2008
DOI: 10.1109/mcom.2008.4473095
|View full text |Cite
|
Sign up to set email alerts
|

Secure neighborhood discovery: a fundamental element for mobile ad hoc networking

Abstract: Abstract-Pervasive computing systems will likely be deployed in the near future, with the proliferation of wireless devices and the emergence of ad hoc networking as key enablers. Coping with mobility and the volatility of wireless communications in such systems is critical. Neighborhood Discovery (ND), namely, the discovery of devices directly reachable for communication or in physical proximity, becomes a fundamental requirement and a building block for various applications. However, the very nature of wirel… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
46
0

Year Published

2008
2008
2016
2016

Publication Types

Select...
4
3
3

Relationship

2
8

Authors

Journals

citations
Cited by 85 publications
(46 citation statements)
references
References 9 publications
0
46
0
Order By: Relevance
“…TOA can be used in localization [34] and physical-layer authentication [35], due to the existing relationship between TOA and the distance. We can use TOA as a feature to do authentication, which is shown in (2.9).…”
Section: Toamentioning
confidence: 99%
“…TOA can be used in localization [34] and physical-layer authentication [35], due to the existing relationship between TOA and the distance. We can use TOA as a feature to do authentication, which is shown in (2.9).…”
Section: Toamentioning
confidence: 99%
“…However, such a process can be easily abused or disrupted by adversarial nodes. In absence of a priori trusted nodes, the discovery and verification of neighbor positions presents challenges that have been scarcely investigated in the literature [1]. A mechanism called packet leashes to detecting and defending against wormhole attacks is proposed in [16].…”
Section: Related Workmentioning
confidence: 99%
“…Special emphasis is put on deployability; we have implemented the proposed scheme in a software prototype [26] and conducted experiments with automotive hardware platforms for vehicular communication. It is worth noting that our work presented here integrates our previous conceptual work on security in VANETs [27] and other techniques such as secure neighbor discovery (SND) [28], [29]. However, communication and location privacy, which is typically based on changing and revocable pseudonyms (e.g., [30]), is regarded to be orthogonal to the presented security approach.…”
Section: Etsi Tc Its Iso Tc204 Wg16 and Others)mentioning
confidence: 99%