DJAVAN: Detecting jamming attacks in Vehicle Ad hoc Networks.
Lynda MokdadJalel Ben-OthmanAnh Tuan NguyenPublished in: Perform. Evaluation (2015)
Keyphrases
- ad hoc networks
- secure routing
- network topology
- routing protocol
- routing algorithm
- end to end
- wireless ad hoc networks
- wireless networks
- key management
- quality of service
- mobile ad hoc networks
- multi hop
- mobile wireless
- peer to peer
- mac protocol
- end to end delay
- base station
- real time
- network nodes
- wired networks
- network infrastructure
- security protocols
- propagation model
- routing scheme
- packet forwarding
- service differentiation
- wireless mesh networks
- security mechanisms
- multipath routing
- energy efficient
- pairwise