On the vulnerability of the mobile ad hoc network to transmission power controlled Sybil attack: Adopting the mobility-based clustering.
Amol VasudevaManu SoodPublished in: J. King Saud Univ. Comput. Inf. Sci. (2022)
Keyphrases
- multi hop
- mobile ad hoc networks
- transmission power
- network connectivity
- mobile networks
- cross layer
- topology control
- routing protocol
- ad hoc networks
- wireless networks
- aodv routing protocol
- wireless ad hoc networks
- wireless sensor networks
- base station
- energy efficient
- network topology
- network simulator
- data transmission
- energy consumption
- routing algorithm
- mobile users
- multipath
- cellular networks
- network layer
- mobile nodes
- end to end
- mac protocol
- network lifetime
- ip networks
- anomaly detection