Security in MANETs using reputation-adjusted routing.
Attila OndiKatherine HoffmanCarlos PerezRichard FordMarco M. CarvalhoWilliam H. AllenPublished in: Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security (2009)
Keyphrases
- routing protocol
- mobile ad hoc networks
- ad hoc networks
- routing algorithm
- key management
- network topology
- network layer
- trust relationships
- malicious nodes
- inter domain
- access control
- information security
- data transmission
- secure routing
- intrusion detection
- end to end delay
- multi hop
- topology control
- network nodes
- trust management
- wireless ad hoc networks
- security issues
- security requirements
- statistical databases
- network security
- end to end
- usage control
- wireless sensor networks
- intermediate nodes
- routing problem
- security policies
- energy efficiency
- network coding
- trust model
- multipath
- energy consumption
- ad hoc networking