Quantifying the Severity of Blackhole Attack in Wireless Mobile Adhoc Networks.
Satria MandalaKommineni JenniMd. Asri NgadiMaznah KamatYahaya CoulibalyPublished in: SSCC (2014)
Keyphrases
- mobile devices
- mobile networks
- adhoc network
- mobile users
- routing protocol
- mobile communication
- portable devices
- communication technologies
- wireless technologies
- mobile terminals
- wireless internet
- mobile clients
- wireless communication
- wireless networks
- physical layer
- wireless medium
- network connectivity
- mobile computing
- hand held devices
- mobile phone
- low bandwidth
- mobile computing devices
- mobile applications
- wireless transmission
- location aware
- ad hoc networking
- ad hoc networks
- smart phones
- multimedia services
- mobile ad hoc networks
- mobile nodes
- context aware
- mobile learning
- internet access
- streaming video
- location tracking
- wireless devices
- mobile internet
- wireless link
- countermeasures
- mobile wireless
- wireless systems
- mobile environments
- data broadcast
- text messaging
- access points
- mobile technologies
- data broadcasting
- wifi
- power consumption
- cellular networks
- wimax network
- wireless broadcast
- broadband wireless
- personal digital assistants