Mitigating selfish, blackhole and wormhole attacks in DTN in a secure, cooperative way.
Amit Kr. GuptaJyotsna Kumar MandalIndrajit BhattacharyaPublished in: Int. J. Inf. Comput. Secur. (2017)
Keyphrases
- cooperative
- secure routing
- routing protocol
- security mechanisms
- mobile ad hoc networks
- stream cipher
- cryptographic protocols
- chosen plaintext
- security protocols
- security flaws
- ad hoc networks
- security issues
- security measures
- black hole
- security threats
- cryptographic algorithms
- intermediate nodes
- game theory
- information leakage
- resource allocation
- countermeasures
- remote user authentication scheme
- multi agent
- sensor networks
- multi hop
- authentication scheme
- block cipher
- routing algorithm
- wireless sensor networks
- unauthorized access
- resource constrained
- security requirements
- key management
- secret key
- multi agent systems
- mobile nodes
- delay tolerant
- advanced encryption standard
- sql injection
- end to end
- information security
- smart card