Protecting AODV against impersonation attacks.
Claude CastellucciaGabriel MontenegroPublished in: ACM SIGMOBILE Mob. Comput. Commun. Rev. (2002)
Keyphrases
- smart card
- protection mechanisms
- security analysis
- routing protocol
- countermeasures
- ad hoc networks
- mobile ad hoc networks
- security mechanisms
- authentication protocol
- black hole attack
- unauthorized access
- wireless ad hoc networks
- security protocols
- access control
- watermarking scheme
- aodv routing protocol
- privacy preservation
- information security
- power management
- wireless sensor networks
- web services