Computer Science ›› 2009, Vol. 36 ›› Issue (7): 1-7.doi: 10.11896/j.issn.1002-137X.2009.07.001

    Next Articles

Review of Security Techniques for Mobile Ad Hoc Networks

ZHANG Peng,SUN Lei,CUI Yong,HAN Xiu-feng   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Mobile Ad Hoc networks are particularly vulnerable due to their features of dynamic changing topology, and wireless communication. Current security techniques for mobile Ad Hoc networks arc divided into five categories; intrusion detection, securing routing protocols, architecture and models, key management techniques and others. Using intrusion detection, nodes' behaviors were analyzed and detected based on particular mathematics modules. Securing routing protocols include novel securing routing protocols and security enhancements of current routing protocols. The security techniques were introduced and analyzed.

Key words: Mobile ad hoc network,Dynamic,Intrusion detection,Securing routing protocols,Key

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!