Login / Signup

A Bullet-Proof Verification Approach to Defend against Black Hole Attacks in Mobile Ad Hoc Networks.

Firoz AhmedSeokhoon YoonHoon Oh
Published in: IEICE Trans. Commun. (2015)
Keyphrases
  • black hole
  • cooperative
  • mobile agents
  • black hole attack
  • model checking
  • java card
  • network topologies
  • cryptographic protocols