Data Security

Security in Wireless Ad Hoc Networks

Wireless communication networks have become crucial to modern society. By the end of 2004 there were approximately one billion mobile phones users. While in the early years of mobile phones the prevailing application was voice communication, now wireless data communication has become more important because of the technological advances of the internet. Computer and communication networks are usually centrally managed and supported by trusted network services. Examples are the base stations network in GSM and the router network of the internet. Recently, there has been a growing interest in networks, where a trusted infrastructure is not available. Such self-organized networks are called ad hoc networks and consist of autonomous nodes that collaborate in order to establish the desired network services. One important service that must be provided collaboratively is routing. Only nodes that are within each other’s transmission range can directly communicate over wireless links, while other nodes have to rely on their neighbors to relay messages to nodes which are further away. Hence, in such a multi-hop ad hoc network all nodes have to act both as hosts as well as routers.

Some possible civilian applications of ad hoc networks are:

There are many security issues in ad hoc networks that have to be solved. Two important issues focused on in our research are:


Prof. Firoz Kaderali Print