Wireless Technologies for Mobile Computing

2011 ◽  
pp. 114-129
Author(s):  
Biju Issac ◽  
C. E. Tan

Mobility and computing were two concepts that never met a decade or two ago. But with the advent of new wireless technologies using radio propagation, the impossible is now becoming possible. Though there are many challenges to be overcome in terms of improving the bandwidth and security as with a wired network, the developments are quite encouraging. It would definitely dictate the way we do transactions in future. This chapter briefly explores some popular wireless technologies that aid in mobile computing, like 802.11 networks, Bluetooth networks, and HomeRF networks. Under 802.11 networks, we investigate the details of both infrastructure and ad hoc networks and its operations. The reader is thus made aware of these technologies briefly along with their performance, throughput, and security issues, which finally concludes with user preferences of these technologies.

Author(s):  
Sunil Kumar ◽  
Kamlesh Dutta

A Mobile Ad hoc NETwork (MANET) is a self-organizing, infrastructure-less network of mobile nodes connecting by wireless links. In operation, the nodes of MANETs do not have a central control mechanism. It is known for its properties of routable network, where each node acts as a router to forward packets to other specific nodes in the network. The unique properties of MANET have made it useful for large number of applications and led to a number of security challenges. Security in the mobile ad hoc network is a very critical job and requires the consideration of different security issues on all the layers of communication. The countermeasures are the functions that reduce or eliminate security vulnerabilities and attacks. This chapter provides a comprehensive study of all prominent attacks in Mobile Ad Hoc Networks described in the literature. It also provides various proactive and reactive approaches proposed to secure the MANETs. Moreover, it also points to areas of research that need to be investigated in the future.


2013 ◽  
pp. 81-101
Author(s):  
Victor Pomponiu

The wireless technologies are bringing significant changes to data networking and telecommunication services, making integrated networks a reality. By removing the wires, personal networks, local area networks, mobile radio networks, and cellular systems, offer an entirely distributed mobile computing and communications environment. Due to their unique features such as shared medium, limited resources, and dynamic topology, wireless ad hoc networks are vulnerable to a variety of potential attacks. However, the common security measures employed for wired networks are not enough to protect the nodes of the networks against complex attacks. Therefore, a new line of defense, called intrusion detection, has been added. In this chapter, first we introduce the main wireless technologies along with their characteristics. Then, a description of the attacks that can be mounted on these networks is given. A separate section will review and compare the most recent intrusion detection techniques for wireless ad hoc networks. Finally, based on the current state of the art, the conclusions, and major challenges are discussed.


Author(s):  
Revathi Venkataraman ◽  
T. Rama Rao

This chapter covers issues related to security in mobile ad hoc networks. It acts as a comprehensive survey material covering the cryptographic schemes and trust modeling techniques traditionally found in mobile ad hoc network (MANET) survey articles. The need for hybrid security techniques, involving both cryptographic approach and trust based model, in a resource constrained ad hoc network, is also emphasized in this work. Additionally, the lack of realism in the research works related to ad hoc network security is also pointed out. The state of the art in ad hoc security should employ hybrid techniques that can be easily implemented in an ad hoc network. This will lead to the large scale deployment of mobile ad hoc networks in various context-aware applications.


Author(s):  
Jetzabel Serna ◽  
Jesus Luna ◽  
Roberto Morales ◽  
Manel Medina

Vehicular Ad-hoc NETworks (VANETs) currently provide a prominent field of research, which aims at improving everyday road safety and comfort. To achieve this, the deployment of several potential applications is envisioned, promising to provide extraordinary benefits, but will also represent important security challenges due to the unique characteristics of VANETs. In this chapter, VANET’s security issues are addressed, and the most outstanding security approaches are discussed. As a proof of concept, a PKI -based protocol, able to cope with the interoperability issues among untrusted CA domains is presented, and the trade-offs between security and performance are empirically analyzed and stressed.


Sign in / Sign up

Export Citation Format

Share Document