Securing resource-constrained wireless ad hoc networks

Yuguang Fang, Xiaoyan Zhu, Yanchao Zhang

Research output: Contribution to journalArticle

17 Citations (Scopus)

Abstract

Huge interest in and demand for services over the information superhighway have pressed various telecommunications research fronts and led to a new form of future Internet consisting of wired and wireless segments where resourceconstrained devices such as mobile devices, smart phones, palm pilots, and wireless sensors may become integral parts of the Internet rather than access-only platforms. One of the key design problems is the security in such heterogeneous networks, particularly over wireless networks with resource constraints. In this tutorial article we discuss a novel approach to addressing security issues, and articulate why and how IDbased cryptography can be effectively applied to address various security problems in resourceconstrained wireless networks.

Original languageEnglish (US)
Article number4907556
Pages (from-to)24-29
Number of pages6
JournalIEEE Wireless Communications
Volume16
Issue number2
DOIs
StatePublished - Apr 2009
Externally publishedYes

Fingerprint

Wireless ad hoc networks
Internet
Wireless networks
Heterogeneous networks
Mobile devices
Cryptography
Telecommunication
Sensors

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Computer Science Applications

Cite this

Securing resource-constrained wireless ad hoc networks. / Fang, Yuguang; Zhu, Xiaoyan; Zhang, Yanchao.

In: IEEE Wireless Communications, Vol. 16, No. 2, 4907556, 04.2009, p. 24-29.

Research output: Contribution to journalArticle

Fang, Yuguang ; Zhu, Xiaoyan ; Zhang, Yanchao. / Securing resource-constrained wireless ad hoc networks. In: IEEE Wireless Communications. 2009 ; Vol. 16, No. 2. pp. 24-29.
@article{cbcd5f902d9b47558dfb47cbad243551,
title = "Securing resource-constrained wireless ad hoc networks",
abstract = "Huge interest in and demand for services over the information superhighway have pressed various telecommunications research fronts and led to a new form of future Internet consisting of wired and wireless segments where resourceconstrained devices such as mobile devices, smart phones, palm pilots, and wireless sensors may become integral parts of the Internet rather than access-only platforms. One of the key design problems is the security in such heterogeneous networks, particularly over wireless networks with resource constraints. In this tutorial article we discuss a novel approach to addressing security issues, and articulate why and how IDbased cryptography can be effectively applied to address various security problems in resourceconstrained wireless networks.",
author = "Yuguang Fang and Xiaoyan Zhu and Yanchao Zhang",
year = "2009",
month = "4",
doi = "10.1109/MWC.2009.4907556",
language = "English (US)",
volume = "16",
pages = "24--29",
journal = "IEEE Wireless Communications",
issn = "1536-1284",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "2",

}

TY - JOUR

T1 - Securing resource-constrained wireless ad hoc networks

AU - Fang, Yuguang

AU - Zhu, Xiaoyan

AU - Zhang, Yanchao

PY - 2009/4

Y1 - 2009/4

N2 - Huge interest in and demand for services over the information superhighway have pressed various telecommunications research fronts and led to a new form of future Internet consisting of wired and wireless segments where resourceconstrained devices such as mobile devices, smart phones, palm pilots, and wireless sensors may become integral parts of the Internet rather than access-only platforms. One of the key design problems is the security in such heterogeneous networks, particularly over wireless networks with resource constraints. In this tutorial article we discuss a novel approach to addressing security issues, and articulate why and how IDbased cryptography can be effectively applied to address various security problems in resourceconstrained wireless networks.

AB - Huge interest in and demand for services over the information superhighway have pressed various telecommunications research fronts and led to a new form of future Internet consisting of wired and wireless segments where resourceconstrained devices such as mobile devices, smart phones, palm pilots, and wireless sensors may become integral parts of the Internet rather than access-only platforms. One of the key design problems is the security in such heterogeneous networks, particularly over wireless networks with resource constraints. In this tutorial article we discuss a novel approach to addressing security issues, and articulate why and how IDbased cryptography can be effectively applied to address various security problems in resourceconstrained wireless networks.

UR - http://www.scopus.com/inward/record.url?scp=67349212443&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=67349212443&partnerID=8YFLogxK

U2 - 10.1109/MWC.2009.4907556

DO - 10.1109/MWC.2009.4907556

M3 - Article

AN - SCOPUS:67349212443

VL - 16

SP - 24

EP - 29

JO - IEEE Wireless Communications

JF - IEEE Wireless Communications

SN - 1536-1284

IS - 2

M1 - 4907556

ER -