The defense in depth methodology was popularized in the early 2000’s amid growing concerns for information security;this paper will address the shortcomings of
Devices participating in mobile ad hoc networks (MANET) are expected to strictly adhere to a uniform routing protocol to route data packets among themselves. Un