Preventing black and gray hole attacks in AODV using optimal path routing and hash.
Hizbullah Khattak NizamuddinFahad KhurshidNoor Ul AminPublished in: ICNSC (2013)
Keyphrases
- optimal path
- routing protocol
- ad hoc networks
- secure routing
- shortest path
- routing algorithm
- qos routing
- wireless ad hoc networks
- path planning
- dijkstra algorithm
- mobile ad hoc networks
- network topology
- black hole attack
- qos requirements
- ad hoc on demand distance vector
- quality of service
- wireless sensor networks
- route planning
- path planning algorithm
- link failure
- packet delivery
- key management
- routing scheme
- energy consumption
- end to end
- hash functions
- end to end delay
- network nodes
- sensor networks
- multipath
- routing problem
- energy efficiency
- multi hop
- wireless networks
- data transmission
- malicious nodes
- base station
- network layer
- mobile robot
- wireless mesh networks
- adhoc network
- dynamic environments
- watermarking scheme
- security protocols
- network resources
- mobile networks
- travel time
- resource management