Abstract

Ad-hoc networks have unique properties, making it impossible to execute the current existing network security policy successfully. Based on studying the Ad-hoc network, the Cloud Security theory will be applied to it. We apply Direct Blind Authentication theory and trusted computing platform hardware modules to optimize the Ad-hoc networks' authentication links. The program successfully addresses the security concerns of Ad-hoc nodes, strengthening the Ad-hoc network's defenses.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call