Login / Signup
Prevention of Malicious Nodes Communication in MANETs by Using Authorized Tokens.
N. Chandrakant
P. Deepa Shenoy
K. R. Venugopal
Lalit M. Patnaik
Published in:
FGIT-FGCN (2) (2010)
Keyphrases
</>
network nodes
malicious nodes
mobile ad hoc networks
routing protocol
computer networks
ad hoc networks
malicious behavior
wireless sensor networks
routing algorithm
computer systems
communication systems
digital libraries