Hash Chains at the Basis of a Secure Reactive Routing Protocol.
Thouraya Bouabana-TebibelPublished in: INTRUST (2011)
Keyphrases
- routing protocol
- secure routing
- ad hoc networks
- network topology
- routing algorithm
- wireless sensor networks
- energy aware
- key management
- mobile ad hoc networks
- energy consumption
- data transmission
- energy efficient
- multi hop
- sensor networks
- data centric
- cross layer
- biological inspired
- end to end delay
- key management scheme
- wireless ad hoc networks
- energy efficiency
- network layer
- routing overhead
- routing scheme
- data sets
- end to end
- security issues
- mobile networks
- multipath
- hash functions
- sensor nodes