Skip to Main Content
Ad Hoc Mobile Wireless Networks, 2nd Edition
book

Ad Hoc Mobile Wireless Networks, 2nd Edition

by Subir Kumar Sarkar, T.G. Basavaraju, C. Puttamadappa
April 2016
Intermediate to advanced content levelIntermediate to advanced
349 pages
8h 42m
English
CRC Press
Content preview from Ad Hoc Mobile Wireless Networks, 2nd Edition
46
Ad HoC Mobile Wireless netWorks
devices of a WLAN or is a pairwise secret key shared only by two
communicating devices.
Bluetooth uses cryptographic security mechanisms implemented in
the data-link layer. A key management service provides each device
with a set of symmetric cryptographic keys required for the initial-
ization of a secret channel with another device, the execution of an
authentication protocol, and the exchange of encrypted data on the
secret channel.
1.3.4.10 Secure Routing Malicious nodes can disrupt the correct
functioning of a routing protocol by modifying routing information,
fabricating false routing information, and impersonating other nodes.
e secure routing protocol (SRP) is an extension that is applied to
severa
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Ad Hoc Mobile Wireless Networks: Protocols and Systems

Ad Hoc Mobile Wireless Networks: Protocols and Systems

C.-K. Toh - Ph.D.
Wireless Ad Hoc and Sensor Networks

Wireless Ad Hoc and Sensor Networks

Jing (Selina) He, Mr. Mr. Shouling Ji, Yingshu Li, Yi Pan

Publisher Resources

ISBN: 9781466514478