
Authentication in a layered security approach for mobile ad hoc networks
Keywords: احراز هویت، اصالتسنجی; Authentication; Layered security approach; Mobile ad hoc networks; Authentication protocols; Challenge–response techniques