Computer Science ›› 2008, Vol. 35 ›› Issue (8): 21-25.
Previous Articles Next Articles
Online:
Published:
Abstract: Ad Hoc networks are vulnerable to some kinds of attacks for its network structure characteristics, this makes the secure routing and data transmission be research hotspots of Ad Hoc applications. As to the External attacks, some efficient and secure schem
Key words: Ad Hoc network,Secure data transmission, Intrusion detection, Malicious behavior judgment
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2008/V35/I8/21
Cited