Download Now Free registration required
In this paper, the authors present an overview of Ad hoc network that uses mobile nodes to enable communication outside wireless transmission range. They briefly describe the ad-hoc routing protocols, the attackers, attacks by the attackers and some suggestions and solution for secure routing protocols that follow the table driven and on-demand approaches. With the advances of wireless communication technology, low-cost and powerful wireless transceivers are widely used in mobile applications. Mobile networks have attracted significant interests in recent years because of their improved flexibility and reduced costs.
- Format: PDF
- Size: 153.2 KB