How can you provide security in an ad hoc network? What are some possible schemes and their relative advantages?

What will be an ideal response?


Security in ad hoc networks has the following goals:
(a) The key distribution cannot rely on a central server and should be distributed.
(b) Group formation should avoid centralized control.
(c) Protocol should be highly resistant to Man-in-the-Middle attacks.
(d) Strong resistant to Distributed Denial of Service attacks. Few possible schemes are:
(a) Distributed trust server using threshold cryptography.
(b) Distributed group formation using polynomial based solutions.
(c) Use of bivariate polynomials in which any two nodes can compute pairwise symmetric keys.
(d) Strong signed routing schemes between pair of nodes constituting a link of the path.
(e) Use of intrusion prevention to detect malicious DDoS launcher.

Trades & Technology

You might also like to view...

____________________ SAEs are for students who want to observe and experience agriscience areas covered in too little depth in class

Fill in the blank(s) with the appropriate word(s).

Trades & Technology

If you have correctly placed the root pass, there will be no reason to _____ it.? ?  

Fill in the blank(s) with the appropriate word(s).

Trades & Technology

Explain the meaning of regenerative braking.

What will be an ideal response?

Trades & Technology

Most air cooled equipment manufactured today is designed to operate with a:

A) 115°F condenser at 95°F. B) 110°F condenser at 95°F. C) 105°F condenser at 95°F. D) 120°F condenser at 95°F

Trades & Technology