A proof technique for security assessment of on-demand ad hoc routing protocols.
István VajdaPublished in: Int. J. Secur. Networks (2014)
Keyphrases
- routing protocol
- secure routing
- ad hoc networks
- network layer
- wireless sensor networks
- mobile ad hoc networks
- ns simulator
- key management
- routing algorithm
- network topology
- sensor networks
- energy aware
- data transmission
- multi hop
- energy consumption
- wireless ad hoc networks
- information security
- energy efficiency
- data delivery
- security policies
- biological inspired
- cross layer
- medium access control
- quality assessment
- mobile nodes
- security issues
- neighboring nodes
- intrusion detection
- network security
- routing scheme
- security protocols
- routing overhead
- cloud computing
- ad hoc networking
- packet delivery
- intermediate nodes
- end to end delay
- end to end
- wireless mesh networks
- data sets
- communication networks