Securing resource-constrained wireless ad hoc networks
Document Type
Article
Publication Date
4-1-2009
Abstract
Huge interest in and demand for services over the information superhighway have pressed various telecommunications research fronts and led to a new form of future Internet consisting of wired and wireless segments where resourceconstrained devices such as mobile devices, smart phones, palm pilots, and wireless sensors may become integral parts of the Internet rather than access-only platforms. One of the key design problems is the security in such heterogeneous networks, particularly over wireless networks with resource constraints. In this tutorial article we discuss a novel approach to addressing security issues, and articulate why and how IDbased cryptography can be effectively applied to address various security problems in resourceconstrained wireless networks. © 2006 IEEE.
Identifier
67349212443 (Scopus)
Publication Title
IEEE Wireless Communications
External Full Text Location
https://doi.org/10.1109/MWC.2009.4907556
ISSN
15361284
First Page
24
Last Page
29
Issue
2
Volume
16
Grant
1122697
Fund Ref
National Science Foundation
Recommended Citation
Fang, Yuguang; Zhu, Xiaoyan; and Zhang, Yanchao, "Securing resource-constrained wireless ad hoc networks" (2009). Faculty Publications. 12119.
https://digitalcommons.njit.edu/fac_pubs/12119
