Date Added: Nov 2009
The WEP protection technique suggested for adhoc network fall short of the objective of data privacy, data integrity, and authentication. Various security standards such as IEEE 802.11i, WPA, IEEE 802.1X were suggested to enhance the security issues in 802.11.Despite their efficiency, these standards do not provide any robustness to the security approach for monitoring of the authentication in a distributed architecture. For the efficient monitoring of the authentication issue in adhoc network, the authors present a self monitored and trustworthy security approach for wireless adhoc networks. The processing overhead for the suggested approach is evaluated for a distributed adhoc network and the results are promising.