Securing resource-constrained wireless ad hoc networks

Yuguang Fang, Yanchao Zhang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

Huge interest and demand on information superhighway have pressed various telecommunications research fronts and lead to a new form of future Internet consisting of wired and wireless segments where resourceconstrained devices such as palm pilots and sensors may become integral parts of the Internet rather than access-only platforms. One of the key design problems is the security in such heterogeneous networks, particularly over wireless networks with resource-constrained segments. In this paper, we present a novel approach to addressing security issues and demonstrate why and how the ID-based cryptography can be effectively applied to the resource-constrained wireless networks for various network security problems.

Original languageEnglish (US)
Title of host publication2007 IEEE Sarnoff Symposium, SARNOFF
DOIs
StatePublished - 2007
Externally publishedYes
EventIEEE Sarnoff Symposium, SARNOFF 2007 - Princeton, NJ, United States
Duration: Apr 30 2007May 2 2007

Publication series

Name2007 IEEE Sarnoff Symposium, SARNOFF

Other

OtherIEEE Sarnoff Symposium, SARNOFF 2007
Country/TerritoryUnited States
CityPrinceton, NJ
Period4/30/075/2/07

Keywords

  • ID-based cryptography
  • Pairing
  • Wireless ad hoc networks
  • Wireless security

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems
  • Electrical and Electronic Engineering
  • Communication

Fingerprint

Dive into the research topics of 'Securing resource-constrained wireless ad hoc networks'. Together they form a unique fingerprint.

Cite this