Skip to main content Accessibility help
  • Print publication year: 2008
  • Online publication date: February 2010

1 - Introduction


Wireless mobile ad hoc networks consist of mobile nodes interconnected by wireless multi-hop communication paths. Unlike conventional wireless networks, ad hoc networks have no fixed network infrastructure or administrative support. The topology of such networks changes dynamically as mobile nodes join or depart the network or radio links between nodes become unusable. In this chapter, I will introduce wireless ad hoc networks, and discuss their inherent vulnerable nature. Considering the inherent vulnerable nature of ad hoc networks, a set of security requirements is subsequently presented. The chapter also introduces the quality of service issues that are relevant for ad hoc networks.

Ad hoc networking

Conventional wireless networks require as prerequisites a fixed network infrastructure with centralized administration for their operation. In contrast, so-called (wireless) mobile ad hoc networks, consisting of a collection of wireless nodes, all of which may be mobile, dynamically create a wireless network amongst themselves without using any such infrastructure or administrative support [1, 2]. Ad hoc wireless networks are self-creating, self-organizing, and self-administering. They come into being solely by interactions among their constituent wireless mobile nodes, and it is only such interactions that are used to provide the necessary control and administration functions supporting such networks.

Mobile ad hoc networks offer unique benefits and versatility for certain environments and certain applications. Since no fixed infrastructure, including base stations, is prerequisite, they can be created and used “any time, anywhere.” Such networks could be intrinsically fault-resilient, for they do not operate under the limitations of a fixed topology.

Related content

Powered by UNSILO
Haas, Z. J., Gerla, M., Johnson, D. B., et al., “Guest editorial,” IEEE J. Select. Areas Commun., Special issue on wireless networks, vol. 17, no. 8, Aug. 1999, pp. 1329–1332.
Johnson, D. B. and Maltz, D. A., “Protocols for adaptive wireless and mobile networking,” IEEE Personal Commun., Feb. 1996, pp. 34–42.
C. Bisdikian, “An overview of the Bluetooth wireless technology,” IEEE Commun. Mag., Dec. 2001, pp. 86–94. (For additional sources of comprehensive information on Bluetooth, see the official websites, and; an excellent compendium of tutorials and references is available at
Bennett, F., Clarke, D., Evans, J. B., et al., “Piconet: embedded mobile networking,” IEEE Personal Commun., vol. 4, no. 5, Oct. 1997, pp. 8–15.
Negus, K. J., Waters, J., Tourrilhes, J., et al., “HomeRF and SWAP: wireless networking for the connected home,” ACM SIGMOBILE Mobile Computing and Commun. Rev., vol. 2, no. 4, Oct. 1998, pp. 28–37.
Tobagi, F. A. and Kleinrock, L., “Packet switching in radio channels ― part 2: the hidden terminal problem in carrier sense multiple-access and the busy tone solution,” IEEE Trans. Commun., vol. COM-23, Dec. 1985, pp. 1417–1433.
Lin, C. R. and Gerla, M., “MACA/PR: an asynchronous multimedia multihop wireless network,” Proc. 16th Annual Joint Conf. IEEE Comp. Commun. Soc. (INFOCOM 1997), vol. 1, 1997, pp. 118–125.
Sobrinho, J. L. and Krishnakumar, A. S., “Quality-of-service in ad hoc carrier sense multiple access wireless networks,” IEEE J. Select. Areas Commun., vol. 17, No. 8, Aug. 1999, pp. 1353–1414.
Chen, S. and Nahrstedt, K., “An overview of quality-of-service routing for the next generation high-speed networks: problems and solutions,” IEEE Network, Nov.–Dec. 1998, pp. 64–79.
Basagni, S., Conti, M., Giordano, S., and Stojmenovic, I. (Editors), Mobile Ad Hoc Networking, John Wiley and Sons, 2004.
Ilyas, M. (Editor), The Handbook of Wireless Ad Hoc Networks, CRC Press, 2003.
Murthy, C. S. Ram and Manoj, B. S., Ad Hoc Wireless Networks –Architecture and Protocols, Prentice Hall, 2004.
Stojmenovic, I. (Editor), Handbook of Wireless Networks & Mobile Computing, John Wiley and Sons, 2002.