Check out RSS, or use RSS reader to subscribe this item
Confirmation
Authentication email has already been sent, please check your email box: and activate it as soon as possible.
You can login to My Profile and manage your email alerts.
Sponsored by the Center for Science and Technology Development of the Ministry of Education
Supervised by Ministry of Education of the People's Republic of China
The wireless ad hoc nature of Mobile Ad hoc Network brought a new security challenges to the network design. Vulnerability of channels and nodes, absence of infrastructure, and dynamically changing topology make ad hoc networks’ security a difficult undertaking. Broadcast wireless channels allow message to be eavesdropping and injection. Wireless networks were generally more vulnerable to information and physical security threats than fixed wired networks. The absence of infrastructure makes the classic security solutions based on certification authorities and online servers inapplicable. This paper on ad hoc networking illustrates that many of the new generation ad hoc networking proposals are not yet able to address the unique security problems of this specialized system. Environment-specific implications on the required approaches in implementing security in such dynamically changing networks have not yet been fully realized. There are many ongoing ad-hoc programming attempts to address the problem. Include Optimized Link State Routing, Ad-hoc On-demand Distance Vector, and Hazy Sighted Link State .We attempt to analyze the demands of Ad-hoc environment. We focus on three routing of Ad-hoc networks attempts to address the problem.