Comparison of two security protocols for preventing packet dropping and message tampering attacks on AODV-based mobile ad Hoc networks.
Isaac WoungangSanjay Kumar DhurandherVincent KooIssa TraoréPublished in: GLOBECOM Workshops (2012)
Keyphrases
- mobile ad hoc networks
- security protocols
- ad hoc networks
- routing protocol
- key management
- ad hoc on demand distance vector
- packet delivery ratio
- black hole attack
- intermediate nodes
- multi hop
- network topology
- network simulator
- multipath
- wireless sensor networks
- adhoc network
- routing algorithm
- cross layer
- security mechanisms
- mobile nodes
- watermarking scheme
- wireless ad hoc networks
- aodv routing protocol
- network nodes
- end to end
- rfid tags
- mobile networks
- wireless mesh networks
- packet delivery
- low cost
- data transmission
- packet loss
- sensor networks
- security requirements
- end to end delay
- energy consumption
- wireless networks