Vulnerabilities of ad hoc network routing protocols to MAC misbehavior.
Lei GuangChadi AssiPublished in: WiMob (3) (2005)
Keyphrases
- routing protocol
- ad hoc networks
- network topology
- routing algorithm
- wireless ad hoc networks
- mobile ad hoc networks
- data transmission
- wireless sensor networks
- base station
- multi hop
- energy consumption
- packet delivery
- sensor networks
- key management
- energy aware
- mac protocol
- end to end delay
- cross layer
- end to end
- mobile nodes
- aodv routing protocol
- network nodes
- network infrastructure
- wireless mesh networks
- mobile networks
- quality of service
- energy efficient
- routing scheme
- energy efficiency
- routing overhead
- average end to end delay
- real time
- wireless networks