to large group of receivers and to long multi-hop paths.

  • Format: PDF
  • Size: 181.8 KB