Securing resource-constrained wireless ad hoc networks

Yuguang Fang, Xiaoyan Zhu, Yanchao Zhang

Research output: Contribution to journalArticle

20 Scopus citations

Abstract

Huge interest in and demand for services over the information superhighway have pressed various telecommunications research fronts and led to a new form of future Internet consisting of wired and wireless segments where resourceconstrained devices such as mobile devices, smart phones, palm pilots, and wireless sensors may become integral parts of the Internet rather than access-only platforms. One of the key design problems is the security in such heterogeneous networks, particularly over wireless networks with resource constraints. In this tutorial article we discuss a novel approach to addressing security issues, and articulate why and how IDbased cryptography can be effectively applied to address various security problems in resourceconstrained wireless networks.

Original languageEnglish (US)
Article number4907556
Pages (from-to)24-29
Number of pages6
JournalIEEE Wireless Communications
Volume16
Issue number2
DOIs
StatePublished - Apr 2009
Externally publishedYes

ASJC Scopus subject areas

  • Computer Science Applications
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Securing resource-constrained wireless ad hoc networks'. Together they form a unique fingerprint.

  • Cite this