Issue No.03 - May-June (2004 vol.2)
Yih-Chun Hu , University of California, Berkeley
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2004.1
Ad hoc networks use mobile nodes to enable communication outside wireless transmission range. Attacks on ad hoc network routing protocols disrupt network performance and reliability. The authors survey the state of research and its challenges in this field.
ad hoc routing, ad-hoc, mobile nodes, routing, protocols, wireless security
Yih-Chun Hu, "A Survey of Secure Wireless Ad Hoc Routing", IEEE Security & Privacy, vol.2, no. 3, pp. 28-39, May-June 2004, doi:10.1109/MSP.2004.1