Secure Ad-Hoc mBusiness: EnhancingWindowsCE Security
نویسندگان
چکیده
Nowadays we can perform business transactions with remote servers interconnected to Internet using our personal devices. These transactions can also be possible without any infrastructure in pure adhoc networks. In both cases, interacting parts are often unknown, therefore, they require some mechanism to establish ad-hoc trust relationships and perform secure transactions. Operating systems for mobile platforms support secure communication and authentication, but this support is based on hierarchical PKI. For wireless communications, they use the (in)secure protocol WEP. This paper presents a WCE security enhanced architecture allowing secure transactions, mutual authentication, and access control based on dynamic management of the trusted certificate list. We have successfully implemented our own CSP to support the new certificate management and data ciphering.
منابع مشابه
Secure Routing Protocol: Affection on MANETs Performance
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
متن کاملOn Secure Mobile Ad hoc Routing
Many plain routing protocols have been proposed for mobile ad hoc networks. These protocols all assume cooperative networks and focus only on routing effectiveness and efficiency. However, mobile ad hoc networks are not a friendly environment for various reasons in nature. Routing Protocols without any security feature can put entire network at risk. As security becomes an increasingly importan...
متن کاملSecurity in Ad Hoc Networks
This paper analyzes security challenges in ad hoc networks and summarizes key issues that should be solved for achieving the ad hoc security. It also gives an overview of the current state of solutions on such key issues as intrusion detection, secure routing and key management service. Based on our study, we present using external CA (Certificate Authority) and tamperresistant chip to support ...
متن کاملA Comparative Study of various Secure Routing Protocols based on AODV
The paper surveyed and compared various secure routing protocols for the mobile ad hoc networks (MANETs). MANETs are vulnerable to various security threats because of its dynamic topology and selfconfigurable nature. Security attacks on ad hoc network routing protocols disrupt network performance and reliability. The paper significantly based on base routing protocol AODV and Secure protocol ba...
متن کاملSurvey on Detection and Prevention Techniques for Malicious Node in MANET
Wireless ad-hoc networks has now become one of the most vibrant and active field of communication and networks. Due to lack of a defined central authority, MANETs are more vulnerable to security attacks and thus security is essential requirement in MANET as compared to the wired network. The nature and structure of MANET makes it attractive to various types of attackers. In this paper the princ...
متن کامل