Mitigating malicious control packet floods in ad hoc networks.
Saman DesilvaRajendra V. BoppanaPublished in: WCNC (2005)
Keyphrases
- ad hoc networks
- routing protocol
- network topology
- end to end
- packet forwarding
- wireless ad hoc networks
- routing algorithm
- service differentiation
- wireless networks
- packet delivery
- key management
- multi hop
- quality of service
- mobile networks
- peer to peer
- mobile wireless
- base station
- mac protocol
- route discovery
- mobile ad hoc networks
- intermediate nodes
- packet loss
- end to end delay
- network layer
- mobile nodes
- real time
- computer networks
- data acquisition
- sensor networks
- wireless sensor networks
- digital libraries