Frontiers in Educational Research, 2020, 3(1); doi: 10.25236/FER.2020.030115.
Cao Guihong
Hunan Institute of Engineering, Hunan 411101, China
Ad Hoc network is composed of a group of mobile terminals with wireless transceivers. The mobile terminal has a routing function and can form an arbitrary network topology through wireless connection technology, so that timely communication can be performed in scenarios without fixed technical warfare. This paper first briefly describes the characteristics of the Ad Hoc network, then analyzes the security of the Ad Hoc network from the perspectives of usability, confidentiality, integrity, security authentication, and non-repudiation, and finally proposes a security strategy for the Ad Hoc network.
Ad hoc network; Network security; Security strategy
Cao Guihong. Security Analysis and Strategy of Ad Hoc Network. Frontiers in Educational Research (2020) Vol. 3 Issue 1: 104-107. https://doi.org/10.25236/FER.2020.030115.
[1] Xu Guiyue, Zhang Changjian, Gong Haimei (2019). Security strategy of wormhole attack in ad hoc wireless network. Electronic technology and software engineering, no.3, pp.169-170.
[2] Wang Haitao, Song Lihua, Zhang pengliang (2018). Security mechanism of wireless ad hoc network. Confidential science and technology, no.6, pp.27-31.
[3] Sun Lvye, Jia Xiaozhu, Lai Wenjuan (2017). Research on AODV based secure routing protocol in ad hoc network. Journal of Qingdao University (NATURAL SCIENCE EDITION), vol.30, no.2, pp.74-76.