Text this: Security of Access in Hostile Environments Based on the History of Nodes in Ad Hoc Networks