The Community for Technology Leaders
Green Image
Issue No. 03 - May-June (2004 vol. 2)
ISSN: 1540-7993
pp: 28-39
Yih-Chun Hu , University of California, Berkeley
Adrian Perrig , Carnegie Mellon University
ABSTRACT
Ad hoc networks use mobile nodes to enable communication outside wireless transmission range. Attacks on ad hoc network routing protocols disrupt network performance and reliability. The authors survey the state of research and its challenges in this field.
INDEX TERMS
ad hoc routing, ad-hoc, mobile nodes, routing, protocols, wireless security
CITATION

A. Perrig and Y. Hu, "A Survey of Secure Wireless Ad Hoc Routing," in IEEE Security & Privacy, vol. 2, no. , pp. 28-39, 2004.
doi:10.1109/MSP.2004.1
94 ms
(Ver 3.3 (11022016))