Keyphrases
- ad hoc networks
- cross layer
- intrusion detection system
- routing protocol
- distributed intrusion detection
- wireless networks
- mobile ad hoc networks
- computer networks
- wireless ad hoc networks
- intrusion detection
- quality of service
- network topology
- routing algorithm
- end to end
- peer to peer
- network security
- multi hop
- mac layer
- qos requirements
- anomaly detection
- wireless sensor networks
- mac protocol
- key management
- network traffic
- base station
- mobile networks
- end to end delay
- energy consumption
- channel assignment
- energy efficient
- data transmission
- wireless link
- wireless communication
- distributed systems
- mobile nodes
- application layer
- multimedia services
- response time
- real time
- data mining techniques
- network management
- distributed computing
- mobile agents
- network simulator
- energy efficiency