Intelligent Shops and Communications Security
One of the most present issues of computer wirelessnetworks is the security. Comparing with their wiredcounterpart, the wireless networks not only accentuate someof the well-known security vulnerabilities but they are subjectof new and specific ones. Among the existing wirelessnetworks the ad hoc on...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Stefan cel Mare University of Suceava
2007-01-01
|
Series: | Journal of Applied Computer Science & Mathematics |
Subjects: | |
Online Access: | http://www.jacs.usv.ro/getpdf.php?issue=2&paperid=25 |
Summary: | One of the most present issues of computer wirelessnetworks is the security. Comparing with their wiredcounterpart, the wireless networks not only accentuate someof the well-known security vulnerabilities but they are subjectof new and specific ones. Among the existing wirelessnetworks the ad hoc ones are the most exposed to attacks andcollusions due to the absence of any centralized control. Themost efficient way to ensure the communication secrecy, inclusivelyfor ad hoc wireless networks, is the cryptography.From many reasons, following from specific operating conditions,the employment of asymmetric key techniques andPublic Key Infrastructure is not a realistic choice. In thenetworks with a large number of nodes, as wireless sensornetworks, a large number of secret keys are involved in orderto ensure the communication secrecy. While dynamicity isone of the essential features of mobile wireless networks,when nodes may leave or join the network and in the absenceof a centralized control entity, the management of secret keysis crucial. The paper presents the main aspects of mobilewireless networks security and focuses on the key managementissue in ad-hoc wireless networks. |
---|---|
ISSN: | 2066-4273 2066-3129 |