Download Now Free registration required
A network of remote nodes works as backbone for communication using "Ad-Hoc" network. This is purely distributed & decentralized kind of N/W which doesn't rely on the existing N/W infrastructure. The nodes connected using Ad-Hoc N/W are focused by attackers through viruses, threats and worms. To tackle this issue a privacy mechanism should be applied at each level of connection, while making connection with any node authentication mechanism should be followed rigorously. To secure Ad-Hoc network from human attackers and malicious threats like Trojans what mechanisms can be applied the authors are going to see in this paper.
- Format: PDF
- Size: 343.9 KB