A Secure Characteristics of Wireless Ad-Hoc Networks

A Secure Characteristics of Wireless Ad-Hoc Networks

Sandip Vijay (I.I.T. Roorkee, India) and S. C. Sharma (I.I.T. Roorkee, India)
Copyright: © 2009 |Pages: 21
DOI: 10.4018/978-1-60566-222-0.ch006
OnDemand PDF Download:


This chapter reviews the secure characteristics of mobile devices that can use wireless networks (adhoc) almost any where and any time, by using one or more wireless network technologies. Currently, most computers communicate with each other by using wired networks. This approach is well suited for stationary computers, but it is not appropriate for mobile devices. These technologies enable the use of infrastructured networks (3GPP) and ad-hoc networks. Furthermore, the authors describe the gateway specification, requirement for implementation for ad-hoc networks. The minimum, essential, and additional functional requirements for effective functionality of gateway are presented in tabular form. At the end, the future functional requirement and the features of multiple ad-hoc networks are also described.
Chapter Preview

Introduction To Wireless Ad-Hoc Networks

An ad-hoc network is a self-configuring network of wireless links connecting mobile nodes. These nodes may be routers and/or hosts. The mobile nodes communicate directly with each other and without the aid of access points, and therefore have no fixed infrastructure. They form an arbitrary topology, where the routers are free to move randomly and arrange themselves as required. First, the devices can freely move in the network, second, the devices can leave and join the network at any time. This type of network can change constantly. Finally, the network disappears when the last devices leave the network (Arkko, J. et al., 2004). The decentralized nature of wireless ad hoc networks makes them suitable for a variety of applications where central nodes cannot be relied on, and may improve the scalability of wireless ad hoc networks compared to wireless managed networks, though theoretical and practical limits to the overall capacity of such networks have been identified. Minimal configuration and quick deployment make ad hoc networks suitable for emergencies like natural disasters or military conflicts. The presence of a dynamic and adaptive routing protocol will enable ad hoc networks to be formed quickly (Buddhikot, M. et al., 2003).

Isolated wireless ad-hoc networks are not suitable for today’s applications that require accessing services in the Internet. To overcome this limitation, one or more devices in the wireless ad-hoc network can provide a gateway to an external network. This external network can be the Internet or a local area network (LAN), which may or may not be an infrastructured network. Wireless networks are more vulnerable to misuse than wired networks. In a wireless network, all devices share the same radio band. If two or more devices transmit simultaneously, the communication fails. In addition, a malicious device may be present in the network. It can analyze the communication in the network and do several attacks by sending invalid data. It can masquerade as another device, or it may do various Man-in-the-Middle (MitM) or Denial-of-Service (DoS) attacks. In particular, it can even block all communication by constantly interfere the transmission. Several security mechanisms partially protect communication in WLAN. WLAN may provide security on the lower layers that corresponds the physical and link layers of the Open Systems Interconnection (OSI) reference model. These mechanisms protect communication authenticity, integrity and confidentiality by using cryptographic methods. Moreover, these mechanisms depend on the WLAN technology. On the other hand, security can be provided independently on upper layers. However, none of these mechanisms protect against DoS attacks because it is impossible to prevent a malicious device from interfering the transmission in a wireless ad-hoc network. It is also possible that not all devices can communicate directly in the wireless ad-hoc network. Such a scenario is shown in Fig. 1. in which device B can communicate with devices A and C directly, but devices A and C cannot communicate directly. This has an impact on the network-layer and application-layer protocols. In the network-layer, not all devices can communicate directly with each other by using IP addresses. Moreover, some applications do not work unless the communication is link-local. For example, Dynamic Configuration of IPv4 Link-Local addresses requires link-local communication to successfully configure and maintain IPv4 addresses.

Figure 1.

Communication link between different networks using gateway

Routing enables communication between devices that cannot communicate directly. In the ad-hoc network, this is done by using an ad-hoc routing protocol. There are two types of routing protocols for ad-hoc networks: Proactive and Reactive. In proactive routing, routes are actively maintained, and they are available when needed. In reactive routing, routes are discovered on demand. An ad-hoc network can be isolated, or it can have a gateway that provides a connection to another network. Consequently, the devices must be able to communicate when the gateway is available and when it unavailable.

Complete Chapter List

Search this Book:
Patricia Ordóñez de Pablos
Table of Contents
Chapter 1
Patricia Ordóñez de Pablos, Miltiadis D. Lytras
The chapter addresses the importance of knowledge-based resources proposing indicators to measure and report technological capital in companies. The... Sample PDF
Measuring and Reporting Technological Capital in Companies
Chapter 2
Pankaj, Micki Hyde, Arkalgud Ramaprasad, Suresh K. Tadisina
There is no systematic study of Information Systems (IS) agility in academic and practitioner IS literature and the concept is not well defined. For... Sample PDF
Revisiting Agility to Conceptualize Information Systems Agility
Chapter 3
Vagan Terziyan, Artem Katasonov
Industry pushes a new type of Internet characterized as the Internet of Things, which represents a fusion of the physical and digital worlds. The... Sample PDF
Global Understanding Environment: Applying Semantic and Agent Technologies to Industrial Automation
Chapter 4
Jeffrey Hsu
The market for e-commerce to Chinese audiences is one which has tremendous potential, given the fact that the number of potential users and... Sample PDF
Targeting E-Commerce to Chinese Audiences and Markets: Managing Cultural and Regional Challenges
Chapter 5
Edward T. Chen
Enterprise Resource Planning (ERP) is the method of trying to unify all processes within an organization into one software system or database.... Sample PDF
Enterprise Resource Planning System: Issues and Implementation
Chapter 6
Sandip Vijay, S. C. Sharma
This chapter reviews the secure characteristics of mobile devices that can use wireless networks (adhoc) almost any where and any time, by using one... Sample PDF
A Secure Characteristics of Wireless Ad-Hoc Networks
Chapter 7
Jorge Marx Gómez, Thanh Tran
Approaches to adaptation have been proposed by many different research communities, Hypermedia System and Intelligent Tutoring in particular. The... Sample PDF
A Survey on Approaches to Adaptation on the Web
Chapter 8
Jorge Marx Gómez, Tran Duc
A portal is a Web-based single point of access that delivers information and applications to a user on its own and by the integration of external... Sample PDF
A Personalized Portal on the Basis of Semantic Models and Rules
Chapter 9
Sylvie Laforet, Hannah Limahelu
This wireless advertising is considered to be an important alternative advertising medium in the future, due to its numerous advantages over... Sample PDF
British Consumers' Attitudes and Acceptance of Mobile Advertising
Chapter 10
Javier de Andrés, Pedro Lorca, Jose Emilio Labra
This chapter aims to determine the factors influencing the decision of implementing an ERP system in a country where technology awareness and the... Sample PDF
Determinants of ERP Implementations: An Empirical Study in Spanish Companies
Chapter 11
Jaakko Ikävalko, Hänninen, Seppo J., Ari Serkkola, Ilkka Kauranen
Technology programs are a means to facilitate the development and commercialization process of new innovative technologies. They are forums for the... Sample PDF
Emerging Topics and Technologies in Information Systems
Chapter 12
Cliona McParland, Regina Connolly
While Internet-based technologies have the potential to empower users immensely, individuals are becoming increasingly aware of the ways in which... Sample PDF
Technology-Related Privacy Concerns: An Emerging Challenge
Chapter 13
Giovanni Vincenti
Fear of flying is a common problem that many people have to face. As varied as the causes may be, all kinds of fears have many aspects in common.... Sample PDF
Fear of Flying and Virtual Environments: An Introductory Review
Chapter 14
Thomas Hädrich, Torsten Priebe
Knowledge work can be characterized by a high degree of variety and exceptions, strong communication needs, weakly structured processes, networks... Sample PDF
A Context-Based Approach for Supporting Knowledge Work with Semantic Portals
Chapter 15
Le Duy Ngan, Angela Goh
Web services form the core of e-business and hence, have experienced a rapid development in the past few years. This has led to a demand for a... Sample PDF
Survey of Web Service Discovery Systems
Chapter 16
Antonio Picariello, Antonio M. Rinaldi
The user dimension is a crucial component in the information retrieval process and for this reason it must be taken into account in planning and... Sample PDF
User Relevance Feedback in Semantic Information Retrieval
Chapter 17
Abdul-Rahman Al-Ali, Tarik Ozkul, Taha Landolsi
This paper presents the results of a study toward generating a wireless environment to provide real-time mobile accessibility to patient information... Sample PDF
A Preliminary Study toward Wireless Integration of Patient Information System
About the Contributors