Skip to main content Accessibility help
×
Home
Hostname: page-component-99c86f546-8r8mm Total loading time: 0.269 Render date: 2021-12-07T12:42:19.654Z Has data issue: true Feature Flags: { "shouldUseShareProductTool": true, "shouldUseHypothesis": true, "isUnsiloEnabled": true, "metricsAbstractViews": false, "figures": true, "newCiteModal": false, "newCitedByModal": true, "newEcommerce": true, "newUsageEvents": true }

1 - Introduction

Published online by Cambridge University Press:  26 February 2010

Amitabh Mishra
Affiliation:
Virginia Polytechnic Institute and State University
Get access

Summary

Wireless mobile ad hoc networks consist of mobile nodes interconnected by wireless multi-hop communication paths. Unlike conventional wireless networks, ad hoc networks have no fixed network infrastructure or administrative support. The topology of such networks changes dynamically as mobile nodes join or depart the network or radio links between nodes become unusable. In this chapter, I will introduce wireless ad hoc networks, and discuss their inherent vulnerable nature. Considering the inherent vulnerable nature of ad hoc networks, a set of security requirements is subsequently presented. The chapter also introduces the quality of service issues that are relevant for ad hoc networks.

Ad hoc networking

Conventional wireless networks require as prerequisites a fixed network infrastructure with centralized administration for their operation. In contrast, so-called (wireless) mobile ad hoc networks, consisting of a collection of wireless nodes, all of which may be mobile, dynamically create a wireless network amongst themselves without using any such infrastructure or administrative support [1, 2]. Ad hoc wireless networks are self-creating, self-organizing, and self-administering. They come into being solely by interactions among their constituent wireless mobile nodes, and it is only such interactions that are used to provide the necessary control and administration functions supporting such networks.

Mobile ad hoc networks offer unique benefits and versatility for certain environments and certain applications. Since no fixed infrastructure, including base stations, is prerequisite, they can be created and used “any time, anywhere.” Such networks could be intrinsically fault-resilient, for they do not operate under the limitations of a fixed topology.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2008

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Haas, Z. J., Gerla, M., Johnson, D. B., et al., “Guest editorial,” IEEE J. Select. Areas Commun., Special issue on wireless networks, vol. 17, no. 8, Aug. 1999, pp. 1329–1332.CrossRefGoogle Scholar
Johnson, D. B. and Maltz, D. A., “Protocols for adaptive wireless and mobile networking,” IEEE Personal Commun., Feb. 1996, pp. 34–42.CrossRefGoogle Scholar
C. Bisdikian, “An overview of the Bluetooth wireless technology,” IEEE Commun. Mag., Dec. 2001, pp. 86–94. (For additional sources of comprehensive information on Bluetooth, see the official websites, www.bluetooth.com/ and www.bluetooth.org/; an excellent compendium of tutorials and references is available at http://kjhole.com/Standards/Intro.html.)
Bennett, F., Clarke, D., Evans, J. B., et al., “Piconet: embedded mobile networking,” IEEE Personal Commun., vol. 4, no. 5, Oct. 1997, pp. 8–15.CrossRefGoogle Scholar
Negus, K. J., Waters, J., Tourrilhes, J., et al., “HomeRF and SWAP: wireless networking for the connected home,” ACM SIGMOBILE Mobile Computing and Commun. Rev., vol. 2, no. 4, Oct. 1998, pp. 28–37.CrossRefGoogle Scholar
Tobagi, F. A. and Kleinrock, L., “Packet switching in radio channels ― part 2: the hidden terminal problem in carrier sense multiple-access and the busy tone solution,” IEEE Trans. Commun., vol. COM-23, Dec. 1985, pp. 1417–1433.Google Scholar
Lin, C. R. and Gerla, M., “MACA/PR: an asynchronous multimedia multihop wireless network,” Proc. 16th Annual Joint Conf. IEEE Comp. Commun. Soc. (INFOCOM 1997), vol. 1, 1997, pp. 118–125.Google Scholar
Sobrinho, J. L. and Krishnakumar, A. S., “Quality-of-service in ad hoc carrier sense multiple access wireless networks,” IEEE J. Select. Areas Commun., vol. 17, No. 8, Aug. 1999, pp. 1353–1414.CrossRefGoogle Scholar
Chen, S. and Nahrstedt, K., “An overview of quality-of-service routing for the next generation high-speed networks: problems and solutions,” IEEE Network, Nov.–Dec. 1998, pp. 64–79.CrossRefGoogle Scholar
Basagni, S., Conti, M., Giordano, S., and Stojmenovic, I. (Editors), Mobile Ad Hoc Networking, John Wiley and Sons, 2004.CrossRefGoogle Scholar
Ilyas, M. (Editor), The Handbook of Wireless Ad Hoc Networks, CRC Press, 2003.Google Scholar
Murthy, C. S. Ram and Manoj, B. S., Ad Hoc Wireless Networks –Architecture and Protocols, Prentice Hall, 2004.Google Scholar
Stojmenovic, I. (Editor), Handbook of Wireless Networks & Mobile Computing, John Wiley and Sons, 2002.CrossRefGoogle Scholar

Send book to Kindle

To send this book to your Kindle, first ensure no-reply@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about sending to your Kindle.

Note you can select to send to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be sent to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Introduction
  • Amitabh Mishra, Virginia Polytechnic Institute and State University
  • Book: Security and Quality of Service in Ad Hoc Wireless Networks
  • Online publication: 26 February 2010
  • Chapter DOI: https://doi.org/10.1017/CBO9780511619755.002
Available formats
×

Send book to Dropbox

To send content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about sending content to Dropbox.

  • Introduction
  • Amitabh Mishra, Virginia Polytechnic Institute and State University
  • Book: Security and Quality of Service in Ad Hoc Wireless Networks
  • Online publication: 26 February 2010
  • Chapter DOI: https://doi.org/10.1017/CBO9780511619755.002
Available formats
×

Send book to Google Drive

To send content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about sending content to Google Drive.

  • Introduction
  • Amitabh Mishra, Virginia Polytechnic Institute and State University
  • Book: Security and Quality of Service in Ad Hoc Wireless Networks
  • Online publication: 26 February 2010
  • Chapter DOI: https://doi.org/10.1017/CBO9780511619755.002
Available formats
×