skip to main content
10.1145/1080793.1080795acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

Emergent properties in ad-hoc networks: a security perspective

Published: 02 September 2005 Publication History

Abstract

A common characteristic of all ad-hoc networks is that of emergent properties. Intuitively, emergent properties are features that cannot be provided by individual network nodes themselves but instead result from interaction and collaboration among network nodes. In this talk, we present the salient characteristics of these properties and discuss their security implications. Several examples of emergent properties in sensor and ad-hoc networks are discussed including key connectivity, trust establishment, and node replica detection. We conclude with a common theme of current research in security of emergent properties, namely that of a new threat model whereby the adversary may adaptively compromise nodes of a network. We contrast this theme with that of past research that limits an adversary to "man-in-the-middle" attacks and relies exclusively on end-to-end security solutions.

Cited By

View all
  • (2010)A distributed node self-monitoring mechanism in wireless sensor networksThe 2nd International Conference on Information Science and Engineering10.1109/ICISE.2010.5691634(1684-1687)Online publication date: Dec-2010
  • (2009)Using Multi-agent Systems to Specify Safe and Secure Services for Virtual OrganisationsSafety and Security in Multiagent Systems10.1007/978-3-642-04879-1_18(258-273)Online publication date: 6-Oct-2009
  • (2007)A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networksProceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing10.1145/1288107.1288119(80-89)Online publication date: 9-Sep-2007
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WiSe '05: Proceedings of the 4th ACM workshop on Wireless security
September 2005
116 pages
ISBN:1595931422
DOI:10.1145/1080793
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 September 2005

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

WiSE05
Sponsor:

Acceptance Rates

Overall Acceptance Rate 10 of 41 submissions, 24%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2010)A distributed node self-monitoring mechanism in wireless sensor networksThe 2nd International Conference on Information Science and Engineering10.1109/ICISE.2010.5691634(1684-1687)Online publication date: Dec-2010
  • (2009)Using Multi-agent Systems to Specify Safe and Secure Services for Virtual OrganisationsSafety and Security in Multiagent Systems10.1007/978-3-642-04879-1_18(258-273)Online publication date: 6-Oct-2009
  • (2007)A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networksProceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing10.1145/1288107.1288119(80-89)Online publication date: 9-Sep-2007
  • (2006)Requirements and Open Issues in Distributed Detection of Node Identity Replicas in WSN2006 IEEE International Conference on Systems, Man and Cybernetics10.1109/ICSMC.2006.384924(1468-1473)Online publication date: Oct-2006

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media