Computer Science ›› 2009, Vol. 36 ›› Issue (7): 1-7.doi: 10.11896/j.issn.1002-137X.2009.07.001
Next Articles
ZHANG Peng,SUN Lei,CUI Yong,HAN Xiu-feng
Online:
Published:
Abstract: Mobile Ad Hoc networks are particularly vulnerable due to their features of dynamic changing topology, and wireless communication. Current security techniques for mobile Ad Hoc networks arc divided into five categories; intrusion detection, securing routing protocols, architecture and models, key management techniques and others. Using intrusion detection, nodes' behaviors were analyzed and detected based on particular mathematics modules. Securing routing protocols include novel securing routing protocols and security enhancements of current routing protocols. The security techniques were introduced and analyzed.
Key words: Mobile ad hoc network,Dynamic,Intrusion detection,Securing routing protocols,Key
ZHANG Peng,SUN Lei,CUI Yong,HAN Xiu-feng. Review of Security Techniques for Mobile Ad Hoc Networks[J].Computer Science, 2009, 36(7): 1-7.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/10.11896/j.issn.1002-137X.2009.07.001
https://www.jsjkx.com/EN/Y2009/V36/I7/1
Cited