Routing path authentication in link-state routing protocols.
Rushdi HamamrehPublished in: Netw. Secur. (2012)
Keyphrases
- routing protocol
- link failure
- ad hoc networks
- routing algorithm
- network topology
- mobile ad hoc networks
- hop count
- routing table
- communication links
- energy aware
- data transmission
- wireless sensor networks
- energy consumption
- wireless ad hoc networks
- routing tables
- biological inspired
- shortest path
- source node
- energy efficient
- sensor networks
- routing scheme
- routing overhead
- energy efficiency
- switched networks
- end to end delay
- data delivery
- network layer
- cross layer
- route selection
- secure routing
- network routing
- network infrastructure
- multi hop
- end to end
- multiple paths
- intermediate nodes
- mac layer
- medium access control
- wireless mesh networks