Login / Signup
Dealing with Collusion Attack in a Trust-Based MANET.
Ryma Abassi
Published in:
Cybern. Syst. (2018)
Keyphrases
</>
mobile ad hoc networks
routing protocol
countermeasures
secret key
trust model
power analysis
auto configuration
web services
peer to peer
recommendation systems
energy efficient
dos attacks
fully distributed
attack detection