Abstract:
In the last few years, there has been tremendous interest in ad hoc wireless networks as they have massive military and commercial potential. An ad hoc wireless network serves as an independent network that comprises of mobile devices that utilize wireless transmission for communication, having no fixed infrastructure. These networks eliminate the complexity of infrastructure setup and hence can be deployed in quick time. However, on the negative side, such networks are very vulnerable to attacks against availability, service integrity, security, privacy and several other possible threats. To overcome these attacks, several security mechanisms have been proposed to ensure the reliability of ad hoc networks.