Rushing attacks and defense in wireless ad hoc network routing protocols.
Yih-Chun HuAdrian PerrigDavid B. JohnsonPublished in: Workshop on Wireless Security (2003)
Keyphrases
- wireless ad hoc networks
- routing protocol
- ad hoc networks
- secure routing
- network topology
- ddos attacks
- end to end
- routing algorithm
- multi hop
- mobile ad hoc networks
- wireless sensor networks
- data transmission
- sensor networks
- energy consumption
- wireless networks
- energy efficient
- key management
- energy efficiency
- multipath
- network security
- intrusion detection
- peer to peer
- quality of service
- base station
- security protocols