A Scalable Wireless Routing Protocol Secure against Route Truncation Attacks.
Amitabh SaxenaBen SohPublished in: Communications and Multimedia Security (2010)
Keyphrases
- secure routing
- routing protocol
- ad hoc on demand distance vector
- mobile ad hoc networks
- multi hop
- ad hoc networks
- end to end delay
- routing overhead
- aodv routing protocol
- cross layer
- route discovery
- intermediate nodes
- mobile nodes
- node mobility
- routing algorithm
- wireless sensor networks
- data transmission
- packet delivery
- network topology
- wireless mesh networks
- biological inspired
- wireless ad hoc networks
- adhoc network
- network infrastructure
- sensor networks
- hop count
- mobile networks
- network layer
- energy consumption
- wireless networks
- energy efficient
- mac layer
- routing scheme
- energy efficiency
- mobile devices
- ad hoc networking
- routing table
- link failure
- security protocols
- wifi
- key management scheme
- wireless channels
- switched networks
- key management
- application layer
- wireless communication
- sensor nodes