A Frame Work for Categorise the Innumerable Vulnerable Nodes in Mobile Adhoc Network.
Gundala SwathiPublished in: Comput. Syst. Sci. Eng. (2020)
Keyphrases
- adhoc network
- mobile nodes
- routing protocol
- data transfer
- ad hoc networks
- wireless networks
- mobile networks
- physical layer
- mobile ad hoc networks
- sensor networks
- wireless ad hoc networks
- wireless sensor networks
- security issues
- network layer
- mobile devices
- mac protocol
- mobile phone
- mobile users
- end to end delay
- routing algorithm
- sensor nodes
- multi hop
- key management scheme
- network structure
- shortest path
- mobile applications
- information security
- cross layer
- data transmission
- data flow
- data management