Securing localization-free underwater routing protocols against depth-spoofing attacks.
Ayman AlharbiAlaa M. AbbasSaleh IbrahimPublished in: Array (2022)
Keyphrases
- routing protocol
- secure routing
- sensor networks
- ad hoc networks
- network topology
- routing algorithm
- wireless sensor networks
- mobile ad hoc networks
- energy aware
- biological inspired
- data transmission
- energy consumption
- cross layer
- multi hop
- wireless ad hoc networks
- energy efficiency
- end to end delay
- routing scheme
- data delivery
- packet delivery
- intrusion detection
- watermarking scheme
- wireless mesh networks
- mobile nodes
- video streaming
- energy efficient
- route selection
- aodv routing protocol
- ddos attacks
- intermediate nodes
- communication links
- hop count
- routing overhead
- network traffic
- sensor nodes