A novel security approach for struggling black hole attack in optimised link state routing protocol.
Hicham ZougaghAhmed ToumanariRachid LatifNoureddine IdboufkerPublished in: Int. J. Sens. Networks (2015)
Keyphrases
- routing protocol
- black hole attack
- black hole
- adhoc network
- mobile ad hoc networks
- cooperative
- ad hoc networks
- wireless sensor networks
- network layer
- ad hoc on demand distance vector
- network topology
- data transmission
- energy consumption
- energy efficient
- routing algorithm
- wireless ad hoc networks
- sensor networks
- energy efficiency
- key management
- cross layer
- intermediate nodes
- information security
- packet delivery ratio
- multipath routing
- end to end delay
- network security
- routing overhead
- mobile nodes
- mobile devices