International Journal of Computer Applications
"With the emergence of mobile ad hoc networks it is now possible to access network accessing and communicate data in an area where no fixed infrastructure exists or existing infrastructure is not available. Since in ad hoc networks, the exact copies of the same content are stored at various locations. Therefore in order to prevent from various attacks based on the content; it becomes important to have some security solutions. In this paper, the authors propose an efficient content authentication method in ad hoc network. Foremost, the challenges in ad hoc networks have been mentioned in this paper."