Login / Signup
Detecting wormhole attacks in 3D wireless ad hoc networks via 3D forbidden substructures.
Sen Bai
Yunhao Liu
Zhenhua Li
Xin Bai
Published in:
Comput. Networks (2019)
Keyphrases
</>
wireless ad hoc networks
end to end
ad hoc networks
wireless networks
multi hop
multipath
key management
mobile ad hoc networks
routing protocol
distributed computing
security protocols
digital libraries
mobile phone
routing algorithm
network topology
wireless channels