论文部分内容阅读
With the rapid development of wireless networks, the Ad Hoc networks are widely used in many fields, but the current network security solu-tions for the Ad Hoc network are not competitive e-nough. So the critical technology of Ad Hoc net-work applications shall be how to implement the se-curity scheme. Here the discussions are focused on the specific solution against the security threats which the Ad Hoc networks will face, the method-ology of a management model which uses trusted computing technology to solve Ad Hoc network se-curity problems, and the analysis and verification for the security of this model.