Paper title:

Intelligent Shops and Communications Security

Published in: Issue 2, (Vol. 1) / 2007
Pages: 31-35
Author(s): Tiliute Doru E., Stan Carmen Eleonora
Abstract. One of the most present issues of computer wireless networks is the security. Comparing with their wired counterpart, the wireless networks not only accentuate some of the well-known security vulnerabilities but they are subject of new and specific ones. Among the existing wireless networks the ad hoc ones are the most exposed to attacks and collusions due to the absence of any centralized control. The most efficient way to ensure the communication secrecy, inclusively for ad hoc wireless networks, is the cryptography. From many reasons, following from specific operat-ing conditions, the employment of asymmetric key techniques and Public Key Infrastructure is not a realistic choice. In the networks with a large number of nodes, as wireless sensor networks, a large number of secret keys are involved in order to ensure the communication secrecy. While dynamicity is one of the essential features of mobile wireless networks, when nodes may leave or join the network and in the absence of a centralized control entity, the management of secret keys is crucial. The paper presents the main aspects of mobile wireless networks security and focuses on the key management issue in ad-hoc wireless networks.
Keywords: Intelligent Shops, Communications Security, Wireless Communications

 1. Evan E. Anderson, Henry N. Amato, Measurement of Consumer Brand Preference Under Alternative Market Conditions, Operations Research, Vol. 22, No. 1.

2. The Center for Facilitation of Procedures and Practices for Administration, Commerce and Transport:

3. Peter S. H. Leeflang and Dick R. Wittink, Building models for marketing decisions: Past, present and future. International Journal of Research in Marketing. Vol. 17 Issue 2 – 3, September 2000.

4. Adi Tedjasaputra, Sustainable Growth of RFID Supply Chain Markets, RFID-Asia July, 2007.

5. Stephan Olariu, Information Assurance in Sensor Networks, VISSAS 2005 – NATO ARW Timişoara, March 22, 2005.

6. Lidong Zhou and Zigmund Hass, Securing Ad Hoc Networks. IEEE Networks, Special Issue on Network Security, November/ December, 1999.

7. Patrick Alberts et al., Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches, IEEE Network, WIS, 2002.

8. Po-Wah Yau and Chris J. Mitchell, Security Vulnerabilities in Ad Hoc Networks, The Seventh International Symposium on Communication Theory and Applications, July 13 – 18, 2003, Ambleside, Lake District, UK.

9. Hao Yang et al., Security in Mobile Ad Hoc Networks: Challenges and Solutions, IEEE Wireless Communications, February, 2004.

10. Michael Brown et al., PGP in Constrained Wireless Devices, Proceedings of the 9th USENIX Security Symposium, Denver, Colorado, USA, August 14 – 17, 2000.

11. Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar, Public Key Cryptography in Sensor Networks – Revisited, ESAS 2004, European workshop on security in ad-hoc and sensor networks, No.1, Heidelberg, Germany, August 6, 2004.

12. S. Rafaeli and D Hutchinson, A survey of key management for secure group communication, ACM Computing Surveys, Vol. 35, Issue 3, pp. 309-329.

Back to the journal content
Creative Commons License
This article is licensed under a
Creative Commons Attribution-ShareAlike 4.0 International License.
Home | Editorial Board | Author info | Archive | Contact
Copyright JACSM 2007-2022