Secure opportunistic routing in 2-hop IEEE 802.15.4 networks with SMOR.
Konrad-Felix KrentzThiemo VoigtPublished in: Comput. Commun. (2024)
Keyphrases
- network topologies
- destination node
- dynamic routing
- social networks
- wireless ad hoc networks
- traffic engineering
- network nodes
- wireless personal area networks
- routing table
- key management
- routing protocol
- ad hoc networks
- cellular networks
- secure routing
- switched networks
- source node
- network design
- low rate
- path selection
- network topology
- security issues
- network infrastructure
- packet forwarding
- medium access control
- shortest path
- packet switching
- mobile devices