Prevention of Black-Hole Attack using One-Way Hash Chain Scheme in Ad-Hoc Networks.
JongMin JeongGoo Yeon LeeZygmunt J. HaasPublished in: ICOIN (2007)
Keyphrases
- ad hoc networks
- routing protocol
- routing scheme
- mobile ad hoc networks
- network topology
- end to end
- routing algorithm
- key management
- mobile nodes
- wireless networks
- wireless ad hoc networks
- wireless mesh networks
- key management scheme
- hash functions
- multi hop
- quality of service
- end to end delay
- data transmission
- mac protocol
- peer to peer
- ad hoc on demand distance vector
- wireless sensor networks
- sensor networks
- key distribution
- cross layer
- base station
- network nodes
- mobile networks
- packet delivery ratio
- network infrastructure
- network layer
- qos requirements
- multipath routing
- energy efficient