Enhancing Benign User Cooperation in the Presence of Malicious Adversaries in Ad Hoc Networks.
George TheodorakopoulosJohn S. BarasPublished in: SecureComm (2006)
Keyphrases
- ad hoc networks
- routing protocol
- network topology
- routing algorithm
- end to end
- peer to peer
- wireless networks
- wireless ad hoc networks
- key management
- mobile ad hoc networks
- multi hop
- base station
- packet delivery
- mobile networks
- data sets
- quality of service
- network infrastructure
- mac protocol
- packet forwarding
- digital libraries