A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2007; you can also visit the original URL.
The file type is application/pdf
.
Rushing attacks and defense in wireless ad hoc network routing protocols
2003
Proceedings of the 2003 ACM workshop on Wireless security - WiSe '03
In an ad hoc network, mobile computers (or nodes) cooperate to forward packets for each other, allowing nodes to communicate beyond their direct wireless transmission range. Many proposed routing protocols for ad hoc networks operate in an on-demand fashion, as on-demand routing protocols have been shown to often have lower overhead and faster reaction time than other types of routing based on periodic (proactive) mechanisms. Significant attention recently has been devoted to developing secure
doi:10.1145/941315.941317
fatcat:holifgwonrhbdp6f7jzy77bnim