Resisting Flooding Attacks in Ad Hoc Networks.
Ping YiZhoulin DaiYiPing ZhongShiyong ZhangPublished in: ITCC (2) (2005)
Keyphrases
- ad hoc networks
- secure routing
- neighboring nodes
- routing protocol
- network topology
- watermarking algorithm
- wireless networks
- end to end
- wireless ad hoc networks
- routing algorithm
- mobile wireless
- quality of service
- routing overhead
- route discovery
- mac protocol
- key management
- peer to peer
- base station
- multi hop
- mobile networks
- mobile ad hoc networks
- network infrastructure
- end to end delay
- security protocols
- network nodes
- mobile nodes
- qos routing
- wireless mesh networks
- data sets
- real time