Detecting attacks in QoS-OLSR protocol.
Hiba SanadikiHadi OtrokAzzam MouradJean-Marc RobertPublished in: IWCMC (2013)
Keyphrases
- secure routing
- ad hoc networks
- routing protocol
- quality of service
- security protocols
- cryptographic protocols
- routing scheme
- denial of service attacks
- routing overhead
- cross layer
- wireless networks
- end to end delay
- network topology
- routing algorithm
- qos requirements
- resource reservation
- label switching
- detecting malicious
- network intrusion detection systems
- cryptographic algorithms
- network simulator
- peer to peer
- end hosts
- mobile ad hoc networks
- multi hop
- wireless sensor networks
- lightweight
- web services
- tcp ip
- dos attacks
- real time
- ip networks
- key management
- mobile nodes
- resource management
- end to end
- multimedia services
- ddos attacks
- qos routing
- network security
- sensor networks
- energy consumption