Exit Menu

Ad-hoc Security

What is Ad Hoc Network?

An ad hoc mobile network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis

Abstract

Ssecurityecure routing in ad hoc network is a daunting task because of some contradictions between the nature of the network and the associated applications. In this work various types of existing routing protocols have been extensively studied with a view to finding security vulnerabilities. It is followed by highlighting major security attacks on ad hoc on-demand distance-vector (AODV) routing protocol, which is on the verge of being the default routing standard for ad hoc network.

Both the security requirement of applications and limitations of the mobile nodes have been carefully considered in order to design a feasible solution to counter possible attacks. The uniqueness of the proposed solution lies with the fact that it ensures security as needed by the application, which saves both energy and power.

security2

Research Areas:

  • Cryptographic primitives
  • Sequence design for wireless CDMA communications
  • Network security
  • Ad hoc network security
  • E-commerce
  • Multimedia communication security
  • WarDriving

WarDriving

wardrivingWardriving is an activity consisting of driving around with a Wi-Fi-equipped laptop or a PDA in one's vehicle, detecting Wi-Fi wireless networks. It is also known (as of 2002) as WiLDing (Wireless Lan Driving), originating in the USA with the Bay Area Wireless Users Group (BAWUG). It is similar to using a scanner for radio. Many wardrivers will use GPS devices to find the exact location of the network found and log it on a website. For better range, antennas are built or bought, and vary from omnidirectional to fully directional. Software for wardriving is freely available on the internet, notably, NetStumbler for Windows, MacStumbler for Macintosh, and Kismet for Linux.

Wardriving shares similarities to Wardialing in name only.

Wardrivers do not engage in malicious activity. The average wardriver is typically only out to log and collect information from the Access Points (APs) they find while driving.