Report on a working session on security in wireless ad hoc networks

Abstract
Most proposed routing protocols for mobile adhoc networks are vulnerable to modification, impersonationand fabrication attacks. The proposed secure rout8 Mobile Computing and Communications Review, Volume 6, Number 4ing protocol, Authenticated Routing for Ad Hoc Networks,prevents such attacks through message authentication, integrityand non-repudiation. Simulation results show thatARAN maintains good network performance while offeringsignificant security advantages over existing...

This publication has 18 references indexed in Scilit: