Security In Adhoc Network PPT PDF Paper Presentation & Seminar Report
Security In Adhoc Network Paper Presentation & Seminar
Ad hoc networks [5,15] do not have a fixed network topology. Nodes are mobile and can communicate with each other while in range, but otherwise are disconnected. This node mobility causes frequent changes of the network topology, and possible portioning. Ad hoc networks can be used to model several wireless applications, such as military operations in which the nodes are military units (soldiers, tanks and other vehicles, planets etc).equipped with wireless communication devices and more generally wireless communication system in which the fixed network is restricted. The restructuring of such networks is usually due to their mobility; however, it can also be caused by the enemy .the enemy can destroy captured devices try to use them to gather information or undermine the operations. The traditional model for static networks with Byzantine faults  may be used to describe some of the security threats of ad hoc networks, but what characterizes ad hoc networks is that their structure changes continuously. Furthermore, the tools which are used to establish the security (authentication, confidentiality, integrity, availability and non repudiation) of traditional networks cannot in general be easily adapted for the requirements of ad hoc networks, particularly when these get partitioned.
Please find the attached file along with this
If You have any query regarding the files.Please feel free toask.I'll be glad to help you.