Download now Free registration required
A recent trend in ad hoc network routing is the reactive on-demand philosophy where routes are established only when required. Most of the protocols in this category are not incorporating proper security features. The ad hoc environment is accessible to both legitimate network users and malicious attackers. It has been observed that different protocols need different strategies for security. An attempt has been made to review some of the existing protocols. Finally a new scheme based on hashing has been proposed to secure an existing protocol.
- Format: PDF
- Size: 72.15 KB