Overcoming the Challenge of Security in a Mobile Environment

Download Now
Provided by: Institute of Electrical and Electronics Engineers
Topic: Security
Format: PDF
The secure operation of ad hoc networks faces the novel challenge of location verification on top of the security challenges that wireline networks face. The novelty lies in the fact that a node can correctly validate who it is, but lie about its location and exploit this to create problems to the network. There are three main factors that make ad hoc networks more vulnerable: nodes can overhear other nodes announcements, nodes can lie about their location, and nodes can avoid detection and isolation by moving. As a result, malicious nodes can fake their position and this way obstructs the routing.
Download Now

Find By Topic