Research Area:  Mobile Ad Hoc Networks
The current progression and communication in the corporate, military and industrial sectors. Nevertheless, these progressions have likewise brought new security vulnerabilities. The uses of the security methods of wired systems, for example, access control and confirmation/authentication have been unsuitable to wireless network because of the extraordinary features of such networks, for example, In dynamic evolving topology, no incorporated/centralized control and so forth.
Author(s) Name:  A. Raj and P. Vyas
Journal name:   International Journal of Computer Applications
Publisher name:  SEMANTIC SCHOLAR