Abstract

In this paper, we elaborated on preventive mechanisms either based on cryptographic solutions or trust based infrastructure Moreover, both the localized and ACK-based detection techniques were discussed. Global and local end node reaction mechanisms against ongoing intrusions and threads in order to avoid persistent adverse effects were further discussed. Finally, this paper highlighted open challenges which need to be addressed to secure Ad Hoc networks of the future.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call