2011
DOI: 10.1109/tnet.2011.2106162
|View full text |Cite
|
Sign up to set email alerts
|

On the Price of Security in Large-Scale Wireless Ad Hoc Networks

Abstract: Abstract-Security always comes with a price in terms of performance degradation, which should be carefully quantified. This is especially the case for wireless ad hoc networks (WANETs), which offer communications over a shared wireless channel without any preexisting infrastructure. Forming end-to-end secure paths in such WANETs is more challenging than in conventional networks due to the lack of central authorities, and its impact on network performance is largely untouched in the literature. In this paper, b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
13
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(13 citation statements)
references
References 34 publications
0
13
0
Order By: Relevance
“…1, where we assume that P i and P j want to establish a 4 bits shared key, that is [b 1 4 ]. Note that for each round of the protocol the bit sender is randomly selected between the two peers-for instance, via a channel contention algorithm.…”
Section: Coke In Briefmentioning
confidence: 99%
See 1 more Smart Citation
“…1, where we assume that P i and P j want to establish a 4 bits shared key, that is [b 1 4 ]. Note that for each round of the protocol the bit sender is randomly selected between the two peers-for instance, via a channel contention algorithm.…”
Section: Coke In Briefmentioning
confidence: 99%
“…Securing communications of wireless devices is a challenging issue [2][3][4]. In particular, secure communications in wireless networks strongly rely on the effectiveness of key distribution schemes.…”
Section: Introductionmentioning
confidence: 99%
“…This growth is mainly due to the mobility offered to users, providing access to information anywhere, user friendliness, and easy deployment [7]. Furthermore, the scalability and flexibility of mobile communications increase users' productivity and efficiency.…”
Section: Introductionmentioning
confidence: 99%
“…With the rapid development of the WiFi technology and the wide application of mobile devices, mobile social networks are developing rapidly [1][2][3][4]. The measures of cyber crimes such as network attacks and telecommunications frauds are not restricted to the implementation of wired networks, instead it is done by wireless networks.…”
Section: Introductionmentioning
confidence: 99%