Securing resource-constrained wireless ad hoc networks

Yuguang Fang, Yanchao Zhang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Huge interest and demand on information superhighway have pressed various telecommunications research fronts and lead to a new form of future Internet consisting of wired and wireless segments where resourceconstrained devices such as palm pilots and sensors may become integral parts of the Internet rather than access-only platforms. One of the key design problems is the security in such heterogeneous networks, particularly over wireless networks with resource-constrained segments. In this paper, we present a novel approach to addressing security issues and demonstrate why and how the ID-based cryptography can be effectively applied to the resource-constrained wireless networks for various network security problems.

Original languageEnglish (US)
Title of host publication2007 IEEE Sarnoff Symposium, SARNOFF
DOIs
StatePublished - 2007
Externally publishedYes
EventIEEE Sarnoff Symposium, SARNOFF 2007 - Princeton, NJ, United States
Duration: Apr 30 2007May 2 2007

Other

OtherIEEE Sarnoff Symposium, SARNOFF 2007
CountryUnited States
CityPrinceton, NJ
Period4/30/075/2/07

Fingerprint

Wireless ad hoc networks
Internet
Wireless networks
resources
Network security
Heterogeneous networks
superhighway
Cryptography
Telecommunication
telecommunication
Sensors
demand

Keywords

  • ID-based cryptography
  • Pairing
  • Wireless ad hoc networks
  • Wireless security

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems
  • Electrical and Electronic Engineering
  • Communication

Cite this

Securing resource-constrained wireless ad hoc networks. / Fang, Yuguang; Zhang, Yanchao.

2007 IEEE Sarnoff Symposium, SARNOFF. 2007. 4567365.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fang, Y & Zhang, Y 2007, Securing resource-constrained wireless ad hoc networks. in 2007 IEEE Sarnoff Symposium, SARNOFF., 4567365, IEEE Sarnoff Symposium, SARNOFF 2007, Princeton, NJ, United States, 4/30/07. https://doi.org/10.1109/SARNOF.2007.4567365
Fang, Yuguang ; Zhang, Yanchao. / Securing resource-constrained wireless ad hoc networks. 2007 IEEE Sarnoff Symposium, SARNOFF. 2007.
@inproceedings{b5c8b753b819462a8fb18e08ddb0b5a1,
title = "Securing resource-constrained wireless ad hoc networks",
abstract = "Huge interest and demand on information superhighway have pressed various telecommunications research fronts and lead to a new form of future Internet consisting of wired and wireless segments where resourceconstrained devices such as palm pilots and sensors may become integral parts of the Internet rather than access-only platforms. One of the key design problems is the security in such heterogeneous networks, particularly over wireless networks with resource-constrained segments. In this paper, we present a novel approach to addressing security issues and demonstrate why and how the ID-based cryptography can be effectively applied to the resource-constrained wireless networks for various network security problems.",
keywords = "ID-based cryptography, Pairing, Wireless ad hoc networks, Wireless security",
author = "Yuguang Fang and Yanchao Zhang",
year = "2007",
doi = "10.1109/SARNOF.2007.4567365",
language = "English (US)",
isbn = "1424424836",
booktitle = "2007 IEEE Sarnoff Symposium, SARNOFF",

}

TY - GEN

T1 - Securing resource-constrained wireless ad hoc networks

AU - Fang, Yuguang

AU - Zhang, Yanchao

PY - 2007

Y1 - 2007

N2 - Huge interest and demand on information superhighway have pressed various telecommunications research fronts and lead to a new form of future Internet consisting of wired and wireless segments where resourceconstrained devices such as palm pilots and sensors may become integral parts of the Internet rather than access-only platforms. One of the key design problems is the security in such heterogeneous networks, particularly over wireless networks with resource-constrained segments. In this paper, we present a novel approach to addressing security issues and demonstrate why and how the ID-based cryptography can be effectively applied to the resource-constrained wireless networks for various network security problems.

AB - Huge interest and demand on information superhighway have pressed various telecommunications research fronts and lead to a new form of future Internet consisting of wired and wireless segments where resourceconstrained devices such as palm pilots and sensors may become integral parts of the Internet rather than access-only platforms. One of the key design problems is the security in such heterogeneous networks, particularly over wireless networks with resource-constrained segments. In this paper, we present a novel approach to addressing security issues and demonstrate why and how the ID-based cryptography can be effectively applied to the resource-constrained wireless networks for various network security problems.

KW - ID-based cryptography

KW - Pairing

KW - Wireless ad hoc networks

KW - Wireless security

UR - http://www.scopus.com/inward/record.url?scp=51849127341&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=51849127341&partnerID=8YFLogxK

U2 - 10.1109/SARNOF.2007.4567365

DO - 10.1109/SARNOF.2007.4567365

M3 - Conference contribution

SN - 1424424836

SN - 9781424424832

BT - 2007 IEEE Sarnoff Symposium, SARNOFF

ER -