Skip to main navigation Skip to search Skip to main content

Limitations of existing wireless networks authentication and key management techniques for MANETs

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Citations (Scopus)

Abstract

Providing security support for mobile networks is challenging. Masquerading and eavesdropping are major threats to the security of wireless communications and mobile networks. To provide proper protection for the communication of the wireless link, the contents of the communication should be enciphered and mutual authentication should be conducted between the communicating nodes. Authentication protocols and key management techniques play a vital role and are the basis of security in many distributed systems. Much research has been conducted into the development of key management techniques and authentication protocols for WLAN (802.11b, 802.11i, 802.15.1, HIPERLAN) and traditional wireless networks (GSM, UMTS). This paper specifically describes the fundamental limitations of these underlying techniques and protocols and discusses why they cannot be directly employed in mobile ad hoc networks (MANETs). To the best of the authors' knowledge, this is the first paper which collectively addresses the limitations of the security mechanisms used in existing wireless networks for MANETs
Original languageEnglish
Title of host publicationnan
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)1424404916
ISBN (Print)1424404916
DOIs
Publication statusPublished - 31 Jul 2006
Event2006 International Symposium on Computer Networks - Istanbul
Duration: 16 Jun 200618 Jun 2006

Conference

Conference2006 International Symposium on Computer Networks
CityIstanbul
Period16/06/0618/06/06
Other2006 International Symposium on Computer Networks (16/06/2006-18/06/2006, Istanbul)

Keywords

  • MANETs

Fingerprint

Dive into the research topics of 'Limitations of existing wireless networks authentication and key management techniques for MANETs'. Together they form a unique fingerprint.

Cite this