首页> 外文会议>Internet, 2009. AH-ICI 2009 >Security of access in hostile environments based on the history of nodes in ad hoc networks
【24h】

Security of access in hostile environments based on the history of nodes in ad hoc networks

机译:基于自组织网络中节点的历史记录的敌对环境中访问的安全性

获取原文

摘要

Ad hoc wireless networks consist of a number of nodes roaming freely, interconnecting wirelessly without relying on a predefined infrastructure. These nodes have the property of mobility which enables them to join and leave the network as required. This makes ad hoc wireless networks suitable for hostile environments, where security is a major concern. Achieving security in ad hoc networks is challenging because of vulnerable wireless links, hostile environments, cooperative nodes, lack of a clear line of defence and the dynamic nature of such networks. In this paper, we propose a new approach to security of access in hostile environments based on the history and relationships among the nodes and on digital operation certificates.
机译:Ad hoc无线网络由多个自由漫游的节点组成,无需依赖预定义的基础结构即可进行无线互连。这些节点具有移动性,使它们能够根据需要加入和离开网络。这使得自组织无线网络适合于安全性是主要关注点的恶劣环境。由于脆弱的无线链路,敌对环境,协作节点,缺乏清晰的防御线以及此类网络的动态特性,因此在ad hoc网络中实现安全性具有挑战性。在本文中,我们根据节点之间的历史和关系以及数字操作证书,提出了一种在敌对环境中访问安全性的新方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号