Towards Secure Decoy Routing by Using SDN.
Chaitanya KumarVinayak NaikPublished in: Tiny Trans. Comput. Sci. (2016)
Keyphrases
- secure routing
- ad hoc networks
- routing protocol
- biological inspired
- routing algorithm
- network topology
- lightweight
- security requirements
- key management
- end to end
- routing problem
- encryption scheme
- authentication scheme
- shortest path
- security issues
- security mechanisms
- authentication protocol
- routing decisions
- covert channel
- information sharing