chapter  1
24 Pages

Attacks and Defenses of Routing Mechanisms in Ad Hoc and Sensor Networks

ByYou-Chiun Wang, Yu-Chee Tseng

Contents 1.1 Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4 1.2 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4 1.3 Routing Protocols in Ad Hoc and Sensor Networks . . . . . . . . . . . . . . . . . .6 1.4 Attacks on Routing Mechanisms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8