Intelligent Shops and Communications Security

One of the most present issues of computer wirelessnetworks is the security. Comparing with their wiredcounterpart, the wireless networks not only accentuate someof the well-known security vulnerabilities but they are subjectof new and specific ones. Among the existing wirelessnetworks the ad hoc on...

Full description

Bibliographic Details
Main Authors: Carmen Eleonora Stan, Doru Eugen Tiliute
Format: Article
Language:English
Published: Stefan cel Mare University of Suceava 2007-01-01
Series:Journal of Applied Computer Science & Mathematics
Subjects:
Online Access:http://www.jacs.usv.ro/getpdf.php?issue=2&paperid=25
Description
Summary:One of the most present issues of computer wirelessnetworks is the security. Comparing with their wiredcounterpart, the wireless networks not only accentuate someof the well-known security vulnerabilities but they are subjectof new and specific ones. Among the existing wirelessnetworks the ad hoc ones are the most exposed to attacks andcollusions due to the absence of any centralized control. Themost efficient way to ensure the communication secrecy, inclusivelyfor ad hoc wireless networks, is the cryptography.From many reasons, following from specific operating conditions,the employment of asymmetric key techniques andPublic Key Infrastructure is not a realistic choice. In thenetworks with a large number of nodes, as wireless sensornetworks, a large number of secret keys are involved in orderto ensure the communication secrecy. While dynamicity isone of the essential features of mobile wireless networks,when nodes may leave or join the network and in the absenceof a centralized control entity, the management of secret keysis crucial. The paper presents the main aspects of mobilewireless networks security and focuses on the key managementissue in ad-hoc wireless networks.
ISSN:2066-4273
2066-3129