| 
							
      					 | 
  					 
  					
    					 | 
   					 
   										
    					| Research for Typical Attack Methods and Security Policies in Ad Hoc Network | 
  					 
  					  										
						|   Yang  Xiuwen1  Mu  Pengzhi2 | 
					 
															
						| (1.Qingdao Branch of China Unicom Internet Business Center,Qingdao 266071,Shandong; 2.Department of Network Engineering,Chengdu University of InformatioTechnology,Chengdu 610225,Sichuan)  | 
					 
										
						 | 
					 
				 
				
				
					
						
							
								
									
									
									
									
									 
          
          
            
              
				
												  
													
													    | 
													    	
														 | 
													 
																										
													
														| 
															
													     		                            						                            																	    Abstract   As a special kind of multi-hop mobile wireless network,Ad Hoc network has a wide range of applications.This article described the main features of Ad Hoc network,analyzed the typical network attack methods,and then proposed the corresponding policies,focused on the key issues such as the key management of mobile Ad Hoc network、the development trend of the new Invasion Detection System which is suitable for Ad Hoc network.
																										     | 
														 
												  		
														
															| 
															    																	Received: 01 January 1900
																	    
															    															    															    																	Published: 10 March 2010
															    															 | 
														 
														 																											    																											 
												 
												
												
												
												 
												
												
             
                                   			 
			 
             
												
											    	
											        	 | 
											        	Viewed | 
											         
													
											        	 | 
											        	 | 
											         
											      	
												         | 
												        
												        	Full text 
												          	
												         | 
											        	
												        	
												        	 
												        	
												          	 
												          	
												          	
														 | 
													 
													
												         | 
												         | 
													 
													
												         | 
												        
												        	Abstract 
												          	
														 | 
												        
															
															 
															
															
												         | 
													 
													
												         | 
												         | 
													 
													
												         | 
												        Cited  | 
												        
												        	
												         | 
													 
													
												         | 
												         | 
												         | 
													 
													
													    |   | 
													    Shared | 
													       | 
												  	 
												  	
													     | 
													     | 
													     | 
											  		 
											  		
													    |   | 
													    Discussed | 
													       | 
												  	 
											 
											 
             
           
      
									
									
		
									
									
									
									
									
									 | 
								 
							 
						 | 
					 
				 
			
		 |