How can you provide security in an ad hoc network? What are some possible schemes and their relative advantages?
What will be an ideal response?
Security in ad hoc networks has the following goals:
(a) The key distribution cannot rely on a central server and should be distributed.
(b) Group formation should avoid centralized control.
(c) Protocol should be highly resistant to Man-in-the-Middle attacks.
(d) Strong resistant to Distributed Denial of Service attacks. Few possible schemes are:
(a) Distributed trust server using threshold cryptography.
(b) Distributed group formation using polynomial based solutions.
(c) Use of bivariate polynomials in which any two nodes can compute pairwise symmetric keys.
(d) Strong signed routing schemes between pair of nodes constituting a link of the path.
(e) Use of intrusion prevention to detect malicious DDoS launcher.
You might also like to view...
____________________ SAEs are for students who want to observe and experience agriscience areas covered in too little depth in class
Fill in the blank(s) with the appropriate word(s).If you have correctly placed the root pass, there will be no reason to _____ it.? ?
Fill in the blank(s) with the appropriate word(s).
Explain the meaning of regenerative braking.
What will be an ideal response?
Most air cooled equipment manufactured today is designed to operate with a:
A) 115°F condenser at 95°F. B) 110°F condenser at 95°F. C) 105°F condenser at 95°F. D) 120°F condenser at 95°F