IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Security in Ad-Hoc Networks

Security in Ad-Hoc Networks
View Sample PDF
Author(s): Muhammad Mahmudul Islam (Monash University, Clayton, Australia), Ronald Pose (Monash University, Clayton, Australia) and Carlo Kopp (Monash University, Clayton, Australia)
Copyright: 2008
Pages: 30
Source title: Mobile Multimedia Communications: Concepts, Applications, and Challenges
Source Author(s)/Editor(s): Gour Karmakar (Monash University, Australia) and Laurence S. Dooley (Monash University, Australia)
DOI: 10.4018/978-1-59140-766-9.ch013

Purchase

View Security in Ad-Hoc Networks on the publisher's website for pricing and purchasing information.

Abstract

Due to the nature of wireless media, dynamic network topology, resource constraints, and lack of any base station or access point, security in ad-hoc networks is more challenging than with cabled networks. In this chapter, we discuss various attacks on the network layer of ad-hoc networks. We also review security protocols that protect network layer operations from various attacks.

Related Content

Sima Das, Ahona Ghosh, Sriparna Saha. © 2023. 28 pages.
Kannadhasan S., Nagarajan R., Guruprasath R.. © 2023. 10 pages.
Kannadhasan S., Kanagaraj Venusamy, Nagarajan R.. © 2023. 9 pages.
Sujatha K., Karthiga G., Bhavani N. P. G., Kalaivani A., N. Janaki. © 2023. 15 pages.
Jashasmita Pal, Subhalaxmi Das. © 2023. 20 pages.
Sanjana Chelat Menon, Umayal V. R., Gulshan Soni, Aymaan Baig, Amit Kumar Tyagi. © 2023. 13 pages.
Marion Olubunmi Adebiyi, Jesutofunmi Onaope Afolayan, Micheal Olaolu Arowolo, Amit Kumar Tyagi, Ayodele Ariyo Adebiyi. © 2023. 21 pages.
Body Bottom