Routing security in Ad Hoc wireless networks

18Citations
Citations of this article
28Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Wireless networks provide rapid, untethered access to information and computing, eliminating the barriers of distance, time, and location for many applications ranging from collaborative, distributed mobile computing to disaster recovery (such as fire, flood, earthquake), law enforcement (crowd control, search, and rescue), and military communications (command, control, surveillance, and reconnaissance). An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration [11] © 2010 Springer Science+Business Media, LLC.

Cite

CITATION STYLE

APA

Pervaiz, M. O., Cardei, M., & Wu, J. (2010). Routing security in Ad Hoc wireless networks. In Network Security (pp. 117–142). Springer US. https://doi.org/10.1007/978-0-387-73821-5_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free