Traffic Remapping Attacks in Ad Hoc Networks.
Szymon SzottJerzy KonorskiPublished in: IEEE Commun. Mag. (2018)
Keyphrases
- ad hoc networks
- secure routing
- network topology
- routing protocol
- medium access
- ddos attacks
- routing algorithm
- packet forwarding
- wireless networks
- wireless ad hoc networks
- end to end
- key management
- quality of service
- network traffic
- packet delivery
- mobile wireless
- end to end delay
- aodv routing protocol
- base station
- mac protocol
- peer to peer
- traffic engineering
- multi hop
- real time
- security protocols
- link failure
- mobile ad hoc networks
- congestion control
- traffic flow
- network infrastructure
- network layer
- network nodes
- mobile networks
- label switching
- neighboring nodes
- route discovery
- routing scheme
- intermediate nodes
- multipath
- energy consumption
- service differentiation
- data transmission
- channel assignment
- mobile nodes
- wireless mesh networks