Existing Wireless Network Security Mechanisms and their Limitations for Ad Hoc Networks

@inproceedings{Safdar2006ExistingWN,
  title={Existing Wireless Network Security Mechanisms and their Limitations for Ad Hoc Networks},
  author={Ghazanfar Ali Safdar and Clare McGrath and M{\'a}ire McLoone},
  year={2006}
}
Unreliable wireless media, host mobility and lack of infrastructure present a big challenge to the provision of secure communications in mobile ad hoc networks. The contents of the communication must be encrypted and mutual authentication conducted between the communicating nodes in order to provide adequate security. Authentication protocols and key management techniques are utilised to provide security in many distributed systems. Much research has been conducted into the development of key… 
Authentication Based and Optimized Routing Technique in Mobile Ad hoc Networks
TLDR
The results have shown that in a moderately changing network, the Double Hash Technique has provided secure routing even in the presence of malicious nodes, and improved the performance of the DSR protocol.
REVIEW OF AUTHENTICATION TECHNIQUES FOR WIRELESS NETWORKS & MANET
TLDR
The issues related to the authentication in MANet, various techniques of authentication used in Traditional Wireless Network, Cellular Networks and especially in MANET along with their applicability and limitations have been discussed, which need to be addressed carefully before real time application of MANET.
Enhancing University Wireless Network Security using Peer-to-Peer Authentication Security Model
TLDR
A pee-to-peer security model with MAC address control is proposed, using Extensible Authentication Protocol with Tunneled Transport Layer Security (EAPTTLS) with certificate based mutual authentication of client and network through an encrypted tunnel and dynamic per user, per session WEP keys, using only server side certificates.
Versatile Extensible Security System for Mobile Ad Hoc Networks
TLDR
Versatile and Extensible System (VESS) is a powerful and versatile general-purpose security suite that comprises of modified versions of existing encryption and authentication schemes that allows easy future extension and modification.
VESS: a Versatile Extensible Security Suite for MANET routing
This paper presents a powerful and versatile security suite for the AODV (Ad-hoc On-demand Distance Vector) routing protocol. It offers a coverage on common security aspects such as encryption and
THE EFFECT OF VAMPIRE ATTACKS ON DISTANCE VECTOR ROUTING PROTOCOLS FOR WIRELESS AD HOC SENSOR NETWORKS
The aim of this project is to define Vampire attacks, a new class of resource consumption attacks that use distance vector routing protocols to permanently disable ad hoc wireless sensor networks by
Security Against Vampire Attack in ADHOC Wireless Sensor Network: Detection and Prevention Techniques
TLDR
The focus of this paper is on vampire attacks and its defenses at the routing protocol layer and gives future direction to work in the field of attack prevention.
Improve real-time packet scheduling algorithm with security constraint
TLDR
The proposed IPSASC dealt with scheduling and security both which can improve the guarantee ratio of the system and also decreases the numbers of packets drop and gave the excellence scheduling andSecurity result under the heavily work loaded system.