S Tanwar,
KV Prema - International Journal of Soft Computing and …, 2013 - Citeseer
… internal attack and external attacks, the security services such as confidentiality, authenticity
… security attacks. In this paper, we study the threats an ad hoc network faces and the security …