Defending against jellyfish attacks using cluster based routing protocol for secured data transmission in MANET.
S. SatheeshkumarN. SengottaiyanPublished in: Clust. Comput. (2019)
Keyphrases
- routing protocol
- data transmission
- black hole attack
- ddos attacks
- ad hoc networks
- mobile ad hoc networks
- wireless sensor networks
- routing algorithm
- network topology
- energy consumption
- data transfer
- sensor networks
- multi hop
- data delivery
- wireless channels
- cross layer
- ad hoc on demand distance vector
- energy efficient
- energy efficiency
- adhoc network
- end to end delay
- network layer
- application layer
- base station
- intermediate nodes
- packet delivery ratio
- routing overhead
- aodv routing protocol
- network lifetime
- malicious nodes
- mobile nodes
- delivery ratio
- sensor nodes