Ad-hoc networks: new detection and prevention approach to malicious attacks using Honeypot.
Avijit MondalRadha Tamal GoswamiPublished in: Int. J. Cloud Comput. (2023)
Keyphrases
- ad hoc networks
- malicious attacks
- network topology
- routing protocol
- wireless networks
- routing algorithm
- key management
- wireless ad hoc networks
- quality of service
- end to end
- limited bandwidth
- mobile wireless
- end to end delay
- peer to peer
- mac protocol
- wireless mesh networks
- anomaly detection
- multi hop
- service differentiation
- neighboring nodes
- propagation model
- mobile nodes
- mobile ad hoc networks