Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{155512,
author = {shiva kharbanda},
title = {Review of security in ad hoc networks},
journal = {International Journal of Innovative Research in Technology},
year = {},
volume = {9},
number = {1},
pages = {1045-1051},
issn = {2349-6002},
url = {https://ijirt.org/article?manuscript=155512},
abstract = {Ad hoc networks are wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The military tactical and other security-sensitive operations are one of the main applications of ad hoc networks, although there is a trend to adopt ad hoc networks for commercial uses due to their unique properties. One main challenge in design of these networks is their vulnerability to security attacks. In this paper we analyse and focus on the existing problems and security challenges that are available in current Ad hoc Networks and summarizes key issues that should be solved for achieving the ad hoc security.},
keywords = {},
month = {},
}
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry