Multi-hop routing is essential to the operation of wireless ad hoc networks. Unfortunately, it is very easy for an adversary to forge or modify routing messages to inflict severe ...
Qing Li, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig,...
So far, research on mobile ad hoc networks has been focused primarily on routing issues. Security, on the other hand, has been given a lower priority. This paper provides an overv...
Vehicular networks are likely to become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat an...
Traditional key pre-distribution schemes in sensor and ad hoc networks rely on the existence of a trusted third party to generate and distribute a key pool. The assumption of a sin...
We present in this paper a solution exploiting existence of multiple paths between nodes to secure data in Ad hoc networks. This solution is also designed in the aim to give the ne...