| Our  network access habits have been changing significantly over the last few years:  20 million wireless-enabled computers and 150 thousand locations for wireless broadband  Internet access were available worldwide in 2006. At the same time, an  increasing number of wireless community networks are being deployed, portable  digital assistants are equipped with radio and infrared transceivers, cellular  telephones offer alternative ways of data communication, and wireless sensing  and actuating devices are becoming commonplace at home and in factories and  hospitals. Overall, the network itself undergoes a gradual transformation:  devices collaborate to support basic networking operations, i.e., routing and  data forwarding and dissemination, essentially becoming the network. Mobile ad  hoc networking will play a central role, enabling communication across multiple  wireless links (hops) in a self-organized manner, without a fixed  infrastructure.  However,  assuming that network entities participate voluntarily and assist the network  operation is utopian, as experience from the (wire-line) Internet teaches.  Compared to traditional networks, ad hoc networking infrastructures are less  protected and hard to monitor and manage. The challenge lies exactly in  securing the ad hoc network operation, because any malicious or selfish network  entity can disrupt, degrade, or even deny communication of other entities.  Security is paramount for both civilian and tactical applications. Users would  have no incentive to embrace new products if, for example, they cannot access  their services and get the quality they pay for or if their privacy is at  stake. Similarly, a General or a Police Commissioner would not endorse  networking technologies that do not guarantee secure and reliable  communications in a battlefield or an emergency situation. This is particularly  true for the emerging technology of Vehicular communications (VCs), with  vehicles and roadside infrastructure units equipped with sensors, computers,  and wireless transceivers enabling a range of applications that enhance  transportation safety and efficiency. VCs offer a rich set of tools but also  make possible a formidable set of abuses. For example, an adversary could  'contaminate' large portions of the VANET with false information; or, intercept  vehicle-originating messages, track the vehicle location and transactions, and  infer sensitive information about their passengers. Without security mechanisms,  VCs can make antisocial and criminal behavior easy, essentially jeopardizing  the benefits of the VCs systems deployment. In this  tutorial, we discuss why it is necessary to redesign security for ad hoc  networks, and present basic concepts and protocols from the literature on how  to thwart attacks. We focus on fundamental security issues, including: the  establishment of secure associations among nodes, the secure discovery of  communication paths in the network, that is, of neighbor and route discovery,  and the security of data communications. Finally, we discuss briefly the new  and uniquely constrained problem of how to secure vehicular communications, we  consider especially the strong privacy concerns there system raise, and discuss  how to address them. |