Secure and efficient wireless ad hoc networking

Wireless ad hoc networks have been emerged to support applications, in which it is required/desired to have wireless ommunications among a variety of devices without relying on any infrastructure or central managements. In ad hoc networks, wireless devices, simply called nodes, have limited transmi...

Full description

Bibliographic Details
Main Author: Khabbazian, Majid
Format: Others
Language:English
Published: University of British Columbia 2008
Subjects:
Online Access:http://hdl.handle.net/2429/2847
id ndltd-LACETR-oai-collectionscanada.gc.ca-BVAU.-2847
record_format oai_dc
spelling ndltd-LACETR-oai-collectionscanada.gc.ca-BVAU.-28472013-06-05T04:17:18ZSecure and efficient wireless ad hoc networkingKhabbazian, MajidWirelessAd hoc networksBroadcastingWireless ad hoc networks have been emerged to support applications, in which it is required/desired to have wireless ommunications among a variety of devices without relying on any infrastructure or central managements. In ad hoc networks, wireless devices, simply called nodes, have limited transmission range. Therefore, each node can directly communicate with only those within its transmission range and requires other nodes to act as routers in order to communicate with out-of-range estinations. One of the fundamental operations in ad hoc networks is broadcasting, where a node sends a message to all other nodes in the network. This can be achieved through flooding, in which every node transmits the first copy of the received message. However, flooding can impose a large number of redundant transmissions, which can result in significant waste of constrained resources such as bandwidth and battery power. One of the contributions of this work is to propose efficient broadcast algorithms which can significantly reduce the number of redundant transmissions. We also consider some of the security issues of ad hoc networks. In particular, we carefully analyze the effect of the wormhole attack, which is one of the most severe threats against ad hoc networks. We also propose a countermeasure, which is an improvement over the existing timing-based solutions against the wormhole attack. Finally, in the last chapter, we propose novel point compression techniques which can be used in Elliptic Curve Cryptography (ECC). ECC can provide the same level of security as other public key cryptosystems (such as RSA) with substantially smaller key sizes. Smaller keys can result in smaller system parameters, bandwidth savings, faster implementations and lower power consumption. These advantages make ECC interesting for ad hoc networks with restricted devices.University of British Columbia2008-12-05T21:48:36Z2008-12-05T21:48:36Z20082008-12-05T21:48:36Z2008-11Electronic Thesis or Dissertation7205571 bytesapplication/pdfhttp://hdl.handle.net/2429/2847eng
collection NDLTD
language English
format Others
sources NDLTD
topic Wireless
Ad hoc networks
Broadcasting
spellingShingle Wireless
Ad hoc networks
Broadcasting
Khabbazian, Majid
Secure and efficient wireless ad hoc networking
description Wireless ad hoc networks have been emerged to support applications, in which it is required/desired to have wireless ommunications among a variety of devices without relying on any infrastructure or central managements. In ad hoc networks, wireless devices, simply called nodes, have limited transmission range. Therefore, each node can directly communicate with only those within its transmission range and requires other nodes to act as routers in order to communicate with out-of-range estinations. One of the fundamental operations in ad hoc networks is broadcasting, where a node sends a message to all other nodes in the network. This can be achieved through flooding, in which every node transmits the first copy of the received message. However, flooding can impose a large number of redundant transmissions, which can result in significant waste of constrained resources such as bandwidth and battery power. One of the contributions of this work is to propose efficient broadcast algorithms which can significantly reduce the number of redundant transmissions. We also consider some of the security issues of ad hoc networks. In particular, we carefully analyze the effect of the wormhole attack, which is one of the most severe threats against ad hoc networks. We also propose a countermeasure, which is an improvement over the existing timing-based solutions against the wormhole attack. Finally, in the last chapter, we propose novel point compression techniques which can be used in Elliptic Curve Cryptography (ECC). ECC can provide the same level of security as other public key cryptosystems (such as RSA) with substantially smaller key sizes. Smaller keys can result in smaller system parameters, bandwidth savings, faster implementations and lower power consumption. These advantages make ECC interesting for ad hoc networks with restricted devices.
author Khabbazian, Majid
author_facet Khabbazian, Majid
author_sort Khabbazian, Majid
title Secure and efficient wireless ad hoc networking
title_short Secure and efficient wireless ad hoc networking
title_full Secure and efficient wireless ad hoc networking
title_fullStr Secure and efficient wireless ad hoc networking
title_full_unstemmed Secure and efficient wireless ad hoc networking
title_sort secure and efficient wireless ad hoc networking
publisher University of British Columbia
publishDate 2008
url http://hdl.handle.net/2429/2847
work_keys_str_mv AT khabbazianmajid secureandefficientwirelessadhocnetworking
_version_ 1716586884051763200