Abstract
Ad-hoc networks have unique properties, making it impossible to execute the current existing network security policy successfully. Based on studying the Ad-hoc network, the Cloud Security theory will be applied to it. We apply Direct Blind Authentication theory and trusted computing platform hardware modules to optimize the Ad-hoc networks' authentication links. The program successfully addresses the security concerns of Ad-hoc nodes, strengthening the Ad-hoc network's defenses.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have