Securing resource-constrained wireless ad hoc networks
Document Type
Conference Proceeding
Publication Date
12-1-2007
Abstract
Huge interest and demand on information superhighway have pressed various telecommunications research fronts and lead to a new form of future Internet consisting of wired and wireless segments where resourceconstrained devices such as palm pilots and sensors may become integral parts of the Internet rather than access-only platforms. One of the key design problems is the security in such heterogeneous networks, particularly over wireless networks with resource-constrained segments. In this paper, we present a novel approach to addressing security issues and demonstrate why and how the ID-based cryptography can be effectively applied to the resource-constrained wireless networks for various network security problems.
Identifier
51849127341 (Scopus)
ISBN
[1424424836, 9781424424832]
Publication Title
2007 IEEE Sarnoff Symposium Sarnoff
External Full Text Location
https://doi.org/10.1109/SARNOF.2007.4567365
Recommended Citation
Fang, Yuguang and Zhang, Yanchao, "Securing resource-constrained wireless ad hoc networks" (2007). Faculty Publications. 13149.
https://digitalcommons.njit.edu/fac_pubs/13149
