This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
A Survey of Secure Wireless Ad Hoc Routing
May-June 2004 (vol. 2 no. 3)
pp. 28-39
Yih-Chun Hu, University of California, Berkeley
Adrian Perrig, Carnegie Mellon University
Ad hoc networks use mobile nodes to enable communication outside wireless transmission range. Attacks on ad hoc network routing protocols disrupt network performance and reliability. The authors survey the state of research and its challenges in this field.
Index Terms:
ad hoc routing, ad-hoc, mobile nodes, routing, protocols, wireless security
Citation:
Yih-Chun Hu, Adrian Perrig, "A Survey of Secure Wireless Ad Hoc Routing," IEEE Security & Privacy, vol. 2, no. 3, pp. 28-39, May-June 2004, doi:10.1109/MSP.2004.1
Usage of this product signifies your acceptance of the Terms of Use.