Secure Communications in Ad hoc Networks ... - FSU Computer Science

1 downloads 0 Views 1MB Size Report
non-faulty nodes s,d in V, any route R(s, d) in G, any help from other nodes. Paths to the destination ..... Needham-Shroeder protocol [28], with security proven 1. If a packet pkt, .... and Source Code in C, John Wiley & Sons, Inc, New York,. 1996.