MPH-M, AODV-M and DSR-M Performance Evaluation under Jamming Attacks.
Carolina Del-Valle-SotoJ. Carlos Mex-PereraRaúl MonroyJuan Arturo Nolazco-FloresPublished in: Sensors (2017)
Keyphrases
- ad hoc networks
- routing protocol
- countermeasures
- wireless ad hoc networks
- mobile ad hoc networks
- black hole attack
- watermarking algorithm
- watermarking scheme
- traffic analysis
- security protocols
- power management
- denial of service attacks
- terrorist attacks
- security mechanisms
- design science
- information security
- malicious attacks
- malicious users
- adhoc network
- real time