Securing resource-constrained wireless ad hoc networks

Yuguang Fang, Xiaoyan Zhu, Yanchao Zhang

Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

27 Citations (Scopus)

Abstract

Huge interest in and demand for services over the information superhighway have pressed various telecommunications research fronts and led to a new form of future Internet consisting of wired and wireless segments where resourceconstrained devices such as mobile devices, smart phones, palm pilots, and wireless sensors may become integral parts of the Internet rather than access-only platforms. One of the key design problems is the security in such heterogeneous networks, particularly over wireless networks with resource constraints. In this tutorial article we discuss a novel approach to addressing security issues, and articulate why and how IDbased cryptography can be effectively applied to address various security problems in resourceconstrained wireless networks. © 2006 IEEE.
Original languageEnglish
Article number4907556
Pages (from-to)24-29
JournalIEEE Wireless Communications
Volume16
Issue number2
DOIs
Publication statusPublished - Apr 2009
Externally publishedYes

Bibliographical note

Publication details (e.g. title, author(s), publication statuses and dates) are captured on an “AS IS” and “AS AVAILABLE” basis at the time of record harvesting from the data source. Suggestions for further amendments or supplementary information can be sent to [email protected].

Fingerprint

Dive into the research topics of 'Securing resource-constrained wireless ad hoc networks'. Together they form a unique fingerprint.

Cite this