Using friendly jamming to improve route security and quality in ad hoc networks.
Mark AdamsVijay K. BhargavaPublished in: CCECE (2017)
Keyphrases
- ad hoc networks
- key management
- network topology
- routing protocol
- multiple paths
- end to end
- routing algorithm
- end to end delay
- wireless networks
- multi hop
- wireless ad hoc networks
- intrusion detection
- identity based cryptography
- mobile networks
- mobile ad hoc networks
- group key agreement
- aodv routing protocol
- peer to peer
- wired networks
- base station
- information security
- wireless mesh networks
- mac protocol
- security issues
- quality of service
- multimedia