Securing resource-constrained wireless ad hoc networks | IEEE Conference Publication | IEEE Xplore