Piyush Shukla

Learn More
The unique characteristics of mobile ad hoc networks, such as shared wireless channels, dynamic topologies and a reliance on cooperative behaviour, makes routing protocols employed by these networks more vulnerable to attacks than those employed within traditional wired networks. We consider the security of control traffic generated by pro-active or(More)
  • 1