Open access peer-reviewed chapter

Security of Access in Hostile Environments Based on the History of Nodes in Ad Hoc Networks

By Saud Rugeish Alotaibi

Submitted: April 10th 2010Published: January 30th 2011

DOI: 10.5772/12924

Downloaded: 1551

© 2011 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms of the Creative Commons Attribution-NonCommercial-ShareAlike-3.0 License, which permits use, distribution and reproduction for non-commercial purposes, provided the original is properly cited and derivative works building on this content are distributed under the same license.

How to cite and reference

Link to this chapter Copy to clipboard

Cite this chapter Copy to clipboard

Saud Rugeish Alotaibi (January 30th 2011). Security of Access in Hostile Environments Based on the History of Nodes in Ad Hoc Networks, Mobile Ad-Hoc Networks: Protocol Design, Xin Wang, IntechOpen, DOI: 10.5772/12924. Available from:

chapter statistics

1551total chapter downloads

More statistics for editors and authors

Login to your personal dashboard for more detailed statistics on your publications.

Access personal reporting

Related Content

This Book

Next chapter

Trust Establishment in Mobile Ad Hoc Networks: Direct Trust Distribution-Performance and Simulation

By Dawoud D.S., Richard L. Gordon, Ashraph Suliman and Kasmir Raja S.V.

Related Book

First chapter

Survey on Multi-hop Vehicular Ad Hoc Networks under IEEE 802.16 Technology

By Gabriel Alejandro Galaviz Mosqueda, Raúl Aquino Santos Luis A. Villaseñor González, Víctor Rangel Licea and Arthur Edwards Block

We are IntechOpen, the world's leading publisher of Open Access books. Built by scientists, for scientists. Our readership spans scientists, professors, researchers, librarians, and students, as well as business professionals. We share our knowledge and peer-reveiwed research papers with libraries, scientific and engineering societies, and also work with corporate R&D departments and government entities.

More About Us