Mitigating routing vulnerabilities in ad hoc networks using reputations.
Prashant DewanPartha DasguptaAmiya BhattacharyaPublished in: Int. J. Inf. Comput. Secur. (2009)
Keyphrases
- ad hoc networks
- routing protocol
- routing algorithm
- network topology
- wireless ad hoc networks
- end to end
- wireless networks
- mobile wireless
- qos routing
- mobile ad hoc networks
- mac protocol
- key management
- peer to peer
- multi hop
- quality of service
- base station
- routing scheme
- mobile networks
- end to end delay
- information security
- mobile nodes
- network infrastructure
- multipath routing
- network nodes
- propagation model
- wireless mesh networks
- wireless sensor networks
- packet delivery
- multimedia
- secure routing
- transmission range
- topology control
- energy efficient
- multipath
- data streams