Browsing by Subject "Ad hoc networks (Computer networks) -- Security measures."
Now showing items 1-1 of 1
-
A Technique to Detect a Black Hole in Ad Hoc Networks
(North Dakota State University, 2010)Mobile Ad Hoc Networks (MANETs) are important because they are widely used in war zones, rescue missions and other civilian applications where it is almost impossible to use any other networks. MANETs are temporary ...