Securing resource-constrained wireless ad hoc networks

Document Type

Article

Publication Date

4-1-2009

Abstract

Huge interest in and demand for services over the information superhighway have pressed various telecommunications research fronts and led to a new form of future Internet consisting of wired and wireless segments where resourceconstrained devices such as mobile devices, smart phones, palm pilots, and wireless sensors may become integral parts of the Internet rather than access-only platforms. One of the key design problems is the security in such heterogeneous networks, particularly over wireless networks with resource constraints. In this tutorial article we discuss a novel approach to addressing security issues, and articulate why and how IDbased cryptography can be effectively applied to address various security problems in resourceconstrained wireless networks. © 2006 IEEE.

Identifier

67349212443 (Scopus)

Publication Title

IEEE Wireless Communications

External Full Text Location

https://doi.org/10.1109/MWC.2009.4907556

ISSN

15361284

First Page

24

Last Page

29

Issue

2

Volume

16

Grant

1122697

Fund Ref

National Science Foundation

This document is currently not available here.

Share

COinS