Flying Ad Hoc Networks: Security, Authentication Protocols, and Future Directions

Author(s):  
Aiswarya S. Nair ◽  
Sabu M. Thampi
2012 ◽  
Vol 6-7 ◽  
pp. 913-918 ◽  
Author(s):  
Ji Zhi Wang ◽  
Ying Long Wang ◽  
Shu Jiang Xu

Many authentication protocols in ad hoc networks are identity based, which means that in order for one node to trust another, it needs to know the other node’s identity. Hence there exists an inherent trade-off between trust and anonymity. We propose an anonymous authentication scheme, where each node, instead of using its real identity, generates a dynamic pseudonym using a one-way hash function. With the help of a CA offline, the scheme can realize the authentication procedure based on discrete logarithms problem. We analyze the security and the anonymity in the scheme, which shows that it is very valid.


2015 ◽  
Vol 2015 ◽  
pp. 1-10 ◽  
Author(s):  
Wei-Chen Wu ◽  
Horng-Twu Liaw

In mobile ad hoc networks (MANETs), the more applications we use, the more security is required. In this paper, we propose a high secure and efficient routing scheme that not only satisfies the properties of anonymity, security, authentication, nonrepudiation, and unforgeability that the previous paper achieved for ad hoc networks, but also satisfies other necessary properties such as confidentiality, traceability, and flexibility for multipaths in order to make the ad hoc environment more secure and practicable.


2020 ◽  
Vol 10 (9) ◽  
pp. 3217 ◽  
Author(s):  
Muhammad Arif ◽  
Guojun Wang ◽  
Oana Geman ◽  
Valentina Emilia Balas ◽  
Peng Tao ◽  
...  

Vehicular ad-hoc networks (VANETs) are the specific sort of ad-hoc networks that are utilized in intelligent transportation systems (ITS). VANETs have become one of the most reassuring, promising, and quickest developing subsets of the mobile ad-hoc networks (MANETs). They include smart vehicles, roadside units (RSUs), and on-board units (OBUs) which correspond through inconsistent wireless network. The current research in the vehicles industry and media transmission innovations alongside the remarkable multimodal portability administrations expedited center-wise ITS, of which VANETs increase considerably more attention. The particular characteristics of the software defined networks (SDNs) use the vehicular systems by its condition of the centralized art having a complete understanding of the network. Security is an important issue in the SDN-based VANETs, as a result of the effect the threats and vulnerabilities can have on driver’s conduct and personal satisfaction. This paper opens a discourse on the security attacks that future SDN-based VANETs should confront and examines how SDNs could be advantageous in building new countermeasures. SDN-based VANETs encourage us to dispose of the confinement and difficulties that are available in the traditional VANETs. It helps us to diminish the general burden on the system by dealing with the general system through a single wireless controller. While SDN-based VANETs provide us some benefits in terms of applications and services, they also have some important challenges which need to be solved. In this study we discuss and elaborate the challenges, along with the applications, and the future directions of SDN-based VANETs. At the end we provide the conclusion of the whole study.


IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 17067-17081 ◽  
Author(s):  
Masood Ahmad ◽  
Abdul Hameed ◽  
Ataul Aziz Ikram ◽  
Ishtiaq Wahid

Author(s):  
John Felix Charles Joseph ◽  
Amitabha Das ◽  
Boon-Chong Seet ◽  
Bu-Sung Lee

Intrusion detection in ad hoc networks is a challenge because of the inherent characteristics of these networks, such as, the absence of centralized nodes, the lack of infrastructure, and so forth. Furthermore, in addition to application-based attacks, ad hoc networks are prone to attacks targeting routing protocols. Issues in intrusion detection in ad hoc networks are addressed by numerous research proposals in literature. In this chapter, we first enumerate the properties of ad hoc networks which hinder intrusion detection systems. After that, significant intrusion detection system (IDS) architectures and methodologies proposed in the literature are elucidated. Strengths and weaknesses of these works are studied and are explained. Finally, the future directions which will lead to the successful deployment of intrusion detection in ad hoc networks are discussed.


IEEE Network ◽  
2003 ◽  
Vol 17 (1) ◽  
pp. 52-59 ◽  
Author(s):  
C. de Morais Cordeiro ◽  
H. Gossain ◽  
D.P. Agrawal

Sign in / Sign up

Export Citation Format

Share Document