On identifying malicious nodes in ad hoc networks.
Xu SuRajendra V. BoppanaPublished in: IWCMC (2007)
Keyphrases
- ad hoc networks
- network nodes
- multipath routing
- malicious nodes
- network topology
- end to end
- routing protocol
- wireless networks
- wireless ad hoc networks
- quality of service
- routing algorithm
- peer to peer
- mobile networks
- multipath
- mobile ad hoc networks
- key management
- wireless sensor networks
- mobile nodes
- base station
- multi hop
- wireless mesh networks
- end to end delay
- multiple paths
- response time
- network topologies