Ren Shuai , Zhang Tao , Mu Dejun , Zhang Degang , Application of Trusted Computing to the Adhoc Networks Security, Asian Journal of Information Technology, Volume 7,Issue 8, 2008, Pages 370-373, ISSN 1682-3915, ajit.2008.370.373, (https://makhillpublications.co/view-article.php?doi=ajit.2008.370.373) Abstract: As Adhoc networks own characteristics, the existing fixed network security strategy can not be effectively implemented. Trusted Computing theory will be imported into Adhoc networks based on researching the Adhoc network. To optimize authentication link of the Adhoc networks, we make use of trusted computing platform module in hardware level and Direct Anonymous Attestation theory. The application effectively solves the Adhoc nodes security issues thus, raising the Adhoc network against attacks. Keywords: Network security;Adhoc network;trusted computing;zero-knowledge proof