46
Ad HoC Mobile Wireless netWorks
devices of a WLAN or is a pairwise secret key shared only by two
communicating devices.
Bluetooth uses cryptographic security mechanisms implemented in
the data-link layer. A key management service provides each device
with a set of symmetric cryptographic keys required for the initial-
ization of a secret channel with another device, the execution of an
authentication protocol, and the exchange of encrypted data on the
secret channel.
1.3.4.10 Secure Routing Malicious nodes can disrupt the correct
functioning of a routing protocol by modifying routing information,
fabricating false routing information, and impersonating other nodes.
e secure routing protocol (SRP) is an extension that is applied to
severa