Securing Ad Hoc Networks∗