Author :
Sehgal, Umesh ; Kaur, Kuljeet ; Kumar, Pawan
Author_Institution :
Dept. of Comput. Applic., Lovely Prof. Univ., Phagwara, India
Abstract :
Notice of Violation of IEEE Publication Principles
"Security in Vehicular Ad-hoc Networks"
by Umesh Sehgal, Kuljeet Kaur, Pawan Kumar
in the Proceedings of the 2009 Second International Conference on Computer and Electrical Engineering ICCEE 09, December 2009, pp. 485-488
After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE\´s Publication Principles.
This paper contains significant portions of original text from the paper cited below. The original text was copied with insufficient attribution (including appropriate references to the original author(s) and/or paper title) and without permission.
Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following article:
"Security in Ad-hoc Networks"
by Arun Kumar Bayya, Siddhartha Gupte, Yogesh Kumar Shukla, Anil Garikapati
Student paper, Computer Science Department, University of Kentucky, 2006
Ad-hoc networks are an emerging area of mobile computing. There are various challenges that are faced in the ad-hoc environment. These are mostly due to the resource poorness of these networks. They are usually set up in situations of emergency, for temporary operations or simply if there are no resources to set up elaborate networks. Ad-hoc networks therefore throw up new requirements and problems in all areas of networking. The solutions for conventional networks are usually not sufficient to provide efficient ad-hoc operations. The wireless nature of communication and lack of any security infrastructure raise several security problems. In this paper we attempt to analyze the demands of Ad-hoc environment. We focus on three areas of ad-hoc networks, key exchange and management, ad-hoc routing, and intrusion detection. The key issues concerning these are as have been addressed here. We have tried to compile solutions to these problems that have been active areas of research.
Keywords :
ad hoc networks; mobile radio; telecommunication network routing; telecommunication security; ad-hoc routing; intrusion detection; mobile computing; security infrastructure; security problems; vehicular ad-hoc network security; Ad hoc networks; Certification; Communication system security; Computer applications; Computer networks; Computer security; Intelligent networks; Public key; Routing; Wireless communication; Authenticated; Certification; Networks; Protocols; Replication;