Title :
Securing resource-constrained wireless ad hoc networks
Author :
Fang, Yuguang ; Zhang, Yanchao
Author_Institution :
Univ. of Florida, Gainesville, FL
fDate :
April 30 2007-May 2 2007
Abstract :
Huge interest and demand on information superhighway have pressed various telecommunications research fronts and lead to a new form of future Internet consisting of wired and wireless segments where resource-constrained devices such as palm pilots and sensors may become integral parts of the Internet rather than access-only platforms. One of the key design problems is the security in such heterogeneous networks, particularly over wireless networks with resource-constrained segments. In this paper, we present a novel approach to addressing security issues and demonstrate why and how the ID-based cryptography can be effectively applied to the resource-constrained wireless networks for various network security problems.
Keywords :
Internet; ad hoc networks; cryptography; telecommunication security; ID-based cryptography; Internet; information superhighway; network security problem; resource-constrained device; wireless ad hoc network; Communication system security; Digital signatures; IP networks; Identity-based encryption; Internet; Mobile ad hoc networks; Public key; Public key cryptography; Wireless mesh networks; Wireless sensor networks; ID-based cryptography; Wireless ad hoc networks; pairing; wireless security;
Conference_Titel :
Sarnoff Symposium, 2007 IEEE
Conference_Location :
Nassau Inn, Princeton, NJ
Print_ISBN :
978-1-4244-2483-2
DOI :
10.1109/SARNOF.2007.4567365