In an ad hoc network, devices communicate directly with each other with no need for a centralised infrastructure (e.g., an access point). Ad hoc networks are wireless – with devices establishing connections to one another dynamically – and after establishment are self-organised and selfconfiguring. Ad hoc networking is typically used in situations where there is no network infrastructure available, for example in rural communities or during military operations.

Ad hoc networks can enhance privacy because they can be used for peer-to-peer (P2P) communication (without the need for a central server), enhancing decentralisation, end-to-end encryption and anonymity. However, they can still have security vulnerabilities: since data is shared directly between peers, there is a risk that content can be altered by malicious nodes.

Further reading:

Ramanathan, R. and Redi, J., 2002. A brief overview of ad hoc networks: challenges and directions. IEEE Communications Magazine, 40, 202. https://doi.org/10.1109/MCOM.2002.1006968.

  • Search Google Scholar
  • Export Citation
  • Ramanathan, R. and Redi, J., 2002. A brief overview of ad hoc networks: challenges and directions. IEEE Communications Magazine, 40, 202. https://doi.org/10.1109/MCOM.2002.1006968.

    • Search Google Scholar
    • Export Citation
Reference & Dictionaries