Abstract
Ad hoc networks use mobile nodes to enable communication outside wireless transmission range. Attacks on ad hoc network routing protocols disrupt network performance and reliability. The article reviews attacks on ad hoc networks and discusses current approaches for establishing cryptographic keys in ad hoc networks. We describe the state of research in secure ad hoc routing protocols and its research challenges.
Cite
CITATION STYLE
APA
Newsome, J., Shi, E., Song, D., & Perrig, A. (2004). The sybil attack in sensor networks (pp. 259–268). Association for Computing Machinery (ACM). https://doi.org/10.1145/984622.984660
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.
Already have an account? Sign in
Sign up for free