Securing resource-constrained wireless ad hoc networks

Document Type

Conference Proceeding

Publication Date

12-1-2007

Abstract

Huge interest and demand on information superhighway have pressed various telecommunications research fronts and lead to a new form of future Internet consisting of wired and wireless segments where resourceconstrained devices such as palm pilots and sensors may become integral parts of the Internet rather than access-only platforms. One of the key design problems is the security in such heterogeneous networks, particularly over wireless networks with resource-constrained segments. In this paper, we present a novel approach to addressing security issues and demonstrate why and how the ID-based cryptography can be effectively applied to the resource-constrained wireless networks for various network security problems.

Identifier

51849127341 (Scopus)

ISBN

[1424424836, 9781424424832]

Publication Title

2007 IEEE Sarnoff Symposium Sarnoff

External Full Text Location

https://doi.org/10.1109/SARNOF.2007.4567365

This document is currently not available here.

Share

COinS