Login / Signup
Using network processor to establish security agent for AODV routing protocol.
Hongsong Chen
Zhongchuan Fu
Chengyao Wang
Zhenzhou Ji
Mingzeng Hu
Published in:
J. Comput. Inf. Technol. (2007)
Keyphrases
</>
aodv routing protocol
network management
security policies
network structure
wireless sensor networks
peer to peer
computer networks
communication networks
message overhead
data streams
access control
network security
mobile ad hoc networks