Identification of malicious nodes in an AODV pure ad hoc network through guard nodes.
Imran RazaSyed Asad HussainPublished in: Comput. Commun. (2008)
Keyphrases
- ad hoc networks
- network nodes
- malicious nodes
- routing protocol
- wireless ad hoc networks
- network topology
- mobile ad hoc networks
- wireless sensor networks
- end to end
- routing algorithm
- wireless networks
- multipath routing
- mobile nodes
- key management
- quality of service
- multi hop
- neighboring nodes
- mobile networks
- end to end delay
- mac protocol
- base station
- black hole
- peer to peer
- aodv routing protocol
- wifi
- routing scheme
- average end to end delay
- wireless mesh networks
- wireless communication
- packet delivery
- packet delivery ratio
- ns simulator
- secure routing